Taming Consumer Devices In Business

The past few years have seen IT managers keen to lock down their networks in an effort to safeguard against the threats posed by unsecured employee devices; however, this trend seems to be reversing. A recent study revealed that a third of UK businesses are planning to implement Bring Your Own Device (BYOD) to work schemes.

Gone are the days of companies getting away with using single-vendor infrastructures. Consumer technology has evolved, resulting in a new generation of employees who have grown up with the freedom to enjoy a range of connected devices (from smart phones and PDAs to Xboxes) now entering the workforce.

The Y generation wants more

Representing the future of industry, this so-called Generation Y is not only bright and tech-savvy, but also increasingly demanding. They expect to be able to switch seamlessly between Facebook and work, from calendars to YouTube, all of which means that consumer devices are now encroaching on the business network.

To anyone working within the industry, it is becoming increasingly clear that we are reaching the point where IT managers and directors must accommodate this shift within their overall strategy. They need to learn to embrace this new way of operating or, at the very least, find a way of working around it. Perhaps this is why research recently undertaken by Aberdeen Group revealed that “bring your own device” policies have been implemented in as many as 75 percent of enterprises.

For the IT Director, this is rather more easily said than done. The task of opening up a network is accompanied by the dilemma of having to strike a balance between the desire to offer access and the need for control.

There have been a number of high profile cases where companies have misjudged this balance and have suffered as a result. The example of the T-Mobile employee, prosecuted for selling the personal details of thousands of customers to rival companies, is a case in point. Compatibility issues, particularly surrounding connectivity (an example of which being the iPad not working with certain applications or web browsers), further complicate the process.

A struggle to secure data

This creates a great deal of work and presents a very real problem for IT directors, more and more of whom are turning to wireless networking to solve it. At present, most corporate IT departments use basic wireless functionality. As a result, companies need to be asking a number of questions at the access layer – how does the network currently operate? How could it be used to incorporate multiple devices? And how can they regulate and police them as well? These are some of the recurring issues that we are helping many of our clients work around.

Continued on page 2 

Page: 1 2

adminuk

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

2 days ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

2 days ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

2 days ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

3 days ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

3 days ago