SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Feature




     BYOD - MOBILITY
       GOES VIRAL




68    Quarter One 2012
A year ago it was the development no employer wanted to know
about; now, it’s the movement every employer has to deal with. Bring-
your-own-device (BYOD) computing is the trend du jour, but is it
really the Holy Grail of increased productivity, customer engagement
and happy employees? Or are we just nearing the peak of in lated
expectations before the inevitable trough of disillusionment?




I
       f there was one technology that was currently being tout-      to use them in the workplace.
       ed as the next big disruptor, it would have to be BYOD.           “Typically it’s been the IT manager or the technology depart-
          Sitting at the centre of a perfect storm of mobile, cloud   ment decides what device you’re allowed to bring into the work-
       and virtualisation technologies, BYOD may be in its infan-     place,” says Sean Kopelke, director, security and compliance
       cy, but its potential is huge. Although often characterised    solutions, Symantec.
       as a Generation Y-driven phenomenon, CEOs and other               “The big shift we’re seeing is that the end users – the employ-
mobile device savvy executives are making their wishes known          ees – are beginning to bring in their own devices. They don’t
– they want to bring their own devices into the workplace.            want to be limited to a device that’s been forced upon them.
   But while many are predicting huge productivity gains for             “When you look at what cloud technology has done to
businesses that manage to implement BYOD successfully,                the market, it’s allowed our files and documents to be easily
there’s no denying that the fast moving growth of BYOD brings         accessed on tablet devices, notebooks, desktop machine or
along with it threats to sensitive and confidential information.      phone devices from anywhere. The technology has enabled
   Nevertheless, some very heavy hitters are already adopting         us to move between devices very effectively and easily. People
BYOD as their modus operandi. IBM recently announced that by          aren’t working a nine to five job sitting at their desk in front of
the start of 2012, 100,000 IBM employees will be able to con-         a large computer screen or desktop computer - those days are
nect handheld devices of their choosing to IBM's internal net-        well and truly past us - and they want to be able to access their
works. One study found nearly 50 per cent of firms say they’re        corporate information where they are.”
currently focusing on how to support more mobile applications            But there’s more to it than just mobility. In many work envi-
for employees to accommodate the trend.                               ronments, the employees’ own device is superior to the out-
   So is a consumer mobile device strategy just a ‘nice to have’?     dated systems operating in-house. Many employees simply feel
Or is it approaching the point of being an outright necessity?        they can do their jobs better on their smart-phone or tablet
                                                                      than they can on their aging PC or under-performing laptop.
What’s the attraction?                                                   For these reasons, among others, employees aren’t waiting
   The 2011 US Enterprise Mobility: Employee Survey found that        for an invite. They’re diving in.
the number one reason employees use consumer applications
at work is familiarity. This phenomenon, dubbed ‘the Apple            The future is here
effect’, promotes the idea that the king of consumer electron-           According to George Hamilton, principal analyst in Yankee
ics has affected the way we interact with technology to such a        Group's Enterprise Research group, the employee consumerisa-
degree that mobile devices ‘just feel like home’ for employees        tion experience is being driven by three interrelated trends:
– a home where their productivity measurably improves. (And              1. Enterprise mobility – Employee-owned smart-phones and
surely it’s a curious fact, given that Apple, a company that has      tablets are becoming the norm, and the users of these devices
never targeted enterprise, has had more impact on enterprise IT       are bringing apps and content with them into the enterprise.
departments than any other technology vendor.)                           2. Cloud computing - Public and private cloud-based infra-
   Essentially, employees like their devices a lot, and they want     structure and applications are driving down capital expenditure       ››

                                                                                                                                       Quarter One 2012   69
Feature //
       BYOD




                                                                                                  phone’, and we have to actively try to figure out the best way
                                                                                                  to deal with that....because if someone’s got an Android or an
                                                                                                  iPhone or a Windows phone and they can make that work for
                                                                                                  them, then that’s going to work for us ultimately. We’ve fully
                                                                                                  bought into that. The concern is now ‘how do we manage
                                                                                                  that?’”
                                                                                                     The, problem, he says, is “fundamentally about security and
     Quick stats:                                                                                 control”.
                                                                                                     “It’s about [IT departments] not being able to have their
     •	 60	per	cent	of	all	corporate	employees	share,	access	and	                                 hand on their hearts and say to the board and to the business
        manage	content	outside	the	office	–	be	it	via	their	iPhone,	                              ‘we feel safe and we feel secure that these machines on the
        iPad,	Blackberry,	Android	or	other	device,	with	indications	                              network aren’t going to cause us any issues or cause us any
        given	that	that	number	is	only	going	to	increase.	                                        concern’.”
     •	 73	per	cent	of	business	leaders	surveyed	currently	allow	
        mobile	devices	or	tablets	to	connect	to	their	corporate	net-                              New layers of complexity
        works.                                                                                       Companies that have already embraced Blackberry’s
     •	 50	per	cent	of	firms	say	they’re	currently	focusing	on	how	to	                            mobile business platforms are perhaps less intimidated by
        support	more	mobile	applications	for	employees	to	accom-                                  the consumer device shift than others. Enterprises working
        modate	the	trend.                                                                         with Blackberry already have the appropriate tools to manage
                                                                                                  mobile devices – high visibility, remote locking and remote wip-
                                                                                                  ing.
                                                                                                     Blackberry, however, does not rule the mobile world, Apple
                                                                                                  does, with Android rapidly closing the gap. And it’s the pres-
                                                                                                  ence of these varying devices in the workplace that’s wrestling
                                                                                                  control from the hands of IT departments and putting it into
                                                                                                  the hands of employees.
                              and IT operational costs. Those same applications are giving           “I think IT departments have really been put in a difficult posi-
                              users instant access to cloud-based alternatives to IT-controlled   tion,” says Kopelke. “[BYOD has] lead them into this spot where
                              applications. And they’re using them—with or without IT’s           they’re no longer in this position where they can say ‘no, we’re
                              involvement.                                                        not going to allow that’. They’re being forced into it and they
                                 3. Social media - Businesses around the globe are on the         have to figure that out how to move forward.”
                              cusp of a generational shift in how their workers communicate          And with multiple new layers of complexity it’s not a case of
                              that is directly tied to consumer communications.                   ‘one policy for all’. Different devices present different risks and
                                 “These are not three independent developments,” says             the challenge is to produce policies with sufficient sweep and
                              Hamilton, “there is a synergistic relationship.... This new era     detail.
                              of consumerisation and mobility is changing the relationship           But while security companies and mobile device manage-
                              between users and the enterprise IT department. For enter-          ment vendors may have an interest in promoting the complex-
                              prise IT to actually lead and embrace the consumerisation and       ity of security issues BYOD-curious businesses are facing, the
                              mobility revolution, it needs to adapt IT processes and user        risks can in fact be characterised as ‘IT business as usual’, just
                              support to this new norm.”                                          with a mobile twist:
                                 And it seems that it is, indeed, the “new norm”.                    • The employee who ignores company policy with, or with-
                                 A US 2011 enterprise mobility survey, found that thirty per      out, ill intent
                              cent of employee respondents said they had installed con-              • The employee who intentionally or unintentionally stores
                              sumer applications on their work device, even though 49 per         sensitive data on an unsecured device or in an unsecured
                              cent admitted that their IT department does not grant them          place (e.g. in a personal cloud application)
                              permission to do so. Long story short, employees aren’t wait-          • The employee who broadcasts sensitive information via to
                              ing for business policies to change. With or without policies in    social networks, blogs, chatrooms, wikis, YouTube or IM.
                              place, offers of reimbursement or even permission, employees           • The fired employee who has access to sensitive/valuable
                              are driving forward, causing headaches and real-world security      data (risking intellectual property, financial integrity, corporate
                              issues for management and IT departments alike.                     reputation, the control of our individual and corporate identities,
                                  “More and more employees are coming along,” says Todd           privacy)
                              Cassie, manager of technology solutions at Christchurch                • An increased risk of infection from malicious programs
                              Airport, “and saying ‘I’ve got an iPhone, I’ve got an Android,      from contaminated devices
                              I don’t want to use your standard phone, I want to use this            • Lost/stolen devices


70         Quarter One 2012
OFTEN CHARACTERISED AS A
                                                                                        GENERATION Y DRIVEN PHENOMENON,
                                                                                      CEOS AND OTHER MOBILE DEVICE SAVVY
                                                                                      EXECUTIVES ARE MAKING THEIR WISHES
                                                                                        KNOWN THEY WANT TO BRING THEIR
                                                                                         OWN DEVICES INTO THE WORKPLACE.




   While the risks posed by BYOD don’t break new ground, the            impacting user convenience or productivity. Accepting the fact
proposed solutions to these problems are where things get               of BYOD computing, rather than attempting to needlessly limit
interesting.                                                            the use of these devices, allows businesses to get on with the
                                                                        business of increasing efficiency, worker flexibility, end-user con-
Safety first                                                            venience, and decreasing operating costs.
   “Security and control is the big challenge,” says Cassie.               Consider conducting an audit to see what devices are being
“There’s a lot of talk out there that ‘you just need to do this’ and    used, and where, in your operation. This will help you to under-
‘you just need to do that’, but actually doing the ‘this and that’ is   stand the risk posed by the new technology, what behaviours
really hard to do. It’s hard enough trying to get an access con-        are being enabled and where sensitive or confidential informa-
trol scenario on your network working with your own equip-              tion might be at risk.
ment, let alone trying to get the whole working with others as             Classifying what data is allowed on what device allows a
well. There are a lot of glossy brochures out there that tell you       company to communicate with staff about what behaviours
how easy it can be, but that’s not necessarily the case.”               are appropriate or inappropriate, but also to be crystal clear
   “We believe these tools will give us gains that we haven’t           with employees about their accountability with the data.
thought of yet; we just need, from an IT point of view, to be           Research organisation, the Ponemon Institute, suggests that
comfortable that by doing that we’re not trading productivity           such data be classified as: regulated data (such as credit cards,
gains for a security hole.”                                             health data, SSN and driver’s license number), non-regulated
   So just how does a company get its approach to consumer              customer data (such as purchase history, email address list,
devices from ‘disruptive’ to ‘productive’?                              shipping information), non-regulated confidential business data
   The key is in developing a strategy for consumer device              (such as IP, business plans and financial records) and employee
use; deciding how best to manage devices and support users;             data.
making expectations clear company-wide and then backing up                 Conduct a risk assessment to determine what possible
those expectations with real-world responses in the event of            scenarios could compromise data and decide on the appropri-
non-compliance.                                                         ate response in their event. Devise appropriate security mea-
1. Developing a strategy                                                sures for both the data and the device.
   The rise of BYOD computing poses real challenges for IT              2. Create a comprehensive policy
departments. These challenges demand a strategic approach                  Your policy should include specific guidelines for employees,
to managing risks, threats and vulnerabilities without negatively       addressing the risks associated with each device – such as             ››

                                                                                                                                                    Quarter One 2012   71
Feature //
     BYOD




                                                                                                              MANY EMPLOYEES SIMPLY
                                                                                                              FEEL THEY CAN DO THEIR
                                                                                                              JOBS BETTER ON THEIR
                                                                                                              SMART PHONE OR TABLET
                                                                                                              THAN THEY CAN ON THEIR
                                                                                                              AGING PC OR UNDER
                                                                                                              PERFORMING LAPTOP.




                           what type of data cannot be stored on the device - and the           4. Use remote control
                           security procedures that should be followed, such as how to             The downloading of unproductive or risky applications must
                           download an application securely and what to do in the event         be blocked on company-owned devices.
                           of a lost or stolen device. While obvious security threats, such        Furthermore, given the wide-range of applications available
                           as ‘jail-breaking’ of devices, should be prohibited, policy-makers   to the consumer, blacklisting methods are perhaps not suffi-
                           should understand that it is near-on impossible to prevent           cient to prevent targeted attacks against specific vulnerabilities.
                           employees from using devices for both personal and business          Application control should be used, if possible, to ensure that
                           purposes. Guidelines should take this into account and estab-        applications such as browsers, PDF readers and flash players
                           lish clear rules for specific non-work-related activity.             are patched and up-to-date.
                              A rigorous monitoring process should also be established to          Monitor and control the data that travels on your network
                           ensure that employees are complying with policy. The penalties       and make sure you have controls in place to inform you about
                           for non-compliance – including the punishments for malicious         third party transfers.
                           or negligent activity – should be made clear.                           To reduce the risk of data breaches, use remote wipe,
                           3. Conduct training                                                  remote data encryption and anti-theft technologies that allow
                              Companies should conduct training sessions to make sure           you to locate stolen devices and prevent their unauthorised
                           that employees are aware of the risks and emerging threats           use. Many smart-phones come with the ability to remotely wipe
                           created by BYOD computing. Training should stress the need           data in the event of their theft, and this technology is widely
                           for care when transmitting confidential information.                 available for purchase.
                              Employees should also be trained to recognise traditional            Employees should be educated about what the response will
                           threats that are exacerbated by BYOD – such as phishing              be if devices are lost or compromised.
                           threats. Inform them that phishing threats often appear to           5. Reinforce the basics
                           come from established and well-known organisations and                  Making sure systems are up to date, making sure passwords
                           request personal information, and often arrive via email, social     are in place and ensuring employees follow basic best practice
                           media and social networking sites.                                   (not clicking on links or responding to requests that could be
                              Urge employees to treat texts, system messages or events          malicious for example) need to be reinforced. Familiarity with
                           on their mobile devices that they did not ask for, initiate or       a device can lead to a slackening of attitude towards security.
                           expect, with caution, and to never assume that voice calls,          Reiterate general rules of thumb. 		
                           especially international ones, are confidential.


72      Quarter One 2012

Weitere ähnliche Inhalte

Mehr von Hayden McCall

iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?Hayden McCall
 
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...Hayden McCall
 
iStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulseiStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulseHayden McCall
 
iStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guideiStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guideHayden McCall
 
iStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agentiStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agentHayden McCall
 
iStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 MagazineiStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 MagazineHayden McCall
 
iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?Hayden McCall
 
iStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplayiStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplayHayden McCall
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationHayden McCall
 
iStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technologyiStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technologyHayden McCall
 
iStart - Unified Communications comes of age
iStart - Unified Communications comes of ageiStart - Unified Communications comes of age
iStart - Unified Communications comes of ageHayden McCall
 
iStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analyticsiStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analyticsHayden McCall
 
iStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloudiStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloudHayden McCall
 
iStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the pointiStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the pointHayden McCall
 
iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)Hayden McCall
 
iStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spendiStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spendHayden McCall
 
iStart plugged in POS
iStart plugged in POSiStart plugged in POS
iStart plugged in POSHayden McCall
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtualHayden McCall
 
iStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingiStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingHayden McCall
 

Mehr von Hayden McCall (20)

iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?iStart feature: Satisfaction calling: does outsourcing contact centres work?
iStart feature: Satisfaction calling: does outsourcing contact centres work?
 
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
iStart feature: How to hatch your bjusiness idea: A guide to A/NZ incubators ...
 
iStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulseiStart feature: Tracking the customer pulse
iStart feature: Tracking the customer pulse
 
iStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guideiStart feature: All you need is love: A modern marketers's tech guide
iStart feature: All you need is love: A modern marketers's tech guide
 
iStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agentiStart - feature: The anatomy of technology as a change agent
iStart - feature: The anatomy of technology as a change agent
 
iStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 MagazineiStart - Technology in business Q3 2013 Magazine
iStart - Technology in business Q3 2013 Magazine
 
iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?iStart - Business Intelligence: What are you really investing in?
iStart - Business Intelligence: What are you really investing in?
 
iStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplayiStart - ANZ bank merger is no horseplay
iStart - ANZ bank merger is no horseplay
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
iStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technologyiStart - eHealth Vital signs for the future of health technology
iStart - eHealth Vital signs for the future of health technology
 
iStart - Unified Communications comes of age
iStart - Unified Communications comes of ageiStart - Unified Communications comes of age
iStart - Unified Communications comes of age
 
iStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analyticsiStart - Ignoring the gut feel: The emerging world or predictive analytics
iStart - Ignoring the gut feel: The emerging world or predictive analytics
 
iStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloudiStart - Brave New World: GIS solutions in the cloud
iStart - Brave New World: GIS solutions in the cloud
 
iStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the pointiStart - Sharepoint: Getting to the point
iStart - Sharepoint: Getting to the point
 
iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)iStart - 15 things your CRM system could be telling you (but probably isn't)
iStart - 15 things your CRM system could be telling you (but probably isn't)
 
iStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spendiStart - eprocurement: Corral your maverick spend
iStart - eprocurement: Corral your maverick spend
 
iStart plugged in POS
iStart plugged in POSiStart plugged in POS
iStart plugged in POS
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtual
 
iStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingiStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computing
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

iStart BYOD - Mobility goes viral

  • 1. Feature BYOD - MOBILITY GOES VIRAL 68 Quarter One 2012
  • 2. A year ago it was the development no employer wanted to know about; now, it’s the movement every employer has to deal with. Bring- your-own-device (BYOD) computing is the trend du jour, but is it really the Holy Grail of increased productivity, customer engagement and happy employees? Or are we just nearing the peak of in lated expectations before the inevitable trough of disillusionment? I f there was one technology that was currently being tout- to use them in the workplace. ed as the next big disruptor, it would have to be BYOD. “Typically it’s been the IT manager or the technology depart- Sitting at the centre of a perfect storm of mobile, cloud ment decides what device you’re allowed to bring into the work- and virtualisation technologies, BYOD may be in its infan- place,” says Sean Kopelke, director, security and compliance cy, but its potential is huge. Although often characterised solutions, Symantec. as a Generation Y-driven phenomenon, CEOs and other “The big shift we’re seeing is that the end users – the employ- mobile device savvy executives are making their wishes known ees – are beginning to bring in their own devices. They don’t – they want to bring their own devices into the workplace. want to be limited to a device that’s been forced upon them. But while many are predicting huge productivity gains for “When you look at what cloud technology has done to businesses that manage to implement BYOD successfully, the market, it’s allowed our files and documents to be easily there’s no denying that the fast moving growth of BYOD brings accessed on tablet devices, notebooks, desktop machine or along with it threats to sensitive and confidential information. phone devices from anywhere. The technology has enabled Nevertheless, some very heavy hitters are already adopting us to move between devices very effectively and easily. People BYOD as their modus operandi. IBM recently announced that by aren’t working a nine to five job sitting at their desk in front of the start of 2012, 100,000 IBM employees will be able to con- a large computer screen or desktop computer - those days are nect handheld devices of their choosing to IBM's internal net- well and truly past us - and they want to be able to access their works. One study found nearly 50 per cent of firms say they’re corporate information where they are.” currently focusing on how to support more mobile applications But there’s more to it than just mobility. In many work envi- for employees to accommodate the trend. ronments, the employees’ own device is superior to the out- So is a consumer mobile device strategy just a ‘nice to have’? dated systems operating in-house. Many employees simply feel Or is it approaching the point of being an outright necessity? they can do their jobs better on their smart-phone or tablet than they can on their aging PC or under-performing laptop. What’s the attraction? For these reasons, among others, employees aren’t waiting The 2011 US Enterprise Mobility: Employee Survey found that for an invite. They’re diving in. the number one reason employees use consumer applications at work is familiarity. This phenomenon, dubbed ‘the Apple The future is here effect’, promotes the idea that the king of consumer electron- According to George Hamilton, principal analyst in Yankee ics has affected the way we interact with technology to such a Group's Enterprise Research group, the employee consumerisa- degree that mobile devices ‘just feel like home’ for employees tion experience is being driven by three interrelated trends: – a home where their productivity measurably improves. (And 1. Enterprise mobility – Employee-owned smart-phones and surely it’s a curious fact, given that Apple, a company that has tablets are becoming the norm, and the users of these devices never targeted enterprise, has had more impact on enterprise IT are bringing apps and content with them into the enterprise. departments than any other technology vendor.) 2. Cloud computing - Public and private cloud-based infra- Essentially, employees like their devices a lot, and they want structure and applications are driving down capital expenditure ›› Quarter One 2012 69
  • 3. Feature // BYOD phone’, and we have to actively try to figure out the best way to deal with that....because if someone’s got an Android or an iPhone or a Windows phone and they can make that work for them, then that’s going to work for us ultimately. We’ve fully bought into that. The concern is now ‘how do we manage that?’” The, problem, he says, is “fundamentally about security and Quick stats: control”. “It’s about [IT departments] not being able to have their • 60 per cent of all corporate employees share, access and hand on their hearts and say to the board and to the business manage content outside the office – be it via their iPhone, ‘we feel safe and we feel secure that these machines on the iPad, Blackberry, Android or other device, with indications network aren’t going to cause us any issues or cause us any given that that number is only going to increase. concern’.” • 73 per cent of business leaders surveyed currently allow mobile devices or tablets to connect to their corporate net- New layers of complexity works. Companies that have already embraced Blackberry’s • 50 per cent of firms say they’re currently focusing on how to mobile business platforms are perhaps less intimidated by support more mobile applications for employees to accom- the consumer device shift than others. Enterprises working modate the trend. with Blackberry already have the appropriate tools to manage mobile devices – high visibility, remote locking and remote wip- ing. Blackberry, however, does not rule the mobile world, Apple does, with Android rapidly closing the gap. And it’s the pres- ence of these varying devices in the workplace that’s wrestling control from the hands of IT departments and putting it into the hands of employees. and IT operational costs. Those same applications are giving “I think IT departments have really been put in a difficult posi- users instant access to cloud-based alternatives to IT-controlled tion,” says Kopelke. “[BYOD has] lead them into this spot where applications. And they’re using them—with or without IT’s they’re no longer in this position where they can say ‘no, we’re involvement. not going to allow that’. They’re being forced into it and they 3. Social media - Businesses around the globe are on the have to figure that out how to move forward.” cusp of a generational shift in how their workers communicate And with multiple new layers of complexity it’s not a case of that is directly tied to consumer communications. ‘one policy for all’. Different devices present different risks and “These are not three independent developments,” says the challenge is to produce policies with sufficient sweep and Hamilton, “there is a synergistic relationship.... This new era detail. of consumerisation and mobility is changing the relationship But while security companies and mobile device manage- between users and the enterprise IT department. For enter- ment vendors may have an interest in promoting the complex- prise IT to actually lead and embrace the consumerisation and ity of security issues BYOD-curious businesses are facing, the mobility revolution, it needs to adapt IT processes and user risks can in fact be characterised as ‘IT business as usual’, just support to this new norm.” with a mobile twist: And it seems that it is, indeed, the “new norm”. • The employee who ignores company policy with, or with- A US 2011 enterprise mobility survey, found that thirty per out, ill intent cent of employee respondents said they had installed con- • The employee who intentionally or unintentionally stores sumer applications on their work device, even though 49 per sensitive data on an unsecured device or in an unsecured cent admitted that their IT department does not grant them place (e.g. in a personal cloud application) permission to do so. Long story short, employees aren’t wait- • The employee who broadcasts sensitive information via to ing for business policies to change. With or without policies in social networks, blogs, chatrooms, wikis, YouTube or IM. place, offers of reimbursement or even permission, employees • The fired employee who has access to sensitive/valuable are driving forward, causing headaches and real-world security data (risking intellectual property, financial integrity, corporate issues for management and IT departments alike. reputation, the control of our individual and corporate identities, “More and more employees are coming along,” says Todd privacy) Cassie, manager of technology solutions at Christchurch • An increased risk of infection from malicious programs Airport, “and saying ‘I’ve got an iPhone, I’ve got an Android, from contaminated devices I don’t want to use your standard phone, I want to use this • Lost/stolen devices 70 Quarter One 2012
  • 4. OFTEN CHARACTERISED AS A GENERATION Y DRIVEN PHENOMENON, CEOS AND OTHER MOBILE DEVICE SAVVY EXECUTIVES ARE MAKING THEIR WISHES KNOWN THEY WANT TO BRING THEIR OWN DEVICES INTO THE WORKPLACE. While the risks posed by BYOD don’t break new ground, the impacting user convenience or productivity. Accepting the fact proposed solutions to these problems are where things get of BYOD computing, rather than attempting to needlessly limit interesting. the use of these devices, allows businesses to get on with the business of increasing efficiency, worker flexibility, end-user con- Safety first venience, and decreasing operating costs. “Security and control is the big challenge,” says Cassie. Consider conducting an audit to see what devices are being “There’s a lot of talk out there that ‘you just need to do this’ and used, and where, in your operation. This will help you to under- ‘you just need to do that’, but actually doing the ‘this and that’ is stand the risk posed by the new technology, what behaviours really hard to do. It’s hard enough trying to get an access con- are being enabled and where sensitive or confidential informa- trol scenario on your network working with your own equip- tion might be at risk. ment, let alone trying to get the whole working with others as Classifying what data is allowed on what device allows a well. There are a lot of glossy brochures out there that tell you company to communicate with staff about what behaviours how easy it can be, but that’s not necessarily the case.” are appropriate or inappropriate, but also to be crystal clear “We believe these tools will give us gains that we haven’t with employees about their accountability with the data. thought of yet; we just need, from an IT point of view, to be Research organisation, the Ponemon Institute, suggests that comfortable that by doing that we’re not trading productivity such data be classified as: regulated data (such as credit cards, gains for a security hole.” health data, SSN and driver’s license number), non-regulated So just how does a company get its approach to consumer customer data (such as purchase history, email address list, devices from ‘disruptive’ to ‘productive’? shipping information), non-regulated confidential business data The key is in developing a strategy for consumer device (such as IP, business plans and financial records) and employee use; deciding how best to manage devices and support users; data. making expectations clear company-wide and then backing up Conduct a risk assessment to determine what possible those expectations with real-world responses in the event of scenarios could compromise data and decide on the appropri- non-compliance. ate response in their event. Devise appropriate security mea- 1. Developing a strategy sures for both the data and the device. The rise of BYOD computing poses real challenges for IT 2. Create a comprehensive policy departments. These challenges demand a strategic approach Your policy should include specific guidelines for employees, to managing risks, threats and vulnerabilities without negatively addressing the risks associated with each device – such as ›› Quarter One 2012 71
  • 5. Feature // BYOD MANY EMPLOYEES SIMPLY FEEL THEY CAN DO THEIR JOBS BETTER ON THEIR SMART PHONE OR TABLET THAN THEY CAN ON THEIR AGING PC OR UNDER PERFORMING LAPTOP. what type of data cannot be stored on the device - and the 4. Use remote control security procedures that should be followed, such as how to The downloading of unproductive or risky applications must download an application securely and what to do in the event be blocked on company-owned devices. of a lost or stolen device. While obvious security threats, such Furthermore, given the wide-range of applications available as ‘jail-breaking’ of devices, should be prohibited, policy-makers to the consumer, blacklisting methods are perhaps not suffi- should understand that it is near-on impossible to prevent cient to prevent targeted attacks against specific vulnerabilities. employees from using devices for both personal and business Application control should be used, if possible, to ensure that purposes. Guidelines should take this into account and estab- applications such as browsers, PDF readers and flash players lish clear rules for specific non-work-related activity. are patched and up-to-date. A rigorous monitoring process should also be established to Monitor and control the data that travels on your network ensure that employees are complying with policy. The penalties and make sure you have controls in place to inform you about for non-compliance – including the punishments for malicious third party transfers. or negligent activity – should be made clear. To reduce the risk of data breaches, use remote wipe, 3. Conduct training remote data encryption and anti-theft technologies that allow Companies should conduct training sessions to make sure you to locate stolen devices and prevent their unauthorised that employees are aware of the risks and emerging threats use. Many smart-phones come with the ability to remotely wipe created by BYOD computing. Training should stress the need data in the event of their theft, and this technology is widely for care when transmitting confidential information. available for purchase. Employees should also be trained to recognise traditional Employees should be educated about what the response will threats that are exacerbated by BYOD – such as phishing be if devices are lost or compromised. threats. Inform them that phishing threats often appear to 5. Reinforce the basics come from established and well-known organisations and Making sure systems are up to date, making sure passwords request personal information, and often arrive via email, social are in place and ensuring employees follow basic best practice media and social networking sites. (not clicking on links or responding to requests that could be Urge employees to treat texts, system messages or events malicious for example) need to be reinforced. Familiarity with on their mobile devices that they did not ask for, initiate or a device can lead to a slackening of attitude towards security. expect, with caution, and to never assume that voice calls, Reiterate general rules of thumb. especially international ones, are confidential. 72 Quarter One 2012