Published/updated: April 2012
Ignoring key trends could be harmful to corporate health
Is it really true that organisations today are faced with a tidal wave of demands from ‘Generation Y’ employees to connect their personal devices to the corporate network? Certainly, if one goes by media headlines or vendor claims. Not at all, if one listens to those IT executives who flatly state that this sort of thing would never be tolerated in their organisations.
To get a better feel for what’s really going on, in September 2011 we carried out an online survey of 1,600 IT and business professionals. We asked about their own preferences and habits with regard to personal technology. We also investigated what’s going on within their organisations with regard to ‘bring your own device’ (BYOD) and the business use of consumer services such as instant messaging, web conferencing or online storage.
Our findings showed that the tidal wave is myth rather than reality, which in turn gives IT some breathing space. We also exposed three further key myths, which are:
• Generation Y is the driving force behind BYOD
• Consumerisation is all about the ‘hottest gadgets’
• It’s possible to stop consumerisation
So if it’s not Generation Y, who is it that’s pushing to have their own devices connected to the corporate network? As can be seen in Figure 1, outside of the IT department itself, it’s the senior executives who are most insistent on using a personal device for work.
Furthermore, senior executives are the ones with the most clout, and the greatest likelihood to have their wishes granted. “Come back when the answer is ‘yes’” was the alleged response from a senior manager when told by IT that the security risks were too great to give him access to corporate applications on his new tablet device. This kind of incident could of course be used to engage the business in the necessary discussion on what’s needed to facilitate access in a secure and controlled manner. But all too often, the executives have their wish granted, while the underlying issue – access to corporate resources by privately owned devices, and all the risks associated with it - remains unsolved.
Let’s take a closer look now at what those devices are. Contrary to what the headlines might imply, and what is being reinforced by vocal executives waving around the latest tablet, mobile gadgets in the form of smart phones and slates are only part of the story. Windows-based desktop PCs as well as notebooks together account for a larger percentage of personally owned kit used extensively for work purposes than that running MacOS and iOS (Figure 2, responses rated ‘5’).
As time goes on, this balance may well change.
But the key issue remains the same: what policies and technology solutions are required to support safe and appropriate access to corporate systems using personally owned devices? IT departments need to make sure they don’t deploy point solutions that can support only a specific gadget type or two.
There is of course another approach to employees’ desire to connect personal equipment to the corporate network, and that is to ban it completely. Given the sensitive nature of the data held by many private and public sector organisations, as well as the potential consequences of such data falling into the wrong hands, such a restrictive approach is understandable. However, we believe it is not tenable: responses to our survey show that even in organisations where connecting a personal device to the corporate network is banned, it is happening anyway (Figure 3).
Fortunately, we’re not at the point where BYOD has become an unstoppable tide threatening to overwhelm IT departments. Equally, those who work on the assumption that they can either ban the use of personal devices for work purposes, or who feel that they can postpone taking action, are potentially putting their organisations at risk. Whether it’s because of pressure from senior management to access corporate resources from their personal tablet device, or employees resorting to consumer services (such as cloud-based storage), IT and the business will collectively have to face up to the reality that this is a trend that cannot be stopped in its tracks.
Having a consumerisation strategy in place is of critical importance. Such a strategy needs to focus on policy and technology in equal parts. From a technology monitoring and management perspective, it is important to ensure that the strategy is inclusive and covers as many device types as is realistically possible, not just the hottest gadgets. Equally important are business buy-in and support for any limitations that have to be put in place to safeguard the organisation’s security needs.
If you’re interested in more findings from our survey, you can download the full report for free here.
CLICK HERE TO VIEW ORIGINAL PUBLISHED ON
By Dale Vile
By Dale Vile
Creating a more customer centric business environment has historically been hard to achieve. In this paper, we will examine how technology and market trends, together with changes in the regulatory landscape, are elevating the status of customer centricity from ‘aspirational ideal’ to ‘business critical imperative’. ...more
By Dale Vile, Tony Lock, Jack Vile
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many pundits predict that the direction of corporate IT will increasingly be defined by end users. But does this make sense? ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
By Dale Vile
In some organisations, the tension between IT and business teams has come to a head around the topic of devices & the so called ‘Bring Your Own Device’ phenomenon.It’s time for IT and business managers to get together & start a proper dialogue about how to deal with evolving requirements. ...more
By Dale Vile