Published/updated: April 2012
Ignoring key trends could be harmful to corporate health
Is it really true that organisations today are faced with a tidal wave of demands from ‘Generation Y’ employees to connect their personal devices to the corporate network? Certainly, if one goes by media headlines or vendor claims. Not at all, if one listens to those IT executives who flatly state that this sort of thing would never be tolerated in their organisations.
To get a better feel for what’s really going on, in September 2011 we carried out an online survey of 1,600 IT and business professionals. We asked about their own preferences and habits with regard to personal technology. We also investigated what’s going on within their organisations with regard to ‘bring your own device’ (BYOD) and the business use of consumer services such as instant messaging, web conferencing or online storage.
Our findings showed that the tidal wave is myth rather than reality, which in turn gives IT some breathing space. We also exposed three further key myths, which are:
• Generation Y is the driving force behind BYOD
• Consumerisation is all about the ‘hottest gadgets’
• It’s possible to stop consumerisation
So if it’s not Generation Y, who is it that’s pushing to have their own devices connected to the corporate network? As can be seen in Figure 1, outside of the IT department itself, it’s the senior executives who are most insistent on using a personal device for work.
Furthermore, senior executives are the ones with the most clout, and the greatest likelihood to have their wishes granted. “Come back when the answer is ‘yes’” was the alleged response from a senior manager when told by IT that the security risks were too great to give him access to corporate applications on his new tablet device. This kind of incident could of course be used to engage the business in the necessary discussion on what’s needed to facilitate access in a secure and controlled manner. But all too often, the executives have their wish granted, while the underlying issue – access to corporate resources by privately owned devices, and all the risks associated with it - remains unsolved.
Let’s take a closer look now at what those devices are. Contrary to what the headlines might imply, and what is being reinforced by vocal executives waving around the latest tablet, mobile gadgets in the form of smart phones and slates are only part of the story. Windows-based desktop PCs as well as notebooks together account for a larger percentage of personally owned kit used extensively for work purposes than that running MacOS and iOS (Figure 2, responses rated ‘5’).
As time goes on, this balance may well change.
But the key issue remains the same: what policies and technology solutions are required to support safe and appropriate access to corporate systems using personally owned devices? IT departments need to make sure they don’t deploy point solutions that can support only a specific gadget type or two.
There is of course another approach to employees’ desire to connect personal equipment to the corporate network, and that is to ban it completely. Given the sensitive nature of the data held by many private and public sector organisations, as well as the potential consequences of such data falling into the wrong hands, such a restrictive approach is understandable. However, we believe it is not tenable: responses to our survey show that even in organisations where connecting a personal device to the corporate network is banned, it is happening anyway (Figure 3).
Fortunately, we’re not at the point where BYOD has become an unstoppable tide threatening to overwhelm IT departments. Equally, those who work on the assumption that they can either ban the use of personal devices for work purposes, or who feel that they can postpone taking action, are potentially putting their organisations at risk. Whether it’s because of pressure from senior management to access corporate resources from their personal tablet device, or employees resorting to consumer services (such as cloud-based storage), IT and the business will collectively have to face up to the reality that this is a trend that cannot be stopped in its tracks.
Having a consumerisation strategy in place is of critical importance. Such a strategy needs to focus on policy and technology in equal parts. From a technology monitoring and management perspective, it is important to ensure that the strategy is inclusive and covers as many device types as is realistically possible, not just the hottest gadgets. Equally important are business buy-in and support for any limitations that have to be put in place to safeguard the organisation’s security needs.
If you’re interested in more findings from our survey, you can download the full report for free here.
CLICK HERE TO VIEW ORIGINAL PUBLISHED ON
By Dale Vile and Tony Lock
It’s easy to be caught out by a cyber attack or internal mistake that leads to your customers’ data or important intellectual property ending up on the black market. Making sure your business is adequately protected and is able to respond effectively to a security incident ...more
By Dale Vile Tony Lock & Jack Vile
Application programming interfaces (APIs) have been around for decades. In the early days of IT they were primarily used to give programmers convenient access to libraries of prebuilt functions. As systems became more distributed, APIs found their place ...more
By Dale Vile & Jack Vile
The world we live in is increasingly digital. As the smart use of technology leads to markets speeding up and becoming ever more unpredictable, a strong set of established offerings and execution capabilities only gets you so far. Feedback from 1,442 IT ...more
By Dale Vile
Advances in digital technology create significant opportunities to transform both customer engagement and business operations. As the trends in these areas continue, feedback from 1,442 respondents in a recent survey highlight 10 key traits of the highest achievers. ...more
By Dale Vile
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals are aware that new and changing needs will lead to future capability gaps. They also know that more of the same is not the answer ...more
By Dale Vile
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever. Relying on manual processes and scripts, or ad hoc piecemeal automation, is not sustainable ...more
By Dale Vile
A perennial problem with storage is how to deal with escalating requirements in a smooth, manageable and non-disruptive manner. By removing many of the traditional limits on system expansion, Ceph based configurations ...more
By Dale Vile
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define the future of end user computing. Most organisations today, however, see a role for both company and employee owned equipment to meet the wide and varied range of needs ...more