Taming Consumer Devices In Business

The past few years have seen IT managers keen to lock down their networks in an effort to safeguard against the threats posed by unsecured employee devices; however, this trend seems to be reversing. A recent study revealed that a third of UK businesses are planning to implement Bring Your Own Device (BYOD) to work schemes.

Gone are the days of companies getting away with using single-vendor infrastructures. Consumer technology has evolved, resulting in a new generation of employees who have grown up with the freedom to enjoy a range of connected devices (from smart phones and PDAs to Xboxes) now entering the workforce.

The Y generation wants more

Representing the future of industry, this so-called Generation Y is not only bright and tech-savvy, but also increasingly demanding. They expect to be able to switch seamlessly between Facebook and work, from calendars to YouTube, all of which means that consumer devices are now encroaching on the business network.

To anyone working within the industry, it is becoming increasingly clear that we are reaching the point where IT managers and directors must accommodate this shift within their overall strategy. They need to learn to embrace this new way of operating or, at the very least, find a way of working around it. Perhaps this is why research recently undertaken by Aberdeen Group revealed that “bring your own device” policies have been implemented in as many as 75 percent of enterprises.

For the IT Director, this is rather more easily said than done. The task of opening up a network is accompanied by the dilemma of having to strike a balance between the desire to offer access and the need for control.

There have been a number of high profile cases where companies have misjudged this balance and have suffered as a result. The example of the T-Mobile employee, prosecuted for selling the personal details of thousands of customers to rival companies, is a case in point. Compatibility issues, particularly surrounding connectivity (an example of which being the iPad not working with certain applications or web browsers), further complicate the process.

A struggle to secure data

This creates a great deal of work and presents a very real problem for IT directors, more and more of whom are turning to wireless networking to solve it. At present, most corporate IT departments use basic wireless functionality. As a result, companies need to be asking a number of questions at the access layer – how does the network currently operate? How could it be used to incorporate multiple devices? And how can they regulate and police them as well? These are some of the recurring issues that we are helping many of our clients work around.

Continued on page 2 

Page: 1 2

adminuk

Recent Posts

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

38 mins ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

2 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

18 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

20 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

21 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

22 hours ago