0% found this document useful (0 votes)
89 views3 pages

Consumerization Final 2

The document discusses the consumerization of IT, where corporate employees bring personal devices and technologies into the workplace instead of using traditional corporate solutions. This trend has challenged IT departments to adapt to user needs and preferences for more mobile and collaborative technologies. While these consumer-oriented solutions can offer advantages, they also introduce security risks if corporate data is accessed and stored outside the corporate network on personal devices and cloud services. The document advises IT professionals to focus on managing and securing access to data, rather than trying to manage all the different types of devices employees may use.

Uploaded by

blussiertt
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views3 pages

Consumerization Final 2

The document discusses the consumerization of IT, where corporate employees bring personal devices and technologies into the workplace instead of using traditional corporate solutions. This trend has challenged IT departments to adapt to user needs and preferences for more mobile and collaborative technologies. While these consumer-oriented solutions can offer advantages, they also introduce security risks if corporate data is accessed and stored outside the corporate network on personal devices and cloud services. The document advises IT professionals to focus on managing and securing access to data, rather than trying to manage all the different types of devices employees may use.

Uploaded by

blussiertt
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

\\\\ The Consumerization of IT 101

The consumerization of IT has forced corporate IT departments to adapt to user needs. But even as these technologies become more accepted in enterprises, they introduce new problems.
By SearchconSumerization.com editorS

Expert
Briefing

T h e C o nsu mer IzaTIon of IT 101

s corporate employees become savvy technology consumers, they are bringing personal devices into the workplace and eschewing corporate technologies. In this Q&A by SearchConsumerization.com editors, we explore how this user-generated movementalso known as the consumerization of IThas brought new challenges and forced IT to move at a faster pace.

for business use falls under the umbrella. Why is the consumerization of IT happening now? Its happening because, frankly, some consumer technologies are better than traditional enterprise software at helping people do their jobs. People work in more mobile and collaborative ways now than they did in the past, but enterprise software doesnt always meet these new needs. Todays popular mobile devices are faster and more intuitive than typical corporate-issued smartphones. Most cloud email services offer larger file attachment size limits, better search functions and easier-to-use interfaces than enterprise systems. And cloud storage and collaboration services dont require VPN [virtual private network] access, unlike corporate network shared drives. What are the major concerns for IT professionals? Security, security, security! Not to sound alarmist, but users today can access corporate systems from all sorts of devices and store corporate data everywhere from here to Timbuktu (or whatever the

How do you define the consumerization of IT? Its people using consumer technologies at work, often without their IT departments knowledge or permission. Most people think of the recent influx of personal smartphones and tablets into the business world, and thats a big part of this trend, but its not the only part. Consumerization also encompasses the use of the personal cloud: online email, productivity, storage and collaboration services that let employees transmit and store data outside the corporate network. If a project team creates a Facebook group to more easily share information, thats another example of consumerization. Really, any consumeroriented technology that people adopt

expert briefing february 2012

T h e C o nsu mer IzaTIon of IT 101

clouds version of Timbuktu is called). Sure, these device manufacturers and cloud services all claim to be secure, and they very well may be, but as an IT professional, you may not want to put your organizations security in the hands of a third party. Regulatory compliance also comes into play; if an employee accesses or stores protected data outside the corporate network, that alone can constitute a violation. Other problems can result from consumerization. If too many employees bring their own smartphones and tablets to work, for example, it puts a strain on wireless network resources. But security should be the top priority. What does BYOD mean, and whats its role in consumerization? BYOD stands for bring your own device. You may have also heard the terms BYOC and BYOPC, which stand for bring your own computer and bring your own PC. Different people have different definitions for these terms. Some say any organization where employees use their own computers, smartphones and tablets for work is a BYO shop. Others say BYO is a specific policy in which an organization gives users a stipend to buy their own devices in lieu of corporate-issued technology.

Either way, BYOD is the driving force behind consumerization. Managing, securing and delivering corporate applications and data to personal devices will be one of ITs biggest challenges in the coming years. If you could give IT professionals one piece of advice for dealing with consumerization, what would it be? At every conference or panel Ive attended since I started covering this trend, the same theme has emerged: Focus on managing data, not devices. There are so many smartphones and tablets out there, and they have different operating systems, hardware and carriers. Even if the tools existed to comprehensively manage them all, doing so would not be an enviable task. Plus, it would still leave data vulnerable in personal cloud services. Managing and securing data in the era of consumerization isnt exactly a piece of cake, either. You have to resolve a lot of questions concerning who can access which kinds of data and from where, then implement technologies to enforce those policies. But if you can establish and enforce these policies successfully, you wont have to worry about every single new device or cloud service on the market. n

This ExpErT BriEfing was sponsorEd By logmEin.

expert briefing february 2012

You might also like