Consumerization Final 2
Consumerization Final 2
The consumerization of IT has forced corporate IT departments to adapt to user needs. But even as these technologies become more accepted in enterprises, they introduce new problems.
By SearchconSumerization.com editorS
Expert
Briefing
s corporate employees become savvy technology consumers, they are bringing personal devices into the workplace and eschewing corporate technologies. In this Q&A by SearchConsumerization.com editors, we explore how this user-generated movementalso known as the consumerization of IThas brought new challenges and forced IT to move at a faster pace.
for business use falls under the umbrella. Why is the consumerization of IT happening now? Its happening because, frankly, some consumer technologies are better than traditional enterprise software at helping people do their jobs. People work in more mobile and collaborative ways now than they did in the past, but enterprise software doesnt always meet these new needs. Todays popular mobile devices are faster and more intuitive than typical corporate-issued smartphones. Most cloud email services offer larger file attachment size limits, better search functions and easier-to-use interfaces than enterprise systems. And cloud storage and collaboration services dont require VPN [virtual private network] access, unlike corporate network shared drives. What are the major concerns for IT professionals? Security, security, security! Not to sound alarmist, but users today can access corporate systems from all sorts of devices and store corporate data everywhere from here to Timbuktu (or whatever the
How do you define the consumerization of IT? Its people using consumer technologies at work, often without their IT departments knowledge or permission. Most people think of the recent influx of personal smartphones and tablets into the business world, and thats a big part of this trend, but its not the only part. Consumerization also encompasses the use of the personal cloud: online email, productivity, storage and collaboration services that let employees transmit and store data outside the corporate network. If a project team creates a Facebook group to more easily share information, thats another example of consumerization. Really, any consumeroriented technology that people adopt
clouds version of Timbuktu is called). Sure, these device manufacturers and cloud services all claim to be secure, and they very well may be, but as an IT professional, you may not want to put your organizations security in the hands of a third party. Regulatory compliance also comes into play; if an employee accesses or stores protected data outside the corporate network, that alone can constitute a violation. Other problems can result from consumerization. If too many employees bring their own smartphones and tablets to work, for example, it puts a strain on wireless network resources. But security should be the top priority. What does BYOD mean, and whats its role in consumerization? BYOD stands for bring your own device. You may have also heard the terms BYOC and BYOPC, which stand for bring your own computer and bring your own PC. Different people have different definitions for these terms. Some say any organization where employees use their own computers, smartphones and tablets for work is a BYO shop. Others say BYO is a specific policy in which an organization gives users a stipend to buy their own devices in lieu of corporate-issued technology.
Either way, BYOD is the driving force behind consumerization. Managing, securing and delivering corporate applications and data to personal devices will be one of ITs biggest challenges in the coming years. If you could give IT professionals one piece of advice for dealing with consumerization, what would it be? At every conference or panel Ive attended since I started covering this trend, the same theme has emerged: Focus on managing data, not devices. There are so many smartphones and tablets out there, and they have different operating systems, hardware and carriers. Even if the tools existed to comprehensively manage them all, doing so would not be an enviable task. Plus, it would still leave data vulnerable in personal cloud services. Managing and securing data in the era of consumerization isnt exactly a piece of cake, either. You have to resolve a lot of questions concerning who can access which kinds of data and from where, then implement technologies to enforce those policies. But if you can establish and enforce these policies successfully, you wont have to worry about every single new device or cloud service on the market. n