Posted by: mobilitycloud | January 2, 2012

Enterprise smartphone and tablet incursion to grow in 2012

Happy New Year and time to close the books on 2011 and start looking forward to 2012. As this Network World article suggests in 2012, BYOD (Bring Your Own Device) and Mobile Apps are a huge growth opportunity but learning to manage the user along with their device of choice is where companies need to spend their resources, which makes sense to most of us.  Now that Android tablets have gotten sexy to some degree due to the Kindle Fire selling off the shelves, this is adding to the mix with the iPad that CIO’s need to be aware of and how they plan on securing their data infrastructure with Mobile Device Management apps. Here’s to a great start to 2012 and Let’s Go Mobile!

BYODs and their mobile apps need to be managed because they’re the single biggest source for malware and security breaches

                   By       Brad Reed, Network World December 23, 2011 06:04 AM ET

Workers bringing their own devices to work was one of the biggest challenges IT departments faced in 2011… and in 2010… and in 2009 as well. And guess what? It’s going to be one of the biggest challenges in 2012 too.

And now that the Kindle Fire has made Android tablets more popular, IT departments can only expect to see a wider array of new devices coming to work in the coming months. Forrester Research analyst Christian Kane says this wide variety of new devices is leading some companies to rethink how they manage mobility in the enterprise by managing access instead of devices.

“In general, there’s a concept right now that you should start managing the user rather than managing the device,” he says. “So you should understand that workers can use one type of device at home and another type at work but you’ll still give them access to the applications they need.”

What this means for users, says Kane, is that the company will let them bring any device they want to work but it won’t take   responsibility for repairing that device if it gets broken or replacing it if it gets lost. Rather, the job of the enterprise   will be to provision access to certain applications that the user needs on their phone and to ensure that enterprise applications   are effectively walled off from whatever other applications that users may download onto their own devices.

“Apps need to be controlled and monitored because they’re the single biggest source for malware and security breaches,” says   Dan Croft, the CEO of wireless administrative services provider Mission Critical Wireless. “I know there are all kinds of cool apps that people want to   download. But once you download an app to a tablet you need to be confident that the app isn’t going to be conducting activities   that could hurt the company.”

There are a few ways that companies can get a handle on this, both of which will require some investment. The first way is   for companies to build up their own private clouds to exclusively handle data used by enterprise apps. SAP CIO Oliver Bussmann   says that private clouds will give companies the ability to effectively segregate sensitive data while still ensuring that   workers have easy access to it on their mobile devices.

“A lot of companies are grappling with how to provide access to sharing for documents across all mobile and desktop platforms   because there’s a challenge right now if everything can be moved to a public cloud,” he says. “So you need to find a solution   that provides that kind of functionality in your own private cloud. With mobile device management software, for instance,   we now have the opportunity to block users from putting documents onto iCloud or other public clouds.”

The second solution for companies looking to get a handle on mobile applications is to simply build their own mobile app stores   that workers can use to get all approved applications for company use. This can ensure that companies can preapprove popular   apps for users and thus know exactly what apps have access to their corporate network. And as Croft notes, companies will   want to keep their workers using their own app stores by offering a wide array of popular games and non-work apps so that   you create a “user-friendly environment to have apps that can be fun and not just business apps.” In other words, companies   should expect to support Angry Birds and Fruit Ninja on their company stores along with mission-critical productivity apps.

The last big way for companies to protect their data across multiple device types and platforms is by making sure the data   itself knows where it does and doesn’t belong. Gartner analyst Ken Dulaney says companies should consider using digital rights   management (DRM) techniques to tag data so that it will automatically delete itself if it’s sent to a place where it could   be copied or stolen. So if a worker accidentally uploads a sensitive document onto iCloud instead of the company’s private   cloud, the document will automatically destroy itself as soon as it recognizes it’s been placed in iCloud.

“You use DRM techniques to arm the data to know where it is and what to do when it’s in someplace it doesn’t belong,” Dulaney   explains. “The data has to become smart, it has to say ‘I’m in a room that doesn’t look like normal office room and I’m going   to delete myself.'”

The bottom line, though, is that companies will continue facing major challenges with workers bringing their own devices to   work and it’s likely to remain a hot topic for IT departments heading into 2013 as well. The good news, says Kane, is that   companies are increasingly investing in the sorts of tools that will allow users to take more responsibility for managing   their own devices, thus freeing up IT departments to work on more valuable tasks that don’t involve babysitting users who   leave their iPhones in bars late at night.

“Many companies are transitioning to bring-your-own-device programs that let users access enterprise app stores, that give them the responsibility of wiping their own devices when they get lost, and that let them interact with their coworkers in   company-sanctioned forums to discuss the best apps to use,” he says. “It’s become a shared responsibility and it has to be   managed that way.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: