The new wave of handheld consumer devices in the workplace means new headaches for IT managers.
Computerworld - An IT manager wandering through the exhibits at a mobile and wireless computing expo might well wonder where the explosion of new applications and devices, many created for the consumer world, will lead.
How can a company even begin to manage live TV on cellular phones? How will the proliferating wireless e-mail be stored? How will it all be made secure, with so many different networks and devices and applications?
Companies have faced, and sometimes ignored, the demands of managing handhelds and wireless devices for years. IT managers waver between two approaches: Throw open the floodgates and try to accommodate what's coming, or throw up your hands and ban everything except what you deem acceptable.
But the problem will become more complex as new college grads arrive at work -- and bring the consumer-focused devices and applications they see not as toys but as essential tools they have integrated into their lives.
When a young "prosumer" (short for professional/consumer) shows up with streaming video clips, live broadcast TV and a whole range of instant messaging, collaboration and music-downloading options on his smart phone, how will IT hold the line on standards?
And if he wants to use the device for work-related e-mail, access to corporate databases or storage of corporate data, will IT restrict the access pathway? What happens when that worker resists using separate devices for work and personal life? Will IT allow frivolous functions to run on the same approved devices as mission-critical ones?
Analysts say that over the next two years, these and other scenarios will force IT managers into the roleof enforcer as never before. "The IT department has to do something about more and more consumer-type devices entering the enterprise," says Roberta Cozza, a U.K.-based analyst at Gartner Inc.
This will require careful planning at the highest management levels to develop policies that control devices and applications to limit security lapses and IT headaches while still winning the support of end users.
Some IT managers are already holding a tough line on handhelds and wireless devices, while others have tried to accommodate innovations.
"Why do we in IT care what that new hire just out of college wants to run on his phone or device?" says the assistant vice president of IT compliance at a Western bank. (She asked to remain anonymous because her company is in acquisition talks.) She believes the bank should ignore user pleas for consumer applications and set strict controls on devices and access.
"You have to protect the enterprise," she says. "You have to protect the customer. It's a
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more