Forrester lays out 10 reasons why IT shouldn't support the iPhone
Concerns about security, price, features trump popularity, ease of use
CIO - The Apple iPhone took the consumer mobile space by storm when it was released in June and quickly became one of the most popular smart phones available. Since then, business users who've purchased the device for their personal use have been asking their corporate IT departments to support it.
Whether the iPhone proves to be a valuable business tool or a nonissue for CIOs remains to be seen, but a new report from Forrester Research Inc. suggests that the iPhone may never get a chance to succeed in business. Forrester laid out 10 reasons IT departments should refuse to support the devices -- at least for now.
1. The iPhone Doesn't Allow Data to be Encrypted
There's currently no way for enterprises to secure sensitive data on iPhones through file or disk encryption, according to Forrester. There's also no way for IT to enforce password policies, since the decision to use a password -- and when to change it -- is up to the user.
2. The iPhone Does Not Natively Support "Push" Corporate E-mail or Wireless Calendar Syncing
Push e-mail that is delivered to handhelds upon receipt in a user's mailbox is an essential feature for a business device because of the productivity such a feature enables, Forrester said. If users need to physically retrieve messages -- instead of having those messages pushed directly to them -- they won't get them as quickly as possible, and they'll waste time in the process. The iPhone can sync with Microsoft Exchange and Lotus Notes over IMAP and SMTP, Forrester said, but IT infrastructure must be tweaked accordingly or a separate gateway product must be purchased -- and even then mail is delivered only every 15 minutes.
Apple's device also doesn't wirelessly sync with PCs, which means users must have access to the company's proprietary USB sync cable to retrieve calendar updates or contact changes, according to Forrester. If a meeting plan or location has been changed at the last minute, an iPhone user on the go could easily not get the notification in time.
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!