iPads run amok: Does your company need a tablet policy?
"What the iPhone started to show us -- and the iPad is absolutely making clear -- is that these devices are coming in whether you like it or not," says Leslie Fiering, research vice president at Gartner. "That means that IT has its work cut out for them."
Specifically, industry experts and seasoned tech execs advise IT to do the following:
- Craft or amend usage policies to enforce security best practices for tablets, including use of multilevel passwords and device certificates, and the ability to remotely wipe the device if it is lost or stolen.
- Establish tiered access to network resources to secure critical data and applications.
- Re-architect application delivery mechanisms.
- Determine what levels of support IT will provide, depending on whether units are owned by the employee or the company.
If that list seems a bit daunting, read on to learn how enterprise IT managers have had success in trying to wrap their arms around the tablet.
Mobile device management to the rescue
In the early days, enterprise-level security for the iPhone was nonexistent, but that's not the case anymore. Apple's iOS 4.x for both the iPhone and iPad supports an array of fairly robust security features, including encryption, centralized management and remote data wipe.
Dozens of enterprise mobile device management (MDM) tools extend those capabilities to other smart mobile devices beyond the iPhone, enabling IT to do everything from remote configuration and policy setting to creating "enterprise sandboxes" -- secure virtual areas where personal data can be kept separate from corporate data using tools like passwords and encryption -- and performing remote wipes if a device is lost or stolen.
IT shops that already have such systems in place for smartphones are well positioned to address security and management concerns from day one of a tablet deployment.
Have your say
Tellabs is leveraging many such capabilities to manage a growing fleet of a couple hundred company-owned iPads. The firm delivers broadband access and network management services to telecommunications providers.
Tellabs' supply chain professionals, sales reps and other employees are using iPads to access email and calendars, as well as enterprise applications that allow them to approve customer shipments and provide better service.
In order to access those resources, however, users have to enter credentials that authenticate what applications and information can be accessed by specific users.
In addition to these safeguards, Tellabs also employs an "always connected" model, where applications work only when the device is connected to the mobile Internet.
"Data doesn't reside on the mobile device for offline access," explains Jean Holley, Tellabs' CIO. "This model prevents loss of corporate data and intellectual property. As the mobile Internet gets smarter and the coverage area continues to grow, we believe there will be minimal need for offline capability in the future."
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more