IBM opens up smartphone, tablet support for its workers
Up to 200,000 IBM workers will bring their own phones for work
Computerworld - IBM has embraced -- nearly -- the growing "bring your own device" trend of allowing employees to buy and use their own smartphones and tablets for work tasks, said IBM's CTO for mobility, Bill Bodin.
By the end of the year, 100,000 IBM employees will be able to connect handheld devices of their choosing to IBM's internal networks, which have recently been fortified to provide enhanced mobile security, Bodin said in an interview with Computerworld. Another 100,000 employees will be brought on board in 2012, for a total of 200,000 people, or about half of IBM's global workforce.
Based on recent consumer buying trends, Bodin said he expects that the majority of those 200,000 workers will pick an iPhone, an Android smartphone or a tablet. The employees will pay for their own devices and monthly service plans, but they will receive IBM's guidance and technical support.
Users will also be required to load IBM's agent software on their gear for secure access to IBM's systems, email and other functions.
Initially, IBM workers will have email, contacts and calendar access through IBM Lotus Traveler, Bodin said. In addition to installing agent software on each device, IBM will enhance security through the use of VPNs and by requiring passwords for access to systems. The company will also deploy endpoint management tools that will allow IT managers to wipe data off devices that are lost or stolen.
"We've noticed BYOD [bring your own device] and the consumerization of IT, with devices now becoming more and more proficient," said Bodin, a 24-year IBM veteran who started as a staff programmer. "At IBM, it's not exactly the BYOD metaphor. Rather, we are taking steps to fortify the infrastructure and device management -- all the way to agents on the phone itself -- to guarantee that the phone has not been hacked or jail-broken, and that the phone, with integrity, can attach to our network." IBM didn't disclose the cost of the mobile infrastructure upgrades.
The BYOD trend is widely recognized by analysts, who have noticed that even if a company requires its employees to use a specific smartphone for work tasks, some workers will circumvent the requirement and bring in a second phone of their choosing to do some of their work. According to a recent Forrester Research survey, more people are bringing their own devices to work and more companies are supporting the devices that workers decide to use.
In addition to adopting an open mobile platform approach, IBM plans to allow its employees to choose from hundreds of smartphone and tablet apps available on public application storefronts. They can also get software from IBM's WhirlWind app storefront, which launched in late 2010, Bodin said. In all, IBM users have downloaded about 35,000 apps from WhirlWind.
WhirlWind contains about 400 third-party apps approved for IBM use, as well as 100 apps built internally for IBM employees, Bodin explained. One app provides a catalog of all the software IBM makes, while another helps IBM sales personnel find experts in the far-flung global IBM workforce to help answer customers' questions. An app called Blue Pages, IBM's internal Facebook-style social network, gives users one-click email access to any other IBM employee.
Consumerization of IT
- With BYOD smartphones on the rise, IT headaches will become migraines
- Apple plays defense and offense with free software, upgrade strategies
- The three extremes of corporate BYOD policies
- IT departments won't exist in five years
- The time is right for an 'IT petting zoo'
- The next corporate revolution will be power to the peons
- Dual persona smartphones non grata at Starz
- Google Glass breaks into business
- BYOD, or else. Companies will soon require that workers use their own smartphone on the job
- 'Dual personality' could morph into Jekyll and Hyde for Samsung and BlackBerry
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Smartphones White Papers | Webcasts