BYOD is driving IT 'crazy,' says Gartner analyst
Computerworld - IT managers grappling with bring-your-own-device policies can expect to see an explosion in the number of smartphones and tablets used by employees in the next few years.
As a result, IT shops won't be able to provide the security necessary to protect company data, says Gartner analyst Ken Dulaney.
"The number of devices coming in the next few years will outstrip IT's ability to keep the enterprise secure," he said, adding that IT workers are "going crazy" and "get into fights" over whether users should have upgrades.
To help IT cope, software vendors should create what Dulaney called "beneficial viruses" that could be embedded in corporate data carried on mobile devices. These software tools would require users to have licenses in order to access files, just as digital rights management technology does with music and video files.
Beneficial viruses would also "be smart enough" to delete the sensitive data if a device is lost or stolen, or if data winds up on an unauthorized device, Dulaney said, adding, "It's time for the SAPs and Oracles to begin thinking about doing that, and it's a lot harder than we think."
Today, IT shops use mobile device management software to monitor which mobile users are authorized to access applications and whether they can access the data outside the corporate cloud.
Some companies are relying on a browser-based approach. American National Insurance Company, for instance, recently announced that it has extended PC-based customer information to mobile devices including iPhones, iPads and BlackBerry and Android devices. Agents can use mobile devices to search insurance policies and help customers sign up for insurance.
A Web-based approach was "the easier, quicker and right thing to do, and we didn't need to tap into the native device" to add applications, said Deanna Walton, assistant vice president of field systems for the insurance firm.
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Bring Your Own Device (BYOD) in Computerworld's Bring Your Own Device (BYOD) Topic Center.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- API Playbook: Drive API Adoption Through Developer Engagement Learn the best practices of how to engage developers, whether your goal is to attract external developers to your public APIs or improve...
- Leverage the Power of APIs to Turbocharge Your Mobile Strategy: 7 Steps to a Successful API Program In this guide, Intel® Services-which offers industry-leading API management solutions for over 150 top enterprises, including Best Buy, Netflix, Expedia, ESPN, and The...
- API Management: The Key to Improving the Consumer Travel Experience Join PhoCusWright's Senior Technology Analyst, Norm Rose, as he shares his insights on how travel suppliers and intermediaries can improve industry data flow...
- Tips to Simplify Database Administration and Development Make your job easier while getting the most from the leading productivity tool for database professionals. Learn tips from Dell Software's Oracle® ACE,... All Bring Your Own Device (BYOD) White Papers | Webcasts