BYOD is driving IT 'crazy,' says Gartner analyst
Computerworld - IT managers grappling with bring-your-own-device policies can expect to see an explosion in the number of smartphones and tablets used by employees in the next few years.
As a result, IT shops won't be able to provide the security necessary to protect company data, says Gartner analyst Ken Dulaney.
"The number of devices coming in the next few years will outstrip IT's ability to keep the enterprise secure," he said, adding that IT workers are "going crazy" and "get into fights" over whether users should have upgrades.
To help IT cope, software vendors should create what Dulaney called "beneficial viruses" that could be embedded in corporate data carried on mobile devices. These software tools would require users to have licenses in order to access files, just as digital rights management technology does with music and video files.
Beneficial viruses would also "be smart enough" to delete the sensitive data if a device is lost or stolen, or if data winds up on an unauthorized device, Dulaney said, adding, "It's time for the SAPs and Oracles to begin thinking about doing that, and it's a lot harder than we think."
Today, IT shops use mobile device management software to monitor which mobile users are authorized to access applications and whether they can access the data outside the corporate cloud.
Some companies are relying on a browser-based approach. American National Insurance Company, for instance, recently announced that it has extended PC-based customer information to mobile devices including iPhones, iPads and BlackBerry and Android devices. Agents can use mobile devices to search insurance policies and help customers sign up for insurance.
A Web-based approach was "the easier, quicker and right thing to do, and we didn't need to tap into the native device" to add applications, said Deanna Walton, assistant vice president of field systems for the insurance firm.
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Bring Your Own Device (BYOD) in Computerworld's Bring Your Own Device (BYOD) Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
MDM and beyond: Rethinking mobile security in a BYOD world
Regardless of who purchased the mobile device, if it's being used for
business purposes, it needs to fall under IT's umbrella of protection.
Delivering Enterprise Information Securely on tablets & smartphones
A technical how-to guide-updated for Android 4.2,iOS 6.1, and Windows
Phone and Surface 8
- Best Practices for Making BYOD Simple and Secure BYOD goes mainstream: Formalizing consumerization-and getting it under control
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Bring Your Own Device (BYOD) White Papers | Webcasts