Enterprise IT now competing with apps stores, mobile devices
If IT pros won't deploy apps, users will find a work-around
Computerworld - NEW YORK - Tablet computing has become a top priority of Fortune 500 CIOs and will eclipse PC use by 2015, if not sooner. Email is becoming a legacy technology in the face of social media. And consumer app stores are offering collaboration and communications tools that have vastly outpaced enterprise apps.
Those trends are pushing IT shops to change, and change quickly, how they manage the growing number of devices and third-party apps their co-workers are using in the workplace, according to IT experts who spoke today at the Consumerization of IT in the Enterprise (CITE) Conference here.
"Users are getting access to an unlimited amount of applications ... and if they don't like that application they can throw it out and try another one," said Dion Hinchliffe, executive vice president of strategy at consulting firm Dachis Group. "It's very hard for traditional IT to compete with that."
Hinchliffe said that if enterprises don't begin developing their own internal app stores for employees to use, workers will find work-arounds that lack security and IT support. And if companies don't deploy internal social networking sites like those offered by Yammer, collaboration tools such as Salesforce.com or secure web browsers such as Dolphin, users will find their own.
But embracing a bring-your-own-device policy brings with it security concerns.
For Festo Corp., a producer of pneumatic and electric drive technology, it's about securing the data and not the device. The company is now in the midst of a four-month pilot iPad deployment.
Steve Damadeo, IT operations manager at Festo, said his company uses Microsoft HyperV to create a VDI environment for the iPads. For now, it allows him to secure the data and ignore the physical device. But he sees VDI as a stopgap measure that Festo will eventually move away from.
"We're a firm believer of secure the data and not the device," Damadeo said. "I don't care if you come with an iPhone, an Android, a laptop, a netbook, a tablet or whatever. We're interested in securing the data. If you focus on that, you can be a lot more flexible in your options.
"We believe in a two-tier approach. The first is enable basic access to it, and then get off the legacy application when possible," he said. "If I can provision it through VDI, it's no different than if you're accessing it through your laptop. However, beyond that we need to work into this idea of changing the idea of the way we handle applications."
For example, Festo custom built its sales force collaboration tool; it didn't buy from Salesforce.com. That custom app gave users access to the most frequent corporate data for sales purposes. But now, Damadeo is looking to connect data stores directly to the company's SAP CRM environment or to its Outlook and Exchange platforms.
Consumerization of IT
- Consumerization of IT in the enterprise starting to pay off
- With BYOD smartphones on the rise, IT headaches will become migraines
- Apple plays defense and offense with free software, upgrade strategies
- The three extremes of corporate BYOD policies
- IT departments won't exist in five years
- The time is right for an 'IT petting zoo'
- The next corporate revolution will be power to the peons
- Dual persona smartphones non grata at Starz
- Google Glass breaks into business
- BYOD, or else. Companies will soon require that workers use their own smartphone on the job
- Partners in Mobile Device Management: AirWatch & CDW When it comes to Mobile Device Management, it's not just what you know. It's who you know. That's why CDW partners with industry...
- Getting Agnostic about Mobile Devices The idea of being able to interact with customers, prospects, and stay attuned to competitive pressures is not new, but the velocity at...
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Mobile Device Management White Papers | Webcasts