One reliable prediction for 2013: BYOD still a bear for IT
It will be several years before a majority have a grip on bring-your-own-devices and related demands, says Gartner analyst
Computerworld - Next year could well be the year that many IT leaders finally start to get their mobile computing management house in order.
The process of integrating consumer smartphones, tablets and other devices into the workplace has been chaotic for many organizations, although there have been some notable accomplishments. Or at least, there have been some accomplishments in setting strategy, if not actual practice.
Nobody in IT boasts they have figured out the world of mobile computing with its constant influx of new smartphones and tablets that raise security and other management worries and pose the long-term potential need for storing data in the cloud.
IT shops have by now been wresting with the demands of the bring your own device (BYOD)-demand for several years, at least back to the introduction of the iPhone five years ago.
As with most complex technologies, it has taken more technology -- in the form of Mobile Device Management (MDM) or, more recently, Mobile Application Management,(MAM) for example -- to help organize the complexity.
"IT is still challenged by BYOD and MDM," Gartner analyst Phillip Redman told Computerworld. "They don't see any clear way to do that. They are trying to figure out policy, device strategies and app strategies. Devices also change so frequently -- just look at the iPad. There are still a lot of questions in the marketplace around all of this."
Redman predicted it will be several more years before a majority of enterprises have a better grip on BYOD and related demands. "It's a whole change in the way enterprises think about devices -- and PCs too," he said.
Redman said it's not so much that there's confusion when picking among more than 100 device management vendors, with some recently attaching application management capabilities. The bigger issue is how the enterprise and the device management vendor, once selected, plan to keep up with changes in mobile operating systems and architectures.
"If a new OS is popular, then MDM's ability can be pushed back," he said. "If Windows 8 grows or a thin client like Chrome grows or there's a new version of iPhone that's difficult for IT to support, who knows how effective the MDM will be?"
The effectiveness of device management, even with 10 top vendors selling 80% of the software, "could be moving backwards and forwards," as time progresses, Redman said, based on those market changes in OSes and devices.
One thing that could make things simpler for IT decisionmakers in 2013 is consolidation among MDM vendors that is expected to accelerate as time goes on.
Citrix announced in December plans to buy Zenprise to round out its mobile management offering, following Research in Motion's purchase of Ubitexx in May for iOS and Android device management. Likewise, traditional systems management vendor BMC Software in January announced plans to purchase Numara Software, Redman noted.
Consumerization of IT
- With BYOD smartphones on the rise, IT headaches will become migraines
- Apple plays defense and offense with free software, upgrade strategies
- The three extremes of corporate BYOD policies
- IT departments won't exist in five years
- The time is right for an 'IT petting zoo'
- The next corporate revolution will be power to the peons
- Dual persona smartphones non grata at Starz
- Google Glass breaks into business
- BYOD, or else. Companies will soon require that workers use their own smartphone on the job
- 'Dual personality' could morph into Jekyll and Hyde for Samsung and BlackBerry
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
MDM and beyond: Rethinking mobile security in a BYOD world
Regardless of who purchased the mobile device, if it's being used for
business purposes, it needs to fall under IT's umbrella of protection.
Delivering Enterprise Information Securely on tablets & smartphones
A technical how-to guide-updated for Android 4.2,iOS 6.1, and Windows
Phone and Surface 8
- Best Practices for Making BYOD Simple and Secure BYOD goes mainstream: Formalizing consumerization-and getting it under control
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Bring Your Own Device (BYOD) White Papers | Webcasts