Beyond BYOD: Companies need to change
Posted on 10 April 2013.
Organizations seeking to maximize the economic and productivity benefits made possible by mobile technologies must look beyond simply which devices are used and re-examine business processes and workforce needs, new research by CompTIA concludes.


"Rather than focus on the device level, companies will need to assess the specific needs of their workforce and match the device," said Seth Robinson, director, technology analysis, CompTIA.

"For maximum benefit, workflow changes will need to be considered prior to evaluating workforce needs. But this is not a trivial matter and companies will need to weigh the cost of operational disruption and change management against the potential advantages."

At this point, most companies are not taking these steps, according to CompTIA's Second Annual Trends in Enterprise Mobility study. Most of the current activity revolves around devices provisioning, securing and allowing access to existing systems.

The majority of companies in the CompTIA study allow their employees to bring their own mobile devices to work. The most popular option is to have a mix of corporate-liable and individual-liable devices (58 percent). A full third of companies still strictly mandate which devices can be used for work purposes and do not allow any type of employee-provided device. For another 8 percent of firms, employees provide everything.

As employees bring their own mobile device into the workplace, they also want to bring their own applications and services. As a result, the field of Mobile Device Management (MDM) is rapidly shifting to include Mobile Application Management (MAM).

Companies are pursuing a range of solutions, including exploring/implementing virtual desktops (49 percent), building custom mobile apps for business systems (29 percent) and moving business applications to a cloud model that can be accessed through a browser (28 percent).

From an enterprise perspective, the mobile ecosystem in conjunction with cloud offerings presents a significant shift. Rather than having tight control over the entire experience, IT architects now must contend with devices that often serve dual purposes and connect to third-party systems.





Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //