Beyond BYOD: Companies need to change
Posted on 10 April 2013.
Organizations seeking to maximize the economic and productivity benefits made possible by mobile technologies must look beyond simply which devices are used and re-examine business processes and workforce needs, new research by CompTIA concludes.

"Rather than focus on the device level, companies will need to assess the specific needs of their workforce and match the device," said Seth Robinson, director, technology analysis, CompTIA.

"For maximum benefit, workflow changes will need to be considered prior to evaluating workforce needs. But this is not a trivial matter and companies will need to weigh the cost of operational disruption and change management against the potential advantages."

At this point, most companies are not taking these steps, according to CompTIA's Second Annual Trends in Enterprise Mobility study. Most of the current activity revolves around devices – provisioning, securing and allowing access to existing systems.

The majority of companies in the CompTIA study allow their employees to bring their own mobile devices to work. The most popular option is to have a mix of corporate-liable and individual-liable devices (58 percent). A full third of companies still strictly mandate which devices can be used for work purposes and do not allow any type of employee-provided device. For another 8 percent of firms, employees provide everything.

As employees bring their own mobile device into the workplace, they also want to bring their own applications and services. As a result, the field of Mobile Device Management (MDM) is rapidly shifting to include Mobile Application Management (MAM).

Companies are pursuing a range of solutions, including exploring/implementing virtual desktops (49 percent), building custom mobile apps for business systems (29 percent) and moving business applications to a cloud model that can be accessed through a browser (28 percent).

From an enterprise perspective, the mobile ecosystem – in conjunction with cloud offerings – presents a significant shift. Rather than having tight control over the entire experience, IT architects now must contend with devices that often serve dual purposes and connect to third-party systems.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th