HOME         •        SAMPLES        •        CONTACT        •        BLOG

Blog Topic:
The Consumerization of IT

Topics

Social media has become an integral part of consumer technology—and an increasing number of employees are bringing mobile devices that enable collaborations into the workplace. This is just one example of how the consumerization of IT is changing the way companies do business. As SMBs grapple with the increasing prevalence of a mobile workforce—laptop, smartphone, and tablet users—they face a unique set of issues. Controlling the sheer number and diversity of mobile devices in the workplace, ensuring data security along with infrastructure integrity, and combining social media with business processes represent significant challenges. On the positive side, SMBs acquire immediate access to innovative technology and applications, increased workplace collaborations, and cost savings due to employee-owned devices, to name a few.

Employees are excited about the potential of using their own mobile devices in the workplace. However, an increasing number of SMBs understand the need to manage and track the growing proliferation. Recent research by Nemertes Research indicates that SMBs have achieved a high level of success implementing mobile device management (MDM), and the statistic is the same (4.0 on a 5.0 scale) for the number of SMBs planning future MDM platform implementation.

In addition, while 42.9 percent of small businesses employ device-purchasing plans for workers, research shows that the trend is moving toward manager- and employee-based purchasing choices. It’s become an accepted fact that bringing your own device to work (BYOD) has its advantages; user comfort, social media access for business tasks, and near 24/7 responsiveness all translate to increased user productivity. Another statistic offered by Nemertes indicates that 88 percent of employees are permitted personal use of a company device. The expectation is that you’re an adult and that employees will adhere to corporate guidelines when using their devices.

However, the consumerization of IT also presents SMBs with a range of new issues. The increased use of smart devices in the workplace poses significant control and support problems for IT. Data security is a central issue because corporate information can be compromised through lost or stolen technology. Mobile devices, especially laptops, also increase the possibility of malware infiltrations and viruses that can quickly spread throughout a network. Moreover, rampant device disorganization requires an already overextended IT to systematize and monitor an ever-expanding range of devices.

In the past, IT dealt with mobile device issues by creating ad-hoc security containers. This is particularly true in the case of corporate-wide BlackBerry use and BlackBerry Enterprise Software (BES) used in conjunction with Good Technology tools. Over time, it was executives who were responsible for introducing smartphones and tablets into the workplace. The issue was further complicated because these executive devices often contained the most sensitive corporate data. Email leaks, data loss, and lost or stolen devices represented serious security breaches that IT needed to resolve. The introduction of third-party MDM solutions represented the means for gaining much-needed device control over unsecured mobile technology.

Recent research by Nemertes indicates that 23.1 percent of SMBs have already deployed MDM platforms to improve IT management. MDM provides IT with a range of choices for implementing the specific levels of security a company requires. It allows IT to lock down device functionality, limit access, guard against security breaches, and protect data. For users, such restricted usage introduces a quid pro quo factor in which most will accept certain limitations in order to have the flexibility of using their own mobile device. It becomes a trade-off between feature capability and the fact that IT is allowing a personal device to be used in the workplace. In terms of restricting certain features, such as disabling device cameras, most employees are already aware of what is permissible activity in that organization, especially if it’s within the finance, healthcare, or government sectors.

Although the consumerization of IT poses significant challenges for corporate leaders and IT, there are additional benefits, too. These include accelerated business communications (managing contacts, email, social media, calendaring, etc.) and Web application access. In addition, smart device owners will often use device vendors for support, reducing the pressure on IT. The cost savings this represents for small enterprises should not be overlooked and can be substantial. A technology refresh (TR), which is the periodic replacement and updating of system components offered by the consumerization of IT, enables smaller companies to stay current with a constantly changing security landscape. It also enables these companies to meet the evolving needs of customers and to offer business practices that reflect the online reality of today’s consumers. Finally, resolving various mobile usage issues with MDM means that IT can focus on developing other technologies, such as software as a service (SaaS), cloud, and virtualization initiatives, which represent the next wave of effective tools and resources for SMBs.

Increasingly, knowledge workers today expect instant online access via the types of laptops, smartphones, and tablets they use outside of work. IT’s ultimate goal is to harness the trends behind consumerization that will increase employee engagement and productivity while alleviating their own tech burden. Approaches such as company-wide blacklisting of social networking sites like FaceBook and similar restrictive policies for corporations without an MDM system in place are no longer viable in today’s business environment. Moreover, these kinds of policies can create larger security concerns because employees will invariably find ways to circumvent them.

As companies seek to bridge the divide between work and home environments, and the different levels of technology found there, they need to have clearly articulated technology policies that will support workers while maintaining corporate security. The consumerization of IT has shown how IT departments are at the forefront of creating that bridge. In many respects, the door has already opened and mobile device use is a factor in today’s business environments. The challenge now is for IT to become a multi-pronged technology enabler instead of simply a restrictive support service.











Kerry Doyle 2011 All Rights Reserved