Articles under the topic Enterprise Mobility
BlackBerry 10, the new mobile operating system from RIM is the company's final attempt to get back on track, say analysts. Once a leader in the smartphone market, it has relentlessly struggled to sustain its competitive advantage over other players. The company is gearing up for the launch of a new set of devices this week that will be running on its long-awaited mobile operating system.
IT departments will need to overcome three security hurdles as employees increasingly use applications and devices for work that were initially designed for personal use. Policies and tools put in place to deal with mobile devices offering consumer-grade security must be revised to deal with the devices that are under the control of the private users.
Rogue IT is permeating the organization through desktops, laptops, and tablets. Rogue IT is viral, unyielding, and for the most part unstoppable. Rogue IT is the name given to the informal, adhoc software and electronic devices brought by employees into their workplace. So as the CIO what do you do - embrace it, prepare for it, or try to control and ban it from your organization?
A study says that 600 million enterprise mobile users throughout the global business community want to be connected to their core enterprise systems via mobile devices. With enterprise mobility growing in a big way, the right application for your business can be the wild card which you have been waiting for. With the right integration strategy and delivery model, you can streamline mobile application development and deployment.
Employees today are much more particular about the deices they use. Taking a 360' view of the overall scenario, I feel that it would be somewhat unjust to put a check on employees bringing their own devices at workplace; rather organizations should call on for better and strict monitoring and user access management policies for ensuring a more secured and better control over BYOD.
Most large enterprises are opening up to the concept of Bring Your Own Device (BYOD). At CSC India, we are also in the midst of it, having rolled it out at the senior management level. We put the BYOD policy in place globally in May last year, and since then it has been a journey for us. Our focus has been on the security of data even as we make efforts to sensitize employees about the possible risks.
We would rather lose our cash-filled wallets today than our smartphones and iPads. These devices carry so much of our personal and business information, that losing any of this would be a security nightmare. The same stands true for businesses. The challenge today is to put in place a formidable security infrastructure and yet ensure that it does not hamper user productivity.
While we have given laptops and high-end devices to some of our employees, the feedback we got from them was that they should be allowed to buy the devices of their own choice and the company could pay for it. So in the next 3-4 months, we will be giving them a particular amount of money (that the management agrees to) to buy their own devices. Going forward, we will not have to worry about asset management. Instead, we will concentrate on security.
The "Consumer-Centric IT" is bringing traditional IT model to its knees. It is a powerful new way to work. We believe that this IT leap will transform organizations over the next three to five years and unleash a new wave of business productivity. Yet, most organizations are poorly prepared to capitalize on this resourceful movement.
Making life simpler has been our motto for our customers and employees. It's a well-known fact that as the organizations become big in scale and size, the manual processes become more cumbersome. As an enabler of technology in this environment, we have constantly innovated to ease the working environment.