Tag Archive for BYOT

BYOD Notes

90% of Employees Use Personal Devices for Work

90% of Employees Use Personal Devices for WorkA survey by DELL Kace (DELL) found IT managers feel they lack the necessary tools to properly manage BTOD personal devices. In the study, IT managers revealed they are unable to effectively protect corporate data and intellectual property as well as ensure compliance. Help Net Security says key survey findings include:

  • 87% of companies have employees that use a personal device for work including laptops, smartphones and tablet computers.
  • 82% citing their concerns about the use of personal devices for business use
  • 64% revealed they are not confident that they know of all personal devices being used for business purposes
  • 62% specifically concerned about network security breaches
  • 60% reported a greater demand for support of Mac OS X since the introduction of the Apple (AAPL) iPad and iPhone
  • 59% reported their personal devices have created the need to support multiple operating systems (OS’s).
  • 32% revealed employees use unauthorized personal devices and applications to connect to their network

On the governance side:

  • 88% said they believe it is important to have a policy in place to support personal devices, and another 62 percent revealed their organization lacks the necessary tools to manage personal devices.

It’s absolutely essential that IT teams deploy a strategy that provides end-to-end management capabilities on a variety of operating systems to effectively protect networks and address the consumerization and personalization of IT,” said Rob Meinhardt, general manager and co-founder for Dell KACE.

Related articles

Security Monitoring for BYOD Environments

Security Monitoring for BYOD EnvironmentsUnlike other BYOD security solutions that force organizations to install software on every new device, Lancope’s StealthWatch System provides security for any device entering the network, without having to install more software on the device or deploy expensive probes. Help Net Security reports that StealthWatch performs behavioral analysis on flow data from existing infrastructure to deliver end-to-end visibility and security across an organization’s entire network.

Net flow data already exists in network infrastructure devices to monitor network and host activity. Since net flow is already in most network equipment, it provides a cost-effective tool for monitoring mobile devices. The article says flow-based monitoring can uncover external attacks like botnets, worms, viruses or APTs, as well as internal risks such as network misuse, policy violations and data leakage. It can also be leveraged for other efforts including regulatory compliance and capacity planning, and for ensuring high levels of network and mobile device performance.

Related articles

IT is Embracing BYOD

IT is Embracing BYODIT is Embracing BYODCisco says that IT is accepting, and in some cases embracing, “bring your own device” (BYOD). Help Net Security reports that the networking giant found that some of the pros and cons associated with allowing employees to use their own mobile devices on their employers’ networks has become a reality in the enterprise.

The Cisco (CSCO) study BYOD and Virtualization (PDF) found most enterprises are now enabling BYOD.

  • 95% of responding firms permit employee-owned devices in some way in the workplace.
  • The average number of connected devices per knowledge worker will grow from 2.8 in 2012 to 3.3 by 2014.
  • 76% of IT leaders surveyed categorized BYOD as a positive for their companies and challenging for IT.

The survey says employees are turning to BYOD because they want more control of their work experience:

  • 40% of respondents cited “device choice” as employees’ top BYOD priority (the ability to use their favorite device anywhere).
  • Employees’ second BYOD priority is the wish to do personal activities at work, and work activities during personal time.
  • Staff wants to bring their own applications to work: 69% of respondents said that unapproved applications, especially social networks, cloud-based email, and instant messaging, are more prevalent today than two years ago.
  • Employees are willing to invest to improve their work experience. Cisco employees pay an average of $600 out-of-pocket for devices that will give them more control over their work experience the report says.

The article says these findings underscore that BYOD is here to stay, and managers are now acknowledging the need for a more holistic approach, one that is scalable and addresses mobility, security, virtualization, and network policy management, to keep management costs in line while simultaneously providing optimal experiences where savings can be realized.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Gartner’s Top Tech Trends For 2012

GartGartner's Top Tech Trends For 2012ner VP David Cearley described their top ten strategic technology trends for 2012 to attendees of the Gartner Symposium IT/Expo. Gartner (IT) defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Here are Gartner’s top strategic technologies for 2012.

Gartner logoMedia tablets and beyond: Bring-your-own-technology (BYOT) at work has become the norm, not the exception.  By 2015 tablet shipments will reach around 50% of laptop shipments and Windows 8 will likely be in third place behind Google‘s (GOOG) Android and Apple’s (AAPL) iOS. The net result is that Microsoft‘s (MSFT) share of the client platform, be it PC, tablet, or smartphone, will likely be reduced to 60% and it could fall below 50%, Mr. Cearley says.

Apple iPadThe implication for IT is that the era of PC dominance with Windows as the single platform will be replaced with a post-PC era where Windows is one of a variety of environments IT will need to support. Gartner says it expects iOS/Android will dominate the market with 80% of tablets shipped by 2015. IT leaders need a managed diversity program to address multiple form factors, as well as employees bringing their own smartphones and tablet devices into the workplace.

Mobile-Centric Applications and Interfaces. User interfaces with windows, icons, menus and pointers which have been in place for more than 20 years are changing. The UI will be replaced by mobile-centric interfaces emphasizing touch, gesture, search, voice, and video. Applications themselves are likely to shift to more focused and simple apps that can be assembled into more complex solutions. By 2015 half the applications that would be written as native apps in 2011 will instead be delivered as Web apps.

The Internet of Things (IoT)Internet of Things: The Internet of Things (IoT) describes pervasive computing where cameras, sensors, microphones, image recognition, everything, is now part of the environment. In addition, increasingly intelligent devices create issues such as privacy concerns. Gartner says. Drivers of the IoT are:

  • Near Field Communication (NFC) payments allows users to make payments by waving their mobile phone in front of a compatible reader.
  • Embedded sensors which detect and communicate changes are being built into an increasing number of places and objects.
  • Image Recognition technologies identify objects, people, buildings, places logos, etc. that has value to consumers and enterprises.

App Stores and MarketplacesApp Stores and Marketplaces: Application stores by Apple and Android provide marketplaces where hundreds of thousands of applications are available to mobile users. Gartner forecasts that by 2014, there will be more than 70 billion mobile application downloads from app stores every year with an enterprise focus. With enterprise app stores, the role of IT shifts from that of a centralized planner to a market manager providing governance and brokerage services to users and potentially an ecosystem to support entrepreneurs. Enterprises should use a managed diversity approach to focus on app store efforts and segment apps by risk and value.

Big DataBig Data: The size, complexity of formats, and speed of delivery exceed the capabilities of traditional data management technologies; Gartner says it requires the use of new technologies simply to manage the volume alone. One major implication of big data is that in the future users will not be able to put all useful information into a single data warehouse. Logical data warehouses bringing together information from multiple sources as needed will replace the single data warehouse model.

Cloud Computing: This topic is still an important trend. It will become the next-generation battleground for the likes of Google and Amazon (AMZN). Going forward, enterprise IT will be concerned with developing hybrid private/public cloud apps, improving security and governance, Mr. Cearley says. While the market remains in its early stages in 2011 and 2012, it will see the full range of large enterprise providers fully engaged in delivering a range of offerings to build cloud environments and deliver cloud services. Oracle (ORCL), IBM (IBM), and SAP (SAP) all have major initiatives to deliver a broader range of cloud services over the next two years. As Microsoft continues to expand its cloud offering, and these traditional enterprise players expand offerings, users will see competition heat up and enterprise-level cloud services increase.

Cloud ComputingEnterprises are moving from trying to understand the cloud to making decisions on selected workloads to implement on cloud services and where they need to build out private clouds. Hybrid cloud computing which brings together external public cloud services and internal private cloud services, as well as the capabilities to secure, manage and govern the entire cloud spectrum will be a major focus for 2012. From a security perspective, new certification programs will be ready for the initial trial, setting the stage for more secure cloud computing. On the private cloud front, IT will be challenged to bring operations and development groups closer together using “DevOps” concepts in order to approach the speed and efficiencies of public cloud service providers.

Other key predictions Gartner had included:

  • Contextual and Social User Experience: Context-aware computing uses information about an end-user to improve the quality of interaction and anticipates the user’s needs and proactively serves up the customized content. By 2015, 40% of the world’s smartphone users will opt in to context service providers that track their activities with Google, Microsoft, Nokia (NOK), and Apple continuously tracking daily activities Mr.Cearley says.
  • The growing use of flash memory for In-Memory Computing is a long-term technology trend that could have a disruptive impact comparable to that of cloud computing.
  • The adoption of Extreme Low-Energy Servers built on low-power processors typically used in mobile devices will increase for non-compute intensive workloads or delivery of static objects to a website. Gartner says that 10%-15% of enterprise workloads are good for this.
  • Next-Generation Analytics Gartner says over the next three years, analytics will mature from structured and simple data analyzed by individuals to the analysis of complex information of many types (text, video, etc.) from many systems.
Related articles
  • Expecting a recession, Gartner urges ‘creative destruction’ (networkworld.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Notes

Tablet NotesTablet adoption is reportedly outpacing the take-up rates of smartphones, computers, mp3 players, or game consoles. Adoption is underway in a variety of sectors beyond the consumer segment, into retail, industrial, education and business. The demands for mobility and real-time access to data are driving the tablet market.  Sales are expected to exceed 147 million by 2015.

Microsoft: It’s Not Too Late To Win In Tablets

Microsoft logoThe financial geniuses at Citi (C) that brought us the housing bubble also believe that Microsoft (MSFT) can still win the tablets wars. The BusinessInsider cites a report by Citi that says despite being late into the market Microsoft can become “#2 behind iPad” for these reasons:

Tablets are too expensive – Citi notes gadgets need to fall below $300 before they really take off. Until they reach that cost, Microsoft has time to reach people who haven’t jumped on the iPad bandwagon.

Android tablets are not very good – Citi believes that Android tablets won’t take off like Google’s (GOOG) Android Smartphones.

Android faces legal challenges – Android tablet makers are already facing a bunch of intellectual property suits from Apple (AAPL), Nokia (NOK), Oracle (ORCL), and Microsoft. Citi thinks Microsoft is hoping for royalties of $7.50 to $12.50 per unit. That would erase some of the cost-advantage of shipping Android.

Apps – Microsoft has an army of 6 million .NET developers who could start developing touch-optimized apps for Windows tablets. Plus, Citi says Microsoft can make Office an exclusive for its tablet and exploit its Xbox business to offer exclusive big-ticket games.

Enterprise – IT departments already know how to deploy, update, and push apps out to Windows PCs, so a Windows-based tablet should be easier to deal with than other tablets. Microsoft will also probably make Office an exclusive to its tablets and could create a technology where a tablet can “extend” a PC by giving them access to locally stored files. Citi does note that the “bring your own device” trend might favor the iPad instead, but this trend is still in the early days and not proven.

Citi predicts that about 75 million tablets will ship in 2013 and that Microsoft will have a “meaningful share” of those.

GigaTrust Brings Enterprise Rights Management To Apple’s iPhone And iPad

GigaTrust logoGigaTrust, a publisher of Enterprise Rights Management (ERM) content protection software that enhances and extend Microsoft (MSFT) Active Directory Rights Management Services (AD RMS) announced the release of the GigaTrust for iPhone and iPad mobile devices. The product consists of a client and “Mobility Server” that enables persistent content protection for the Apple (AAPL) iPhone and iPad equivalent to that provided by GigaTrust for the Research In Motion’s (RIMM) BlackBerry smartphone and Windows Desktop according to DarkReading.

Reportedly GigaTrust for iPhone and iPad protects content at rest, in transit, and in use, allowing users to securely deliver and persistently protect emails while they are being read on the device. Additionally, iPhone and iPad users can apply GigaTrust protection to outgoing emails and email responses.

Mobile Security: The Great Misconception

Smartphone securityResearch from Kaspersky Lab shows that many users feel more secure using mobile devices than PCs to surf the Internet and that most consider the risk of losing personal data higher on computers than on their mobile devices. The report noted by ITnewsLink says there has been a recent increase in the number of attacks on mobile operating systems like Google’s (GOOG) Android and Apple’s (AAPL) iOS, and experts expect to see considerably more in the future. Despite this, users in the Kaspersky Lab survey feel more secure accessing the Internet via a mobile device.

In the survey, users consider the risk of losing personal data lower on a mobile device than on a PC – despite the fact that around a fifth of all smartphone users has already experienced the loss or theft of a mobile device. The majority of users reported they store personal data, such as photos, emails or contact details, on their mobiles. Around one-third also save login information, such as PIN codes or passwords, for services on their mobile devices, demonstrating a large gap between secure reality and user perception

Next! Turns Your iPad into a Real Productivity Tool

Leftturn Labs logoAppScout says Next! For iPad is proof that the iPad can do work The app is a getting-things-done (GTD) styled app that will help keep your projects organized, keep your tasks from overwhelming you, and keep you moving towards your goal.

Next! can help you organize your to-dos and projects. AppScout says it doesn’t have the same features as a project management suite like Microsoft Project, it’s perfect for those projects that are essentially a long series of tasks to be completed with due dates and dependencies for each of them.

You can take notes, store documents relevant to your project, and tag items that you want to review with others, all from your iPad. Next! will even serve as a light document management system, giving you a central place for all of your project-associated documents, images, and files that you’ll need to refer to as you do the work.

Since the app follows the GTD philosophy it allows you to create action lists based on when the tasks will be completed as opposed to an arbitrary priority list. Your tasks can be adjusted as they get nearer or come into focus. You also get overall project status and health bars that show how far you’ve progressed towards completing your tasks and how closely you’re tracking to your schedule.

Next! is available in the iTunes App Store for the introductory price of $9.99.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Most Firms Don’t Know Why They Use the iPad

Most Firms Don't Know Why They Use the iPadDespite the widespread success of the Apple (AAPL) iPad more than half of companies lack a clear iPad tablet strategy according to a recent survey by Dimensional Research. CNET’s Stephen Shankland points out the survey which found that “Most participants, 51 percent, indicated that they did not have a clearly articulated strategy.

iPadThe survey of 448 businesses found that:

  • 22% have already deployed tablets.
  • 22% plan to do so this year
  • 24% plan to next year
  • 20% have no plans to deploy tablets

Dimensional Research polled the firms on whose tablet they intend to deploy and found:

Ann All at ITBusinessEdge.com says the survey is an affirmation that the BYOT (Bring Your Own Technology) trend is not hype, 41% of survey respondents said individual employees were using tablets they had purchased themselves.

The research firm also found that 82% of firms will use tablets to complement, and not replace, laptops. This fact is not lost on IT Pros. 42% of IT staff said business stakeholders do not understand the need for more development like new front pages specifically for the iPad.

Many of the companies I’ve spoken with seem to discover multiple use cases they hadn’t imagined for tablets when they begin putting them into users’ hands. And new applications continue to emerge all the time.

What do you think?

What tablet has your firm deployed?

View Results

Loading ... Loading ...
Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.