{"id":18841,"date":"2013-03-21T21:16:40","date_gmt":"2013-03-22T01:16:40","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-07-04T15:05:53","modified_gmt":"2021-07-04T19:05:53","slug":"tablet-info-7-2","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/tablet-info-7-2\/","title":{"rendered":"Tablet Info"},"content":{"rendered":"<h3><a title=\"Outside the office, workers turn to the tablet over the PC\" href=\"https:\/\/web.archive.org\/web\/20121105182033\/http:\/\/gigaom.com:80\/mobile\/survey-outside-the-office-workers-turn-to-the-tablet-over-the-pc\/\" target=\"_blank\" rel=\"noopener noreferrer\">Outside the office, workers turn to the tablet over the PC<\/a><\/h3>\n<p><a title=\"Outside the office, workers turn to the tablet over the PC\" href=\"https:\/\/siliconangle.com\/2012\/05\/10\/byod-users-cant-be-trusted-report\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"border: 0px none; margin-left: 2px; margin-right: 2px;\" title=\"Outside the office, workers turn to the tablet over the PC\" src=\"https:\/\/i0.wp.com\/siliconangle.com\/files\/2012\/05\/ipad-for-work-and-play.jpg?resize=119%2C79\" alt=\"Outside the office, workers turn to the tablet over the PC\" width=\"119\" height=\"79\" \/><\/a>Tablet computing is not overtaking <a title=\"Smart phone\" href=\"https:\/\/web.archive.org\/web\/20180907144717\/http:\/\/www.wikinvest.com:80\/concept\/Smart_phone\" target=\"_blank\" rel=\"noopener wikinvest noreferrer\">smartphones<\/a> or PCs in the enterprise, but they\u2019re definitely carving a new business niche for themselves a <a href=\"https:\/\/web.archive.org\/web\/20151007163912\/https:\/\/www.surveymonkey.com\/sr.aspx?sm=3JtqBHlxTcB7GvxfTjuTNxSJNRH7J8LA5Xvt9DGe8RM_3d\" target=\"_blank\" rel=\"noopener noreferrer\">survey<\/a> conducted by cloud content management firm <a href=\"http:\/\/www.alfresco.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Alfresco<\/a> shows. According to the data <a href=\"https:\/\/web.archive.org\/web\/20121105182033\/http:\/\/gigaom.com:80\/mobile\/survey-outside-the-office-workers-turn-to-the-tablet-over-the-pc\/\" target=\"_blank\" rel=\"noopener noreferrer\">cited by<\/a> <a href=\"http:\/\/gigaom.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>GigaOM<\/em><\/a>, tablets have replaced the PC as the go-to workstation for working at home and on the road.<\/p>\n<p>The Alfresco <a href=\"https:\/\/web.archive.org\/web\/20151007163912\/https:\/\/www.surveymonkey.com\/sr.aspx?sm=3JtqBHlxTcB7GvxfTjuTNxSJNRH7J8LA5Xvt9DGe8RM_3d\" target=\"_blank\" rel=\"noopener noreferrer\">study<\/a> found that staff is using tablets:<\/p>\n<ul>\n<li>48% of enterprise employees are using tablets after hours at home,<\/li>\n<li>55% of respondents use tablets at business meetings (vs. 24% using PCs),<\/li>\n<li>50% are turning first to slates at conferences, compared to 13% using their laptops.<\/li>\n<\/ul>\n<p>Alfresco reported that employees prefer the smartphone at more informal business functions<\/p>\n<ul>\n<li>57% using them at business lunches and<\/li>\n<li>51% using them in coffee shops.<\/li>\n<\/ul>\n<p>But the tablet is also starting to become commonplace even in those more casual settings: 34% of respondents said they would haul out their slate at a lunch meeting, while 43% would do the same in a coffee shop.<\/p>\n<p>The Alfresco data indicates that the 3-screen reality is coming true. Tablets aren\u2019t replacing either smartphones or laptops, but are instead creating a new space in-between. The vendor says it\u2019s pretty clear that laptops are increasingly tethered to the desk or cube, while tablets are the tool of choice on the go.<\/p>\n<p><em><strong>RB-<\/strong> This has huge implications on the support side of the equations<\/em><\/p>\n<h3><a href=\"http:\/\/blog.zeltser.com\/post\/3361723729\/mobile-devices-enterprise-security\">Incorporating Tablets into Enterprise Security<\/a><\/h3>\n<p><a title=\"Incorporating Mobile Devices into Enterprise Security\" href=\"https:\/\/web.archive.org\/web\/20140821190027\/http:\/\/www.astd.org:80\/Publications\/Magazines\/TD\/TD-Archive\/2012\/06\/Creating-a-Viable-Mobile-Learning-Strategy-Remains-a-Challenge\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"border: 0px none; margin-left: 2px; margin-right: 2px;\" title=\"Incorporating Mobile Devices into Enterprise Security\" src=\"https:\/\/i0.wp.com\/s3.amazonaws.com\/files.astd.org\/TD-Article-Images\/2012\/06\/Research.png?resize=69%2C104&#038;ssl=1\" alt=\"Incorporating Mobile Devices into Enterprise Security\" width=\"69\" height=\"104\" \/><\/a>Enterprise information security hasn&#8217;t caught up with the <a title=\"Consumerization\" href=\"http:\/\/en.wikipedia.org\/wiki\/Consumerization\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">consumerization of IT<\/a> according to <a title=\"Lenny Zeltser\" href=\"http:\/\/zeltser.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lenny Zeltser<\/a> in a recent <a title=\"blog.zeltser.com\" href=\"http:\/\/blog.zeltser.com\/post\/3361723729\/mobile-devices-enterprise-security\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> on the<a href=\"http:\/\/blog.zeltser.com\/\"><em> Lenny Zeltser on Information Security blog<\/em><\/a>. The author states that the urgency with which organizations need to account for consumerization is driven by modern mobile devices such as Apple iPhones and iPads.<\/p>\n<p>Enterprises are coming to terms with the idea of employees connecting to the <a title=\"Campus network\" href=\"http:\/\/en.wikipedia.org\/wiki\/Campus_network\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">corporate network<\/a> over a <a title=\"Virtual private network\" href=\"http:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">VPN<\/a>. Be it from personal laptops and home workstations according to the article. However, most organizations haven\u2019t looked at the effect that the proliferation of powerful mobile devices has on enterprise <a title=\"Security architecture\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_architecture\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">security architecture<\/a>.<\/p>\n<p>Mobile devices sometimes have VPN-like access to the corporate network. In most cases have access to the company\u2019s email contents, calendar, and address book. The devices are as powerful as laptops were just a few years ago. Yet, their operating system\u2019s security has not benefited from the test of time. Tablets and mobile devices lack most of the <a title=\"Security controls\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_controls\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">security controls<\/a> we\u2019d expect to find in a \u201clegacy\u201d workstation <a title=\"Operating system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Operating_system\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">OS<\/a>.<\/p>\n<p>Mr. Zeltser argues we need to understand how to model the threat vectors related to mobile devices and how to adjust the security of the <a title=\"Enterprise architecture\" href=\"http:\/\/en.wikipedia.org\/wiki\/Enterprise_architecture\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">enterprise architecture<\/a> accordingly. The measures will probably involve:<\/p>\n<ul>\n<li>Greater segmentation of the company\u2019s network,<\/li>\n<li>Treating any device that users interact with, whether it\u2019s a desktop or a <a title=\"Mobile phone\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_phone\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">mobile phone<\/a>, as an untrusted node,<\/li>\n<li>Standards and tools to lock down the configuration of mobile devices,<\/li>\n<li>Practices and technologies for managing vulnerabilities in applications and the OS of mobile devices,<\/li>\n<li>Incident response plans that incorporate both \u201clegacy\u201d <a title=\"Information technology management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Information_technology_management\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IT infrastructure<\/a> assets and mobile devices.<\/li>\n<\/ul>\n<h3><a title=\"BYO tech? Three ways business is getting it all wrong\" href=\"http:\/\/www.zdnet.com\/byo-tech-three-ways-business-is-getting-it-all-wrong-3040154691\/\" target=\"_blank\" rel=\"noopener noreferrer\">BYO tablet? Three ways business is getting it all wrong<\/a><\/h3>\n<p><em><a href=\"https:\/\/web.archive.org\/web\/20210420053433\/https:\/\/www.globalspec.com\/learnmore\/industrial_computers_embedded_computer_components\/mobile_computing\/tablet_pc\" target=\"_blank\" rel=\"byo three all business getting is it noopener tech? ways wrong noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"BYO tech? Three ways business is getting it all wrong\" src=\"https:\/\/i0.wp.com\/web.archive.org\/web\/20210504045644\/https%3A\/\/www.globalspec.com\/ImageRepository\/LearnMore\/201312\/ipad-mini-apple-official-photo5989d7d159f643459571ae840bd46939.png?resize=103%2C126&#038;ssl=1\" alt=\"BYO tech? Three ways business is getting it all wrong\" width=\"103\" height=\"126\" \/><\/a><a title=\"Silicon.com\" href=\"https:\/\/news.yahoo.com\/news\/news-website-silicon-com-set-112303524.html\" target=\"_blank\" rel=\"noopener noreferrer\">Silicon.com<\/a><\/em> had an article describing <a title=\"BYO tech? Three ways business is getting it all wrong\" href=\"http:\/\/www.zdnet.com\/byo-tech-three-ways-business-is-getting-it-all-wrong-3040154691\/\" target=\"_blank\" rel=\"noopener noreferrer\">Three ways businesses are getting BYOD all wrong<\/a>. The author claims the days of the standard work-issued<strong> laptop are numbered<\/strong> as businesses let staff <strong>use their own computers<\/strong> and gadgets in the workplace.<\/p>\n<p>However, in the rush to adopt<strong> bring-your-own tech<\/strong>, businesses are placing too many restrictions on how personal devices can be used at work according to Anthony Vigneron, collaboration services global manager at global law firm <a title=\"Clifford Chance\" href=\"http:\/\/www.cliffordchance.com\/home.html\" target=\"_blank\" rel=\"noopener noreferrer\">Clifford Chance<\/a>. He estimates that about 10 percent of firms&#8217; 7,000 staff share the same device at home and work.<\/p>\n<p>Mr. Vigneron described for <em>silicon.com<\/em> three ways businesses get it wrong when it comes to letting staff use personal devices at work.<\/p>\n<h4>Use sandboxing<\/h4>\n<p>Businesses are often advised to provide personal devices with <strong>secure access to corporate systems<\/strong> using <strong>sandboxed <a title=\"Virtual machine\" href=\"http:\/\/en.wikipedia.org\/wiki\/Virtual_machine\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">virtual machines<\/a><\/strong>. Sand-boxed machines allow remote access to corporate info via a virtual desktop that is run from the business&#8217; <a title=\"Google container data center tour\" href=\"http:\/\/www.youtube.com\/watch?v=zRwPSFpLX8I\" target=\"_blank\" rel=\"noopener youtube noreferrer\">data center<\/a>.<\/p>\n<p>He says it is better to let users access corporate data and apps from <strong>their device&#8217;s own OS<\/strong>. &#8220;<em>Trying to deliver applications within a sandbox is not what users want. That&#8217;s not <a href=\"https:\/\/web.archive.org\/web\/20110925033405\/http:\/\/www.silicon.com\/management\/cio-insights\/2011\/07\/14\/how-reed-exhibitions-is-surfing-the-consumer-it-wave-39747686\/\">consumerization<\/a>, that&#8217;s just another way of providing the same apps on different hardware,<\/em>&#8221; he said.<\/p>\n<p>&#8220;<em>People want to use the <strong>native applications<\/strong>. They don&#8217;t want to have to log in through some other system.&#8221; He concludes &#8220;The business should be able to control some of the applications staff use but you don&#8217;t want all those things inside another application.<\/em>&#8221;<\/p>\n<h3>Give them a choice<\/h3>\n<p>Mr. Vigneron argues that the line where <strong><a title=\"Work\u2013life balance\" href=\"http:\/\/en.wikipedia.org\/wiki\/Work%E2%80%93life_balance\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">work life<\/a> ends and private life<\/strong> begins is becoming increasingly blurred. So it doesn&#8217;t make sense to treat them as two separate entities. By not allowing workers to merge their work and home calendars, contacts, and emails, businesses are imposing an artificial distinction on their staff. He explains, &#8220;<em>You do want some separation &#8230; People want the choice of being able to work with the same interface.<\/em>&#8221;<\/p>\n<h4>Costs matter<\/h4>\n<p>Letting staff use their personal smartphone while working may seem like a good idea. However, employees might be in for an unpleasant shock when they get their <strong>phone bill.<\/strong> Mr. Vigneron said &#8220;<em>For companies to allow for consumerization, the price has to get to an equivalent of what we can get as a corporate. They&#8217;re not doing that at the moment.<\/em>&#8221;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.cio-today.com\/story.xhtml?story_id=86173\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Tablet Ownership Doubled this Year<\/a> (cio-today.com)<\/li>\n<li><a href=\"http:\/\/www.zdnet.com\/10-steps-for-writing-a-secure-byod-policy-7000006170\/\" target=\"_blank\" rel=\"noopener noreferrer\">10 steps for writing a secure BYOD policy<\/a> (zdnet.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20160418141512\/http:\/\/www.ceo.com\/technology_and_innovation\/marc-andreessen-byod-isnt-going-anywhere\/\" target=\"_blank\" rel=\"noopener noreferrer\">Marc Andreessen: BYOD Isn&#8217;t Going Anywhere<\/a> (ceo.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>in 2012 IDC says tablet sales grew 29% to 1.2 billion but have not passed sales of traditional PCs yet some analysts say that could happen by 2014<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[653],"tags":[3044,1242,1480,847,296,304,117,1059,1579,652,1580,686],"class_list":["post-18841","post","type-post","status-publish","format-standard","hentry","category-tablet-computing","tag-3044","tag-byod","tag-consumerization","tag-information-security","tag-ipad","tag-iphone","tag-laptop","tag-personal-computer","tag-post-pc-era","tag-tablet-computer","tag-virtual-machine","tag-virtual-private-network"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/18841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=18841"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/18841\/revisions"}],"predecessor-version":[{"id":131940,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/18841\/revisions\/131940"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=18841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=18841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=18841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}