technology and mobility that impact how people work, interact, collaborate, study and learn. The proliferation of devices such as smartphones, tablets and high powered portable notebooks, combined with the pervasiveness of social media and its increasing impact on corporate brand and sales have caused lines to blur between personal and professional life.
Students stream lectures over personal computers while simultaneously checking their Facebook page on their mobile phone, while employees check email, tweet and blog from coffee shops and airports. Whether logging onto the university’s online library or the corporation’s collaboration tool, limitless access, flexibility and mobility define today’s end user computing environment and underscore the expectations of end user.
However in today’s time of unlimited access, the need for security is greatly undermined. Accessing secure data over unsecure networks can be potentially fatal for organisations. As a result, CIOs need to address two fundamental end user computing challenges, in order to truly make BYOD the next big thing—providing secure, anytime access to an increasingly remote and mobile workforce, and managing the burgeoning diversity of devices, applications, platforms and operating systems needed to run their organisation.
Though, traditionally IT departments determined the technology issued to employees and the policies strictly governing their use; an office-bound, limited approach is no longer practical in today’s highly connected, mobile, environment. Security threats are growing in volume and sophistication at an alarming rate. In 2010, security researchers uncovered close to 100,000 new malware samples per day— more than one per second!
So what can CIOs do to ensure protection of data when it is transmitted over personal devices? Well the first thing would be to deploy end-point device that best meet individual use cases and increases end users productivity in your environment. Next it would be advisable to secure corporate data according to updated security policies and regulatory requirements all the way from the datacentre to the endpoint device, and it might also be a good idea to optimise the deployment and management of all end point devices across the enterprise.
What most IT players need to understand is that end user computing is no longer just about device