The BYOD dilemma
Though, traditionally IT departments determined the technology issued to employees and the policies strictly governing their use; an office-bound, limited approach is no longer practical in today’s highly connected, mobile, environment. Security threats are growing in volume and sophistication at an alarming rate. In 2010, security researchers uncovered close to 100,000 new malware samples per day— more than one per second!
So what can CIOs do to ensure protection of data when it is transmitted over personal devices? Well the first thing would be to deploy end-point device that best meet individual use cases and increases end users productivity in your environment. Next it would be advisable to secure corporate data according to updated security policies and regulatory requirements all the way from the datacentre to the endpoint device, and it might also be a good idea to optimise the deployment and management of all end point devices across the enterprise.
What most IT players need to understand is that end user computing is no longer just about device or technology, it is a much more consumer centric approach, it is about maximising productivity and enabling consumers to enjoy an always connected lifestyle. A testament to the fact is devices like the Dell XPS 13 that have been created keeping the consumer in mind. So not only are these
Be the first to comment.