Consumerization causes power struggle in the enterprise
Over the last couple of years, the balance of power has shifted from IT to users -- with lots of hand wringing over what could happen from a security standpoint.
A recent report from 451 Research called Getting Control of Mobile Management Disorder suggests there a number of ways to secure BYOD devices, but it comes down to choices IT makes about security.
In many organizations, users bring their own devices and they want access to enterprise software and content. They also want the ease of use they're accustomed to from consumer apps. And they don't want any security restrictions to affect overall device performance.
In short, they want it all.
Meanwhile IT wants something entirely different. They still see the pitfalls of putting enterprise content onto mobile devices outside the firewall. They want to keep that content secure and they want to reduce risk. At the same time, forward-thinking IT pros understand that they can't restrict users too much because they will balk and find ways to work around them.
It's created a classic battle between security and freedom.
Chris Hazelton, Research Director for Mobile & Wireless at 451 Research, who helped write the report, says the tension comes into play in a couple of ways. First of all, there is the question of how much influence IT has at an organization to drive policy. The second question is how much freedom users require to do their jobs in a changing marketplace. The last the thing you want to do is handcuff your company by making it difficult for employees to conduct business across mobile channels.
"In the end it comes down to balancing company needs around compliance and regulations and what users are willing to tolerate – this will change as IT in organizations that have regulation exposure and will have more power to mandate security policies on mobile devices. Those with little or no regulatory exposure will have less power, and so user needs will come first," Hazelton explained.
To complicate matters further, the management tools available to help secure mobile devices are also changing at a rapid pace, and IT pros need to be careful not to rely too heavily on any one tool as the market sorts itself out.
To quote the 451 Research report Hazelton helped write, "Mobile management technologies and services that are still gaining traction in the market are themselves being challenged by new alternative management and security approaches. For instance, mobile device management (MDM) for iOS and Android devices is a relatively new market – but it is under threat from mobile application management (MAM), secure containers and mobile virtualization, to name a few..."
As this happens though, Hazelton says, MDM and MAM vendors are beginning to support a range of services by offering functionality previously only found in competitor solutions. "MDM vendors are appropriating capabilities of MAM vendors, and the reverse is true. MDM vendors are adding tools to insure that as users move beyond mobile email -- to viewing and editing large amounts of data (likely from email attachments) -- that they remain viable," Hazelton said.
He explained that this is a challenge for IT as the classification of vendors changes on a near quarterly basis, and IT needs to identify company needs for securing users, devices, and data -- and understand how vendors of interest are evolving as this market segment moves forward. "The good news is that on the horizon, in 2013 we see the enterprise mobility management market becoming more defined, where strong players become better integrated, middle of the road players consolidate or are acquired, and the weakest drop off," he said.
These are not easy times to be an IT pro. Gone are the days of command control and we are into a greyer area where your organizational type and the requirements of users are going drive security policy. Finding that balance between security and freedom, while figuring out what tools are appropriate for your organization's unique needs, are going to be the biggest challenges for you moving forward. And all this is taking place in a landscape that seems to be shifting all the time.
This week, a National Transportation Safety Board judge dismissed a $10,000 fine that the U.S. Federal Aviation Administration had lodged against a photographer who had used a drone to take aerial photos for the University of Virginia. The judge found that the FAA hadn't actually issued any enforceable rules regarding the use of commercial drones.
If you've got a Windows XP machine -- either at home or in the office -- consider yourself lucky. In the past, you'd upgrade to a more recent Windows operating system without a thought. Today, you have many options.
It's designed for the 3.5 billion people who have feature phones today. It solves technical problems Google is not interested in and is a better fit for the pre-paid phones popular in developing countries. The only trick is getting developers on board.
The cloud has overcome a lot of its technical challenges, especially when it comes to security. But the biggest problems in cloud computing now are cultural.