Access "Consumerisation of IT: How to strategise enterprise device management"
This article is part of the May 2012 issue of NAC technology evolves in a BYOD policy world
With the growing popularity of mobile communication devices and consumerisation of IT, the traditional “one-size-fits-all” enterprise device strategy is likely to fail. In this tip, business and technology expert Clive Longbottom explains why it is important now more than ever to revise your IT strategy and to develop a sound plan for managing devices. Shrinking devices; growing problems Life used to be so easy when certain computer workloads were carried out on a central device (a server) and the results of the workload were accessed through an endpoint that did very little itself (a terminal). Personal computers didn’t radically change how information was managed. Although the end-point device became intelligent and was able to store information, it remained “tethered” to a fixed position. Then we saw the development of ever-smaller mobile devices. First, it was the luggable; then the laptop; then the rise (and fall) of personal digital assistants (PDAs); and now the evolution and rise of smartphones and tablets. Problems introduced with those devices, ... Access >>>
Premium Content for Free.
Consumerisation of IT: How to strategise enterprise device management
by Clive Longbottom, Contributor
Amid the rising consumerisation of IT, the traditional “one-size-fits-all” strategy can fail. IT must develop an open approach to consumerisation of devices and use VDI.
- Consumerisation of IT: How to strategise enterprise device management by Clive Longbottom, Contributor
Taking control of smartphone proliferation while avoiding user anarchy
by Ron Condon, UK Bureau Chief
With smartphone proliferation raging through companies, IT teams are turning to MDMs to keep corporate data safe. Are current MDMs up to the task?
European river managers delve into new knowledge management system
by Brian McKenna, News and Site Editor
The UK’s Environment Agency has procured a semantic wiki based knowledge management (KM) system to aid river restoration across Europe.
- Taking control of smartphone proliferation while avoiding user anarchy by Ron Condon, UK Bureau Chief
More Premium Content Accessible For Free
Social Engineering in IT Security
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
Gartner: Digital transformation: How to survive the information crisis
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...
Deloitte CIO Survey 2014
Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.