5 consequences of poor BYOD management

Tablet-Eating-100-Dollar-BillBring your own device (BYOD) has slashed hardware and maintenance costs and fueled mobile productivity at companies large and small, and adoption is accelerating. Gartner estimates that by 2020, 45 percent of organizations will be all BYOD, while 40 percent will offer a mixed program, and only 15 percent won’t have any BYOD program in place.

But while BYOD can be a positive policy for numerous industries, it’s not going well for all organizations, especially those that have ignored the potential hazards associated with the policy.

Last year I discussed two unexpected consequences of BYOD, but since then the risks have expanded as available technology diversifies and new mobility demands arise. Here are five additional pitfalls of BYOD environments, and how organizations can avoid them: Continue Reading…

Tags: , , , , , , ,

3 tech megatrends that will redefine business in 2014

Gartner identified 10 strategic technology trends for 2014 at a symposium last fall, including mobile, the Internet of Everything, and cloud technology. As we enter 2014, several megatrends stand out from the rest, shaping the way we do business and accelerating the transformation of IT. It’s important to understand these trends beyond the buzzwords and marketing lingo. The key to preparing for tech’s imminent shift is recognizing the business drivers behind these changes and acknowledging their impact on the future of business.

Here are the megatrends that should be top of mind for IT departments and business owners alike:

Software-defined anything (SDx)

The traditional datacenter landscape has changed forever, leaving infrastructure abstracted and virtualized, delivered as a service. We’re seeing virtualization extend well beyond just computing, with storage and network virtualization quickly becoming the norm for most organizations.

This model holds true regardless of whether the infrastructure resides internally or in the cloud. Dependency on physical hardware is being eliminated as software manages everything, increasing flexibility and agility. As infrastructure becomes highly virtualized and moves toward the private cloud, traditional IT resources need to evolve or risk becoming irrelevant.

As businesses begin to consume infrastructure as a service, the skills required to architect and support these environments must evolve as well. Once infrastructure is fully abstracted and optimized, organizations can shift their focus to developing applications to support business outcomes. Continue Reading…

Tags: , , , ,

Everyone needs mobile device management, but nobody’s buying it

A study by B2B International recently highlighted the slow adoption of mobile device management (MDM) software. It revealed that only 11 percent of the companies surveyed had an MDM solution in place to ensure those employees with mobile phones and tablets are complying with corporate security policies. This tells us that even though the entire industry is talking about bring your own device (BYOD) programs, very few companies are correctly implementing them.

According to Gartner, this problem will only grow in the coming years, as the BYOD trend shows no signs of slowing down. Shortly after the B2B International study, Gartner predicted that over the next five years, 65 percent of enterprises will adopt an MDM solution. However, the B2B study suggests that companies aren’t embracing the challenge of securing corporate data on mobile devices.

Our experience in working with SHI customers integrating mobile devices into their enterprises show the accuracy of both of these studies — MDM adoption is slow despite heavy BYOD use.

The IT departments I talk to recognize this problem and want to manage their devices, but they’re having problems determining which solution is best for them. They don’t want to spend money on one solution, only to find out six months later it wasn’t the right fit.

The problem lies within the industry. There’s so much noise that people are becoming confused. There are hardware solutions for BYOD, and there are software solutions. Some solutions are touted by big-box security companies, while others are from no-name, angel-funded startups. Without the proper education, companies don’t know which solution to choose, and the problem falls to the wayside.

So today, I’d like to share the top-five pieces of advice I give my customers to help them pick the correct MDM solution for their organization: Continue Reading…

Tags: , , , ,