The Financial Impact of Consumerization – You can’t manage what you don’t measure

Most Scrutinized BYOD Expense ItemsThe Consumerization of IT is a trend even the most parochial IT manager has surely heard of by now. It’s sweeping through enterprises across the planet with no regard for legacy, tradition or order and can be seen as either the most exciting or terrifying thing to happen to IT in the past decade, depending on where you stand.

For many IT managers, unfortunately, the prevailing attitude is still “why should I allow it?”. They are clinging on to the old paradigm whereby IT controlled and dictated the purchasing and ongoing management of technology used by employees. This attitude just will not stand any longer – consumerization is happening, and it needs to be managed in as financially efficient a manner as possible.

Read more of this post

Legal and technical BYOD pitfalls highlighted at RSA Conference

Companies that don’t protect themselves through policies place themselves at risk.

Post based on my interview* with Mikael Ricknas of Computerworld.

Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet.

Mobile security and BYOD (bring your own device) are main themes at the European edition of RSA’s security conference, which takes place this week in London.

Letting employees use their own smartphones or tablets for work represents a loss of control for IT departments. Also, if personal data isn’t handled correctly, the company may end up being sued, said Cesare Garlati, vice president of mobile security at Trend Micro and the moderator of a conference session called “The Dark Side of BYOD“.

Read more of this post

Smartphone Security Winners & Losers

Mobile Security Winners & LosersPost based on my interview with Jeanne Friedman, content manager for  RSA Conference.

In the mobile space the BYOD trend is becoming a minefield for IT administrators. Many companies have experienced a data breach as a result of an employee owned device accessing the corporate network. When the stakes are this high, corporate IT needs to know which platforms to allow and which to refuse.

Android is the most popular mobile platform in the world. It is also the most vulnerable to attack and in fact the most exploited. Contrary to common perception, Apple mobile devices are not immune to security flaws. And in fact less secure than Android if users “jail break” their devices – to escape Apple’s control.

Read more of this post

Advice for BYOD users: don’t be naive about mobile security.

Trend Micro interviews at the Mobile Convention Amsterdam 2012 reveal a shocking lack of education with regard to the security risks posed by mobile devices. Here is what you should know.

We all love our smartphones and tablets. And we all love those little mobile apps that make our devices so unique, useful, and fun. But have you ever thought about how safe they are? Should you trust your smartphone to shop online? Is it safe to access you bank account from your tablet? Is it ok to check your corporate email from your mobile phone? Should you trust the device manufacturer? Should you trust the app developer? Do you need mobile security software – as you know you do for your PC?

Read more of this post

BYOD: A Leap Of Faith For Enterprise Users? What has changed in the past year.

Post based on my remarks at Direction 2012 Conference* in Tokyo – August 7, 2012.

I’ve been talking about Consumerization and BYOD – bring-your-own-device – for quite a while now. What has changed in that past year since my presentation at the CIO Summit in Singapore?

What has changed is that more and more organizations are adopting BYOD. Executives and IT managers are learning about the benefits and the perils of BYOD first-hand.

Trend Micro has been working with industry analysts like Decisive Analytics and Forrester Research to take the pulse of IT decision-makers, to help us understand their challenges and what solutions we can offer. They also give us great insights into the state of the union of BYOD.

Read more of this post

Remote working during the Olympics: any new security risks?

What enterprises need to consider as large numbers of staff prepare to work away from the office.

Video post based on my interview* with Stuart Sumner of Computing – Part 1.

A large proportion of staff are set to work remotely this summer as the Olympic Games disrupt the UK’s transport networks. In a recent video interview, Stuart Sumner of Computing asked me whether remote working during the Olympics will create any new security risk for UK firms. My answer is I don’t think so.

Read more of this post

What’s in a Jelly Bean: is Android 4.1 going to help with BYOD?

Google recently announced Android 4.1 ‘Jelly Bean’ at its I/O conference in San Francisco. The latest flavor of the world’s #1 mobile OS promises better user experience and sexier UI. But does it really make any easier for IT to secure and manage those personal devices used for work?

Generally speaking, 4.1 is an incremental release that takes Android one step closer to Apple iOS, which has been in the market for 5 years now. From a corporate IT perspective, nothing is dramatically different or better.

Read more of this post

BYOD – Bring Your Own Device

Where employees once enquired about private medical cover and company cars, now they may ask to work on their own iPhone or Android. It’s a perk of the job that can boost productivity, but implement your BYOD policy incorrectly (or even pretend it’s not happening) and it could cost you dear, say our experts

Post based on my interview* with Richard Dunnett of Director Magazine

Read more of this post

Managing consumer technology in the enterprise

“Corporate IT needs to change mindset to better support the business “

Talking regularly* about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are too important to ignore.

The problems boil down to a lack of control, which can be described in two key ways. IT departments of course are built on policies, planning and predictability, but the introduction of technology from the consumer sphere, even when purchased centrally by IT teams for use in the enterprise, creates its own problems. Read more of this post

The Battle of the Titans: What it all means for IT managers caught in the middle

“Adapt, accept and manage: a BYOD mantra for corporate IT”

ANY CHARACTER HERE

RIM and Apple: two firms with more contrasting current fortunes you could not wish to imagine. The once high-flying Canadian BlackBerry-maker, for so long the darling of IT managers and beloved of time-starved execs the world over, has lost its way as rivals from the consumer space start to eat into its core enterprise business. Then there’s the phenomenon that is Apple, the Cupertino giant molded into the slick, stylish consumer success story it is today by the late Steve Jobs. You’re probably as likely in many organizations to see staff using an iPhone for work as a BlackBerry today, which makes two recent announcements from the tech giants all the more interesting for what they say about the firms’ respective strategies and what it all means for IT managers caught in the middle. Read more of this post