Daily Archives: January 21, 2014
This means they can, in some cases, bypass the corporate network and access websites, apps and other services that are otherwise banned by IT. Users could also potentially access corporate information and sensitive data on these networks, which are usually unsecured and unmonitored by IT.
In some ways this presents similar issues to BYOD; ensuring sensitive corporate data remains secure and protected while allowing workers all the tools they need to be productive.
However, while IT can put rules and policies in place to govern mobile devices, such as Mobile App Management (MAM), securing networks set up by employees could prove more difficult.
There are of course regulations in place to ensure data is protected. The Data Protection Act (DPA), PCI DSS and ISA’s ISO270001 all govern how businesses should look after data, who they should allow to access it and what to do in case of a data breach.
Responsibilities
What is important to realise is that wherever the data is, and whoever and whatever is accessing it, it remains the responsibility of the business to ensure its protection.
That’s why data protection is so important. The penalties for data breaches are severe – not just financially but also in terms of potential damage to a company’s reputation.
That doesn’t mean businesses have to protect each and every device and ban workers from accessing sensitive data – that will just lead to frustrated workers who will take more risks in order to get their jobs done, such as creating their own network.
If the data is protected at its source, and who and what can access it is strictly controlled, then IT does not have to fear the rise of BYON.
Having MAM in place could negate the need for employees to set up their own personal networks, while also ensuring businesses comply with the regulations mentioned above
IT will be able to control the device as if it was one it had provisioned, allowing it to access all necessary applications and data while keeping the employees personal data completely separate. Workers are free to use the device exactly how they want.
For IT workers, it may seem like there is a new problem to solve each and every day when it comes to workers and their mobile devices. If it’s not a lost device it’s employee-owned devices or, as we’re seeing now, employees setting up their own networks.
But the key here is to protect what’s important: corporate data. Don’t worry about the devices themselves.
Control the access. Control who can access corporate data, what they can access, where they can access it from and what devices they can use. Get that aspect right and BYOD and BYON can become easy to handle and act as a great enabler for workers to be more productive.
- Nathan Pearce is Product Manager for EMEA at F5 Networks. Pearce joined F5 in 2006 and is currently the product manager for EMEA. His role includes managing F5’s product portfolio across all areas, including the security, datacenter and service provider sectors
CIOs underprepared for digital leadership
In fact, many of these CIOs feel overwhelmed just by the thought of building digital leadership. The survey highlights that 51 per cent of CIOs are concerned that this digital phase is coming faster and 42 per cent don’t feel that they have the required talent to face this.
Dave Aron, vice president and Gartner Fellow, says, “2014 must be a year of significant change if CIOs are to help their businesses and public sector agencies remain relevant in an increasingly digital world.”
The first era of enterprise IT was on how IT could help do new things – automating operations to create massive improvements in speed and scale. However, the third era is going to be different. Technological and societal trends such as the Nexus of Forces and the Internet of Things are changing everything rapidly. “This year will be of dual goals – responding to ongoing needs for growth and also shifting to exploit a different digital paradigm,” adds Aron.
According to Aron, CIOs have been facing a whole host of challenges for years now – digitisation is just going to add on to it. “Digitisation is both a CIO’s dream come true and a career-changing leadership challenge,” he says.
Most businesses have established IT leadership, strategy and governance, but have a vacuum in digital leadership. To exploit new digital opportunities and ensure that the core of IT services is ready, there must be clear digital leadership, strategy and governance, and all business executives must become digitally savvy.
CIOs are planning for significant change in 2014…
- A quarter have already made significant investments in public cloud, and the majority expect more than half of their company’s business to be running over public cloud by 2020
- 70 per cent of CIOs plan to change their technology and sourcing relationships over the next two to three years
- 45 per cent of companies have implemented agile methodologies for part of their development portfolio; although most need to go further to create separate multidisciplinary teams, with lightweight governance and new digital skill sets and alternative sourcing models
Source: Techgig.com