Many IT managers cringe when employees ask to be allowed access the company server using a personal device like an iPad or smart phone whether to access the company network from home or for other extended access or ease of use reasons. People are so familiar with using social apps at home that they now eagerly want to use this technology in the workplace. So who is really driving this push toward IT consumerization (BYOD)?.
Of course vendors benefit hugely as their devices rapidly cross over to the enterprise but it’s the employee and not the technology vendors like Apple that are pushing to use these devices for work. At the heart of this trend is the simple idea that employees know which tools they want to use to make their work day easier and, hopefully, happier.
Allowing personal devices access to the company network requires IT to spend already scarce time planning, ensuring network security and managing employee-owned devices like iPhones, iPads, Android smartphones, Android tablets, etc. this is in addition to the devices they supply to employees. This activity consumes an increasing amount of IT time when IT departments are already working under resource and budgetary pressures.
Strategically, employee-owned devices with access to the company network are now receptors and repositories for sensitive and confidential company information therefore creating a variety of compliance and security issues. Apart from the issue of introducing malware onto the network, there is also the risk that employees might share sensitive data in unauthorized ways. For example, a lost smart phone that cannot be wiped remotely can expose sensitive company data .
What happens when the employee leaves your company, it's crucial for IT to ensure that all confidential corporate data has been returned to the company and that the device itself does not contain any stored information outside of the company’s control.
While data is often the main concern preventing businesses from allowing or extending personal devices adding the use of cloud applications to the equation can actually increase data security especially for smaller companies where technical resources are limited. In these cases, off-premise storage removes the company’s sensitive data from on-premise risks.
Sign-up for email updates...