In a previous post1 I raised three pitfalls that your BYOD program cannot afford to ignore when allowing employees to use their personal devices for work: Remote deletion of personal data on an employee-owned device Tracking an individual’s location Monitoring an employee’s Internet access Based on my involvement with various BYOD projects and my ongoing…Read More
Talking regularly* about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are too important to ignore. The problems boil down to a lack of control, which can be described in two key ways. IT departments of course are…Read More
By Michael Ricigliano As obsessive as it may sound, I currently own – and regularly listen to – a collection of more than 76,000 songs via my iTunes account. The display of accumulated hours at the bottom of my iTunes homepage tells me that if I were to hit “Play” at the first song (by…Read More
By Greg Boyle I have recently seen stories from around the globe about people being mugged for their phones. The violence involved is concerning enough for most people, not to mention the cost of replacing the phone, but what is just as worrying is the loss of private and potentially damaging information. In the cases…Read More
This blog post is based on my talk at the annual “IDC Asia/Pacific CIO Summit” held last July 28, 2011 in Singapore. The world of enterprise IT is going through lot of changes right now. One of the most important trends that’s causing these changes is consumerization. Now, what is consumerization? Simply put, it’s the trend…Read More
I have attended a lot of events, panels, customer meetings and round table discussions recently about consumerization and the effects that it is going to have on the enterprise. To be frank, I keep hearing a lot of “How are we going to manage these devices?” or “How are we going to protect our data…Read More
There’s always two-sides to a story. Which do you agree with? Key into the first in a series of lively “Beerside Chats” — this one between Cesare Garlati, Director, Consumerization & Patrick Wheeler Mobile PMM as they debate the issues surrounding security, innovation & growth of mobile apps for the Enterprise. Which is best iPhone or…Read More
Rather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools. The Consumerization of IT is the single most influential technology trend of this decade. Companies are already well aware of it, as they wrestle with the growing influx and…Read More
For all its hype iCloud does not represent a fundamentally new problem. Employees are already bringing personal devices to work and wanting to use them in their jobs, and these unmanaged devices are mixing personal and corporate data on a system that is outside the control of the security and IT teams.
iPass just published the latest edition of the Global Mobile Workforce Report. Along with the usual great insights on mobile device penetration (now 98%) and mobile applications usage, this time the iPass survey reveals some more personal habits with regard to the use of mobile technology – including its use in the bedroom.