• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   Data centers must be prepped for IT consumerization

Data centers must be prepped for IT consumerization

  • Posted on:November 14, 2011
  • Posted in:Current News, Mobility
  • Posted by:
    Trend Micro
0

Employees are increasingly bringing their technology from home to use during the workday as the computing power and popularity of such devices, namely of the mobile variety, continues to grow.

According to a recent report from ITworld, companies must prepare their data centers for the rise of IT consumerization with a keen eye on security measures. While many of the smartphones and tablets now in use by employees may not be directly owned by the organization, the data accessed by and stored on them remains its responsibility.

The IT department should ensure that proper data security measures are in place to protect their information, according to the report.

"Security and management tools and systems will need to be included in the overhaul," Beth Bacheldor wrote for the news provider, concerning companies' shift to support consumerization.

When employees are using devices that are not provisioned by the IT departments, the company can't help but feel a slight loss of control. Because the smartphone or tablet is owned and was purchased by the employee, the company has no real way of knowing what types of data security measures or capabilities the device contains.

Beyond the volume of personally owned devices now present at many companies, consumer technology has also proven to be highly beneficial. Earlier this year, a CIO Magazine report highlighted several reasons why companies should embrace consumerization rather than try to stem its growth.

For one, personally owned devices are working to blur the lines between home and office, making employees more productive because they are using a device with which they feel comfortable. Furthermore, flexible work arrangements will attract more talented employees, CIO stated.

Still, companies will have to devise a strategy for protecting confidential data because the spread of consumerization does not appear to be slowing down any time soon.

"I mean, loads of folks are doing business on their personal smartphones and tablets," Bacheldor wrote for ITworld.

When exploring ways to promote data security for mobile devices, a group of experts who were supported by the Virginia Tech Applied Research Corporation said that companies should focus on the data itself, rather than securing the device, according to CSO Magazine. Prioritizing the actual information will give a company a better idea of its movement and use by mobile employees, thus opening the door for more specific and targeted data protection measures.

Consumerization News from SimplySecurity.com by Trend Micro

Related posts:

  1. Companies continue to wrangle with IT consumerization
  2. Consumerization could answer question of government mobility
  3. Mobility, consumerization taking hold among government organizations
  4. ‘Trend Micro Consumerization Report 2011’ revealed at the Gartner Summit in London

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.