The holiday season is now in the rear-view mirror, but the gifts that people received will now be an issue for companies. ReadWrite Enterprise said January 2 was likely the biggest day ever for the BYOD (Bring your own Device) trend due to the sheer amount of employees who have new devices. Many of these devices will likely be tablets, according to Forrester, and will almost certainly put more stress on IT security policies to move forward or perish.
"Light and small enough that you don’t have to think about whether to bring it," Forrester said of tablets. "Long enough battery life that you don’t worry about whether to bring your charger – you just charge it at night. And instantly responsive, so you don’t get irritated or distracted while waiting for it to catch up with you. So 'hybrid' devices, call them PCs or tablets, that feature a keyboard and touch do qualify as a tablet in this definition if they meet the criteria above."
The website said that many tablet users will likely be using email more than most apps or features on their tablets, which could end up creating a strain on the company's email network and even hurt performance if a company is using virtual desktops.
Mobile applications for productivity have also become more popular due to the increased popularity of cloud computing. ReadWrite Enterprise said companies will need to keep on top of their network performance while gaging how BYOD affects their infrastructure.
"One possibility is to boost the use of flash memory on the server side as well as on the device side," the website said. "From cell phones to tablets, NAND flash powers just about every mobile device. But investing in flash on the server-side as well can help improve performance of specific applications and remove overall bottlenecks. As BYOD brings ever-more mobile devices into corporate environments, IT faces a very real challenge to keep up."
With many other aspects of IT, InfoSec Island said the key will lie within the management philosophy of BYOD. Ian Tibble wrote on the website that there is a certain difference by what employees should do and what they will do, so making sure there are clear guidelines in place for what they should be doing on BYOD is an important step for making sure data security is covered across the enterprise.
Consumerization News from SimplySecurity.com by Trend Micro.