November 19th, 2013
As businesses grappled with the consumerization of IT, one of the major misperceptions IT folks found themselves combating is the notion that the ubiquity of easy-to-use smartphones and tablets, and productivity apps such as Dropbox, lessened the importance of IT’s technology oversight.
The writer goes on to explain how the nascent consumerization 2.0 push will restore IT’s relevance—and set greater expectations—in the minds of BYOD-friendly employees.
As stated in the article:
“The defining characteristics of this emerging 2.0 phase are:
- Easy-to-use interfaces: Dish Network gave 15,000 field technicians Galaxy phablets with apps to manage their workday and customer interactions. The training regime: a 17-minute video. If new software doesn’t make sense, employees just won’t use it.
- A ‘why can’t we?’ attitude: ‘Dropbox was happening, and I could understand it because believe me I was tempted myself,’ says Mary Gendron, CIO of Celestica, a contract manufacturer with 30,000 employees worldwide. That doesn’t mean IT organizations must say yes to every consumer app, but if an app offers a better way to get everyday work done, IT had better acknowledge the need and at least replicate that capability.
- Speedy delivery: Line-of-business leaders expect apps to go from idea to implementation in a quarter or two, not in a year or 18 months. Speed often means doing iterative development rather than knocking off a big project and moving on, or it means putting more power into the hands of end users to configure software to their needs.
- Integration with enterprise apps and data: Consumerization 2.0 apps must draw on data held in legacy IT systems because they’re built to meet a very specific business need. Marketing teams that set up quick-hit cloud apps without IT organization involvement now need to draw from other enterprise systems, use those cloud apps on a mobile platform, do deeper analytics on the data, and funnel results into an executive dashboard. IT has to deliver all those capabilities, while keeping data secure and not sacrificing design and speed.”
There’s much more to learn by reading the entire article. It’s very thorough, timely, and quite helpful to those hoping to gain broader understanding of the ways in which the emerging consumerization 2.0 phase will affect businesses and organizations of all sizes.
October 31st, 2013
According to a report from research firm Gartner, Inc., worldwide information technology spending is estimated to hit $3.8 trillion in 2014. That figure represents a 4 percent increase over the total spent in 2013.
I’ll leave it to you to read the article for further insight, but one quote from Gartner’s Peter Sondergaard, senior vice president and global head of research, resonated quite strongly with me, so I’ll share it with you now: “The security of embedded technologies that your organization has right now may be the most important operational responsibility you will have in 2020.”
True, 2020 is more than six years away, but between now and then expect a steady increase in the volume of news headlines regarding the heightened importance of securing your company’s networked embedded devices.
Also, I encourage you to learn more about what we’re doing from a technology standpoint to ensure our devices help you stay ahead of the security curve. Visit our Xerox ConnectKey page for additional information.
October 15th, 2013
Recent research by independent security consultancy Context Information Security, as reported in this Dark Reading article, highlights an important finding regarding enterprise bring-your-own-device (BYOD) implementation: There will always be a trade-off between convenience and security.
The researchers investigated three leading Mobile Device Management (MDM) solutions commonly deployed as part of many BYOD roll-outs with Android and iOS mobile devices. Each of the three MDM solutions was shown to provide adequate BYOD security, but like any comparable offering, they were found to be limited by the operating system on which they’re applied.
From the article:
“For example, MDM solutions in a BYOD environment cannot prevent unknown malicious applications from recording sound via the phone’s microphone or tracking user location using the built in GPS. And while Jailbreak/Root detection is implemented by all the MDM solutions reviewed, they work in very much the same way as antivirus, only detecting known Jailbreak/Root methods and applications, which are often trivial to bypass by technical users or malicious hackers. Implementation weaknesses of MDM solutions may also inadvertently leak sensitive information and users can compromise security by downloading apps and disregarding operating system permissions requested by the applications.”
And while there’s no surefire method of guaranteeing comprehensive security in an enterprise BYOD environment, the combination of technical security controls and a clearly articulated BYOD user policy will help dramatically limit the risks.
Embedded devices, such as office printers and MFPs, are another key BYOD-security consideration when users are onsite with their personal smartphones or tablets. Which is why Xerox ConnectKey devices help lessen the demands placed on IT staff, delivering worry-free BYOD connectivity so administrators can focus on preventing other, potentially more damaging security threats.
September 24th, 2013
I have exciting news to share.
Xerox has joined with other print providers to launch the Mobile Print Alliance.
To learn more about how printing on the go just got easier, check out the Real Business at Xerox blog post by Karl Dueland, vice president, Solutions Delivery Unit, Xerox.
September 19th, 2013
A new post on Spiceworks by Shell Haffner, manager of product marketing for the Xerox Entry Products Business Group, asks IT administrators to consider whether they’re in charge of mobile security, or if they trust their employees to ensure mobile-device security in our nascent BYOD world.
Data security obviously is a critically important issue, so I encourage you to read the Spiceworks article and then join the discussion.
August 26th, 2013
These days it goes without saying that many businesses, small and large, embrace telecommuting for a variety of reasons. Some companies offer the ability to work from home as a perk to help lure top talent. Others like promoting a green workplace by encouraging staff to drive fewer trips between home and office. Some like the cost savings they realize by reducing the amount of square footage required to accommodate their headcount. Many companies believe certain employees become more productive when they remove themselves from the office environment.
Whatever the rationale, it’s clear that workplace flexibility, and telecommuting in particular, is here to stay and will become even more prevalent.
But telecommuting is just one component of workplace mobility, a trend that’s becoming increasingly common not only with small, medium and large businesses, but with enterprises as well.
Today, when enterprise-level IT decision-makers discuss mobility, they typically do so within the framework of the broader BYOD (bring your own device) conversation.
And for enterprises in the early stages of considering how to implement their own BYOD policies, the volume of information and best-practice advice can be overwhelming.
Which is why I found the Business 2 Community article, “Enterprise Mobility: It Isn’t Easy, But It’s Worth It,” such a great roadmap for decision-makers who need guidance during their initial BYOD planning.
From the piece:
“Instead of diving head first into transforming into a mobile workplace, there are a few things to consider straight away. There are basic preliminary steps that can foster a systematic approach and deployment that will lead to a more successful initiative that will protect employees, the enterprise, and the security of all information involved.
“While it won’t be easy, to do this successfully, consider four main steps that could make the process a little more organized and mitigate some of the potential risks and pitfalls. The steps include: choosing a partner, building a strategy, creating use-case scenarios, and building a roadmap for deployment.”
There’s much more to learn from reading the entire article, and I encourage anyone interested in learning more about BYOD to do so.
July 18th, 2013
As a follow-up to the recently published Business of Work article, “A New Paradigm: Consumerization of IT Driving Bottom-Up Disruption,” I found a Wired.com piece that provides timely insight into how CIOs in the enterprise can best position their companies to accommodate the rapidly increasing number of anywhere, anytime, any-device workers.
The article, “The New Mobile Enterprise: Less is More,” explores the concept of Unified Communications through what’s called Fixed Mobile Convergence.
If those terms are new to you, they were to me as well. But the Wired piece does a good job of explaining the concepts, as well as outlining the ways in which Fixed Mobile Convergence (FMC) is key to enabling the new mobile enterprise.
In summary, FMC allows enterprises to:
- Reduce telecommunications costs
- Reduce management complexity
- Accelerate adoption of mobile Unified Communications
It all comes down to an enterprise finding the path of least resistance when transforming into a business that embraces and benefits from what’s sure to become an almost ubiquitous mobile workforce.
From the article:
“The New Mobile Enterprise is about enabling enterprises to support the ‘anytime, anywhere, any device’ needs of the increasingly mobile workforce. The path to this objective involves more devices and options for end-users, but will also come down to communicating and collaborating with ‘less’ complexity and costs.”