• May 29, 2014

Ready for Use-Any-Device?

By Jim Cooper, Chief Technologist, Mobility & Workplace Global Practice, Enterprise Services, Hewlett Packard Enterprise; Sudesh Shah, Chief Technology Officer and Strategist, Enterprise Services Asia, Hewlett Packard Enterprise

Driven by innovations in technology, the transitional modern workplace allows greater flexibility than ever before, including use-any-device. But along with these advancements comes a greater need for enterprise governance to monitor and manage employees, information, and equipment.

The viability of bring your own device is no longer a debate; it’s a fact of how business is being conducted. Today’s workers typically own two or more devices, and they want to use applications on the devices and platforms of their choice.

This shift to a focus on the user experience puts the onus upon the enterprise to begin managing those applications.

Protecting the Network

Each enterprise must now determine how it will mitigate the security risks associated with this inevitable transformation of business operations into a use-any-device, or device agnostic, environment.

Allowing users to access information on the device of their choice can have a significant positive impact on business operations. It allows workers to carry on the conversation from anywhere, be it a different location on the work campus, at home, or on the other side of the globe.

The ability for employees to access information from different devices, whether it’s a desktop, laptop, tablet, or smartphone, increases productivity by allowing them virtually unlimited access to the network regardless of their location or the time of day.

The User-Centric Workplace

Providing a network environment and infrastructure to support that kind of communication can open the door for a richer, more effective user experience —but it also demands a new way of looking at the controls in place and how growth will be deployed in the future.

The issue of governance is crucial in the success of a mobile workplace, and the most important step leaders can take to facilitate this new work model is to change the role of the IT department.

In the past, IT was seen as the integrator, and its role was limited to deploying selected technologies.

IT as the Facilitator

As the workplace transforms, the IT department must become the facilitator and help determine not only which current technologies are best suited to the enterprise, but also seek out coming innovations that will help the business grow and allow users to become more productive. In a user-centric workplace, the center of the journey must be about control, and the success of IT security hinges upon users being able to perform tasks in their chosen platform without jeopardizing the safety of the content. New questions and issues are emerging because of this, and a common mistake of enterprises is failure to include IT security and risk management teams in discussions and strategy sessions.

Enterprise Security & BYOD

Thinking about IT security early provides for a smoother transition and benefits the enterprise as a whole. And, with the help of security and risk management, the enterprise can then begin educating its employees on usage policies and procedures, which is just as important as deploying firewalls and system controls. Establishing proper governance and a communication framework take the complexity out of the IT security process, and allow the enterprise to better leverage the technology at hand.

Please join us for discussion in the Enterprise Forward LinkedIn Group.