The shift from dedicated desktops to virtual workplaces, user demand for do-it-all devices and the many mobile applications ready for employees to grab and go at will have all ushered in the bring-your-own-IT trend (aka BYOx).
This culmination of the bring your own device, applications and cloud movements creates a tug of war between IT and users, with one pulling for control and the other for autonomy. IT wants to enforce rules for mobile devices and applications while users attempt to get around them.
All too often, these attempts are successful. Employees expose their companies to threats by using personal mobile devices to access and share work files, data and emails without the knowledge or permission of IT. Instead of waiting for corporate-approved applications, which bring more value to the business, they bypass IT entirely and download their own.
Without control over the mobile devices connecting to the network, the traditional perimeter defense model — which gives those permitted inside the organization controlled access within — is no longer effective.
Despite these issues, IT cannot continue to say no to users. They must find highly secure ways to provide tools for enabling mobile workers versus blocking them.
To learn more about saying yes with less risk, join Cormac Foster from Gigaom Research and me in a live, interactive webinar, “Embrace BYOIT without sacrificing security and control.” Register for this May 21 event now.
–Michael Singer, AVP Mobile, Cloud, and Access Management Security, AT&T

Comments have been disabled for this post