In an interview with BYTE, Good Technology's Dimitri Volkmann explains his company's approach to helping IT departments accommodate BYOD and consumerization, especially for tablets, in a safe manner.
With the adoption of tablets and smartphones at work, a growing ecosystem of apps is improving productivity. But how can you make sure data stays secure? The government and many tech companies are using Good Technology to keep prying eyes from critical information. We caught up with Dimitri Volkmann, a vice president of Good Technology, after his panel at the CTIA conference in New Orleans, where he discussed how tablets are making their way into corporations and how they are being used.
Good Technology's apps have long been used for secure access to traditional functions such as email. In recent partnerships with Box and Quickoffice, employees now can use Good Technology to work on documents on their phones and tablets. Good's technology has many of the advantages of RIM's secure Blackberry cloud, but it works with other devices.
"What we have seen is an overall phenomenon of consumerization of IT. Consumerization of IT means two things. [The first is] bring your own devices--people acquire those devices or want to use those devices. And the second thing is the demand for apps. There are a lot of apps. [For instance], you can use apps for banking, so people are asking if there are similar applications that they can use for their work," Volkmann said. "Those apps started out as basic collaboration capabilities like email, contacts, calendar, and access to the intranet. Now we are seeing [apps made around sharing] documents, the ability to have documents on-the-go [so workers can] review and annotate them and send them back to the office. We see corporations are starting to build their own custom apps for their specific business processes. This allows them to drive better productivity from their workers because they have access to business processes on-the-go."
Here's how Good Technology works and how it provides security at the application level:
IT departments are embracing the BYOD movement. "The work anytime, anywhere anytime environment is really taking hold," said Mark Beaton, director of project management at Quickoffice."The main hurdles are that the technology has changed so fast, a lot of organizations weren't prepared for how quickly it has entered the organization. The rate of change is happening so quickly. [There are] so many new devices and so many apps coming out, [IT departments must ask], how do I put that out and still maintain a secure environment for my data?"
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.