Why do IT people resist end users bringing their own equipment to the enterprise network? Those same IT folks are typically pretty proud of what they've achieved with their infrastructure. The message is typically, "it's a security risk." But the implied message is: "we have an inadequate network to deal with this challenge."
Why do IT people resist end users bringing their own equipment to the enterprise network? Those same IT folks are typically pretty proud of what they've achieved with their infrastructure. The message is typically, "it's a security risk." But the implied message is: "we have an inadequate network to deal with this challenge."Infrastructure and platform services have already pushed beyond the legacy corporate "crunchy on the outside, chewy on the inside" enterprise network. At some point, the cost/benefit of cloud is going to push significant data outside the corporate net. And if ISPs and your cloud providers allow random workstations to be connected, why can't you allow them?
End user devices are expensive, from procurement, to rollout, to configuration, to support. If you didn't have to worry about that piece of the puzzle and got to concentrate on procuring, customizing, and securing killer enterprise apps for your business, would that be such a tragedy?
Ok, so maybe the answers aren't easy. But to start to be able to address issues like this with actual data, we've launched a research survey about end user device practices in enterprise networks.
Click here to join us in figuring out the answers and best practices surrounding this and other conundrums in the end user device world. The answers to what your peers are doing, to be published in InformationWeek Analytics, may surprise you.
Jonathan Feldman is an InformationWeek Analytics contributor who works with IT governance in North Carolina. Comment here, write to him at firstname.lastname@example.org, or on Twitter at @_jfeldman.
The Agile ArchiveWhen it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
2014 Analytics, BI, and Information Management SurveyITís tried for years to simplify data analytics and business intelligence efforts. Have visual analysis tools and Hadoop and NoSQL databases helped? Respondents to our 2014 InformationWeek Analytics, Business Intelligence, and Information Management Survey have a mixed outlook.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 25, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."