Why do IT people resist end users bringing their own equipment to the enterprise network? Those same IT folks are typically pretty proud of what they've achieved with their infrastructure. The message is typically, "it's a security risk." But the implied message is: "we have an inadequate network to deal with this challenge."
Why do IT people resist end users bringing their own equipment to the enterprise network? Those same IT folks are typically pretty proud of what they've achieved with their infrastructure. The message is typically, "it's a security risk." But the implied message is: "we have an inadequate network to deal with this challenge."Infrastructure and platform services have already pushed beyond the legacy corporate "crunchy on the outside, chewy on the inside" enterprise network. At some point, the cost/benefit of cloud is going to push significant data outside the corporate net. And if ISPs and your cloud providers allow random workstations to be connected, why can't you allow them?
End user devices are expensive, from procurement, to rollout, to configuration, to support. If you didn't have to worry about that piece of the puzzle and got to concentrate on procuring, customizing, and securing killer enterprise apps for your business, would that be such a tragedy?
Ok, so maybe the answers aren't easy. But to start to be able to address issues like this with actual data, we've launched a research survey about end user device practices in enterprise networks.
Click here to join us in figuring out the answers and best practices surrounding this and other conundrums in the end user device world. The answers to what your peers are doing, to be published in InformationWeek Analytics, may surprise you.
Jonathan Feldman is an InformationWeek Analytics contributor who works with IT governance in North Carolina. Comment here, write to him at firstname.lastname@example.org, or on Twitter at @_jfeldman.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.