Managing heterogeneous platforms, data security, maintenance… When mobile terminals are used for both professional and personal reasons, IT Directors are faced with a series of complex issues.
The mobile revolution
There were over a billion mobile users at the end of 2010, smartphone sales outstripped those of PCs in Q4 2010, and IDC predict that some 70 million tablets will be in circulation by 2012. Furthermore, a poll by Ipsos on behalf of Microsoft revealed that employees are becoming increasingly demanding with respect to access to digital resources in the workplace, and the “bring your own device” trend is growing in the US.
Convergence and “bottom-up”-approaches mean that IT departments are having to think up new strategies to manage these issues.
A new challenge: managing user profiles
With this increase in mobile terminals, CIOs have to contend with a proliferation of sources both within and outside the company (applications and data) from one or more mobile peripherals belonging to the same user, and with controlling access to the company’s data throughout its lifecycle.
One possible solution advocated by experts to these various problems involves a shift in priorities: by choosing automated solutions for managing user profiles as opposed to workstations, CIOs are assured of a long-term solution to keep abreast of he changes driven by the mobile trend.
The problem of heterogeneous platforms and security
A survey conducted in 2010 based on interviews with 250 American and British CIOs revealed that many did not yet have a proper mobility management policy. And yet they cited the introduction of new mobile applications as one of their top priorities and plan to introduce 8 different platforms or OS soon.
The issues associated with using diverse mobile terminals and using employees’ personal equipment for company use means that CIOs must handle a variety of ecosystems and ensure overall security of their IT system – issues which a large number of IT decision-makers have yet to address.
The fine line between personal and professional
With peripherals used for both personal and professional use, whose job is it to finance, upgrade, provide maintenance and handle theft or damage? The answer to these equally crucial questions lies in procedures implemented by certain IT departments and companies’ in-house rules, which may be formalised by the terms and conditions of employment contracts.