Inside the Briefcase

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

with Srivats Ramaswami, 42Q
In this interview, Srivats Ramaswami,...

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

with Sander Barens, Expereo
In this interview, Sander Barens...

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

with Shawn Moore, Solodev
In this interview, Shawn Moore,...

Driving Better Outcomes through Workforce Analytics Webcast

Driving Better Outcomes through Workforce Analytics Webcast

Find out what’s really going on in your business...

Legacy Modernization: Look to the Cloud and Open Systems

Legacy Modernization: Look to the Cloud and Open Systems

On the surface, mainframe architecture seems relatively simple: A...

BYOD Management Still Not a Slam Dunk

December 20, 2011 No Comments

A series of three independent studies on mobility management and security from Cisco, Mimecast and Good Technology show that managing all this data moving around on laptops and smartphones is going to be a challenge. But you knew that already. But what is clear is that the rate of adoption varies widely, depending on who is doing the measuring.

The three reports include:

  1. The Cisco 2011 Annual Security Report,
  2. Mimecast’s survey on business mobility and
  3. Good Technology’s State of BYOD report.

Cisco’s report is the most troubling of the trio. Gen Y is likely – to the tune of 70% — to ignore promulgated IT policies when it comes to security posture, and a third don’t have much respect for their IT departments at all. To this generation, everything is public, states David Evans, Cisco’s “chief futurist.” (Now that is a job title that I could enjoy.) Granted, “ten years ago, employees were assigned laptops and told not to lose them, and told not to tell anyone their password. End of security training,” as the report states somewhat simplistically, but not far from the truth. Today, things have gotten a little bit better: perhaps there is a self-service website that provisions the laptop, or an endpoint security agent that can manage the device.

Read More…

DATA and ANALYTICS 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner Infrastructure


Gartner Application Strategies


IBC 2017

ITBriefcase Comparison Report