Networks constitute the new morphology of our society and the diffusion of this logic transforms operations and results in productive processes, experience, power and culture. Therefore, network organization has existed for a long time; the new information technology paradigm provided the material base for expansion that penetrated into whole social structure. Now we’ve come upon the mobility craze, the fastest changing field in technology, and the introduction of these new form factors into our society are reshaping the way that we interact with each other through social networks. They’re influencing the way that we work and produce information.

 

alliance.jpg

 

 

     What we are seeing nowadays is the wave of Bring Your Own Device (aka. BYOD), where corporations are allowing employees buy devices and bring to enterprise, letting them use it to access their e-mails, calendars, contacts and even line-of-business applications. This new chapter in IT brings new opportunity for increased productivity, while putting valuable information in employee’s hands. BYOD takes advantage of the fast paced evolution of consumer devices such as smartphones, tablets, and the applications that run these devices and empower users with highly collaborative capability. However, these benefits come also with challengers for IT departments:

 

     Security: Probably the biggest challenge for most organizations. Dealing with multiples devices, operating systems, and users accessing multiples devices at same time requires in-depth strategy, securing and integrating multiples layers into overall enterprise-class policy. The first touch point is the user, so starting with a small tech-savvy group can be a good start point, as demonstrated by BP case published 6 years ago by ZDNet.

 

     Now IT organizations also can count on Intel® Anti-theft Technology (aka. Intel® AT) technology embedded into Intel tablets, laptops and Ultrabooks to lockdown lost or stolen device in order to “brick” and destroy information stored in these devices and make the device itself a useless piece. Also, to protect user’s identity these devices have Intel® Identity Protection Technology (aka IPT), that provides the foundation for a comprehensive, tamper proof and tied with hardware asset that match user and device to provide a consistent authentication mechanism and credential protection.

 

     All these technologies have the potential to set an alliance between personal and professional roles into same device. As I already wrote about use of IPT for consumer using an online banking, this same technology can be applied for enterprise application in order to strengthen overall user identity. Pragmatism is the safest strategy for enterprise, IT organizations can’t ignore that their users are using their devices for personal matters, accessing personal e-mail and multiples cloud services, probably using the same password used by corporate systems. So, if IT ignores this simple human expected behavior and continues to think that IT security is based on firewall perimeter, and an employee losing his or her personal device won’t offer any threat to corporate will undoubtingly find themselves with a security breach.

 

     Define a strategy to support an effective BYOD policy. This is actually not only an opportunity to boost employee productive but also, if well conducted, a way to protect against the security breaches that existed in today’s world.. However, it is not an easy task and there isn’t one solution fits all. That is the reason that some well-established consulting companies are focusing their efforts in this area, as announced by IBM Global Service and explained in this white-paper.

 

Best Regards!