Pro+ Content/Modern Infrastructure

Thank you for joining!
Access your Pro+ Content below.
February 2013/ Volume 2, Issue 2

Rapid technology changes make securing BYOD difficult

As the parent of a high school freshman, I can empathize with IT professionals securing BYOD and trying to wrangle their end users in this era of consumerization. As parents, we spend all kinds of time and effort establishing boundaries and educating our children to be responsible, considerate members of society. But the minute they reach adolescence, they go off and do profoundly stupid stuff behind our backs. It’s the same thing with end users and their smartphones and tablets. All the structure and due diligence that IT has put it place to make a safe, cost-effective and reliable working environment goes out the window faster than you can download a Dropbox app. But just because you don’t like it doesn’t mean you can put a stop to it. Eventually, tighter rules and earlier curfews break down, and teenagers become adults. And end users, for better or for worse, are wielding their own smartphones and tablets, which aren’t going anywhere. Trying to deny this new reality is not only pointless, it’s counterproductive. The good news...

Features in this issue

News in this issue

Columns in this issue

SearchWindowsServer

SearchEnterpriseLinux

SearchServerVirtualization

SearchCloudComputing

-ADS BY GOOGLE

Close