Info-Tech Research Group1 Integrate Consumer Applications into IT Secure IT’s core assets amidst the flood of personal unmanaged technology.

Slides:



Advertisements
Similar presentations
The IT Staff of the Future: The Importance of IT Business Alignment for Staff Development Katherine Spencer Lee Executive Director Robert Half Technology.
Advertisements

SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Adapting to a Mobile IT Landscape: From IT Silo to Enterprise Strategy Kimberly Hancher Chief Information Officer (CIO) U.S. Equal Employment Opportunity.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
Submitted By Tanmoy Mondal IIFT MBA (IB) The future lies on Business transformation & Employee- Organizational Alignment.
Management Information Systems
The Intel Advantage in Education Robert Shults Intel Corporation.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Impact Research 1 Enabling Decision Making Through Business Intelligence: Preview of Report.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
Practical IT Research that Drives Measurable Results Leverage Server Virtualization for DR Affordability and Agility 1Info-Tech Research Group.
Info-Tech Research Group1 Headline / Subhead Vertical Spacing Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
Practical IT Research that Drives Measurable Results Get Started Bringing Order to Help Desk Request Chaos.
Impact Research 1 Deploying Wireless LANs for Business Benefit Summary Document.
Info-Tech Research Group1 Incorporate Mobile into the Enterprise Print Strategy Mobile printing: When BYOD goes from problem solver to problem. Info-Tech's.
Practical IT Research that Drives Measurable Results Document the IT Service Catalog.
Info-Tech Research Group1 Understand Hot Trends in Applications Why are they hot? What do you need to do about them?
Make the Decision to Upgrade to Microsoft Office 2010.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Get Moving with Server Virtualization.
Info-Tech Research Group1 Develop a SharePoint Governance Strategy Bring a Sheriff to the SharePoint Wild West Info-Tech's products and services combine.
Info-Tech Research Group1 Automate the IT Asset Management Solution Automated tools mean you won’t have to manage your Assets off!
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Benefits and Cost of Desktop Virtualization.
Practical IT Research that Drives Measurable Results Make the Case for IP Telephony 1Info-Tech Research Group.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
Info-Tech Research Group1 Use SharePoint for Enterprise Content Management Findability, taxonomies, and records management: It’s more expensive than you.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Prepare For a New World of Workforce Computing Tablets, BYOD, and Windows 8 are changing the landscape of workforce computing;
Info-Tech Research Group1 Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: CRM Software 1Info-Tech Research Group.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Implement a Multi-site ERP Deployment Cultivate a multi-site ERP system that breeds business efficiency.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Effectively Manage Data Governance Convert the management of organizational data from a burden to a competitive advantage. Info-Tech's.
Total Enterprise Mobility Comprehensive Management and Security
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Understand and Manage Consumerization Love it or hate it, just don’t ignore it.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Build an IT Strategy for the Small Enterprise
Build an Enterprise IT Security Training Program
Create a Consumer Technology Integration Plan in Five Steps
Vendor Landscape Plus: IP Telephony Vendors
Select the Right Vendor for Desktop Virtualization
Design an EA Strategy to Articulate the Value Proposition of the EA Function Maximize the likelihood of EA success by communicating EA’s expected contributions.
Transforming business
Find Information in the Enterprise
Create Data Strategies for the Small Enterprise
Gain Control of Cloud Integration Strategies Before they Float Away
Extend SharePoint to Overcome Key Challenges
Bridge IT and the Business with Business Architecture
Select an EA Tool Based on Business and User Need
Optimize the BI Program for a Better ROI
Improve Business Satisfaction by 10% Through Business Relationship Management Relationship management is the #1 driver of business satisfaction with IT.
Right-Size the Information Governance Program
Define an EA Operating Model
Mobile BI – Part One “Gartner predicts that by 2015 over 50 percent of mobile users will rely on mobile devices for insight delivery …” Hugh Watson 2014.
Increase productivity
Presentation transcript:

Info-Tech Research Group1 Integrate Consumer Applications into IT Secure IT’s core assets amidst the flood of personal unmanaged technology.

Info-Tech Research Group2 Consumer technology will continue to infiltrate the enterprise, changing the tools and user behaviors that applications managers must work with. Introduction Applications managers deciding whether to select or reject consumer applications for enterprise use. Applications managers working with the CIO, Infrastructure Manager, and others in the organization to develop long-term policies on consumer technologies and behaviors. This Research is Designed For:This Research Will Help You: Understand the impact of consumer technology on your organization’s application portfolio. Identify key risks and benefits you must balance to successfully manage consumerization. Tactically decide which consumer tools to adopt and which to reject now. Strategically develop long-term policies and processes for dealing with consumer tools and behaviors in the organization.

Info-Tech Research Group3 Executive Summary Understand the impact of consumer technology Responsibility for security, regulatory compliance, and budget discipline falls to IT. Among Info-Tech’s survey respondents, 73% ranked security concerns first or second on the list of barriers to PUA adoption. Risks and costs of doing nothing about PUAs are greater than the risks and costs of investing the time and resources to develop a strategy, define processes, and apply technical controls. Identify key risks and benefits Go beyond quick fixes; develop a long-term strategy to provide the access to data and collaboration tools that users want without putting IT’s most valuable assets at too much risk. Develop and implement a long-term strategy Consumerization is happening and its challenges will only continue to grow. Doing nothing is not an option. The use of personal and unmanaged devices (PUDs) for work purposes is expected to reach 100% by % of Info-Tech’s survey respondents admitted that personal and unmanaged applications (PUAs) are used by employees in their organization. Applications managers have to catch up. Assess tactical options Users are adopting PUAs largely to make them more productive and efficient at work. Understand the value of PUAs and when it’s appropriate to allow or even sanction and support them. Assess your risk profile and identify feasible and cost-effective ways to allow consumer technologies.

Info-Tech Research Group4 This set will help you assess both tactical and strategic options, and choose the right course of action Deal with PUAs in the present while developing a long-term strategy to deal with ongoing consumerization in the future. Tactics: Users are already using PUAs for work. Understand when it’s appropriate to allow, sanction, or support PUAs vs. blacklisting them. Strategy: Enterprise vendors are adapting to consumer trends. Understand the type of enterprise application portfolio you will need to plan and build for the long term. ◦ Develop an application ecosystem: an application portfolio that supports interoperability and synchronization across a wide range of applications and devices. Accept that there is a real cultural shift towards greater usability and access. You will need to work with end users to keep up with those demands. Build data persistence Understand PUAs Evaluate PUA use Implement an application ecosystem

Info-Tech Research Group5 What’s in this Section:Sections: Make room for consumer applications in IT Consumerization has a variety of meanings Engage, enforce, enable, extend, and entice Coordinate key roles Applications managers have to catch up Engage early adopters and influencers Make room for consumer applications in IT Understand the risks and benefits Tactically evaluate PUA impact on IT application portfolio Build an application ecosystem Work with consumer demand, not against it

Info-Tech Research Group6 Consumerization has a variety of meanings Recognize the risks and the benefits that consumerization has for application management. Personal and Unmanaged Devices (PUDs) Those devices brought into or accessing the facility by the end user (e.g. teleworker, consultants with user devices such as smartphones, tablets, Macs) Personal and Unmanaged Applications (PUAs) Those applications that end users use to access organizational data and move data either individually or in collaboration; PUAs often natively run on PUDs or in any device’s browser All of these user-owned consumer orientated technologies are in use in your organization. While devices and applications fall into different risk, management,and security portfolios, IT should deal with them as a single entity. You cannot separate the technologies, so do not attempt to separate the management.

Info-Tech Research Group7 Develop processes for managing consumer behavior as well as consumer technology The aim of engagement is ultimately to mitigate risks and ensure core security, regulatory, and budget responsibilities. IT should use this as an opportunity to engage with users to have a dialogue to really uncover the applications that can enable dramatic benefits for the organization. Think of it as an opportunity to be the enabler of technology, where some is corporate-provided and some is consumer- provided technology. It still needs coordination and integration into backend systems in order to drive real business value. - Nathan Clevenger, Chief Software Architect, ITR Mobility Engage: learn and listen to what end users want – or what they might already be doing behind your back – to identify and react to emerging risks more quickly. Enforce: understand the risks; never compromise on mission-critical security, regulatory, or budget responsibilities. Enable: tactically allow PUAs – not just to compromise, but to help define the areas that cannot be compromised and will be enforced. Extend: strategically deploy enterprise applications to provide more consumer-like usability and access, e.g. more easily available on mobile devices. Entice: make IT-managed tools easier and more attractive to users than unmanaged tools. Enforce EngageEnableExtendEntice

Info-Tech Research Group8 Coordinate key roles in IT CIO Risk Management and Security Application Development PUAs Support Network access Policy PUDs For ongoing success you will need to coordinate with the CIO and managers on the infrastructure side of IT. Provision and deploy applications. Drive engagement and follow adoption trends. Provision and deploy applications. Drive engagement and follow adoption trends. Applications Manager Application Manager Infrastructure Manager Develop a single plan incorporating with the Infrastructure Manager to secure organizational assets using appropriate controls for the organization’s risk tolerance. Develop budget for the security solution. See Info-Tech’s solution set Understand and Manage Consumerization.Understand and Manage Consumerization Develop a single plan incorporating with the Infrastructure Manager to secure organizational assets using appropriate controls for the organization’s risk tolerance. Develop budget for the security solution. See Info-Tech’s solution set Understand and Manage Consumerization.Understand and Manage Consumerization Infrastructure Manager Push policy decisions to CIO and ensure that the CIO provides guidance on the acceptable risk. Present budget needs to secure the organization and appropriate application development. Push policy decisions to CIO and ensure that the CIO provides guidance on the acceptable risk. Present budget needs to secure the organization and appropriate application development. CIO

Info-Tech Research Group9 Engage the end users who are driving PUA adoption App managers need to listen or get left behind. So imagine you're a consumer and you spent your own personal dollars on this thing that gives you personal productivity that you don't want IT to know about, but you invested your own dollars. All of a sudden, Windows 7 comes out and it doesn't work. You go to IT and you knock on the door and go, ‘It worked until you, IT, implemented this thing and you didn't test my personal app...’ You see where this is going to take us, right? - Bruce Michelson, Distinguished Technologist, HP Recent research by Info-Tech found that application managers and infrastructure managers are least likely to advocate for consumer technology. That alone might not surprise you, but the disparity should be alarming. Get outside the IT bubble and talk to end users to understand what’s already in use. Find out why users are so keen to adopt these new tools before you fall further out of the loop. Source: Info-Tech Research Group, N=52

Info-Tech Research Group10 PUA use is very high and IT does not have the tools to stop it 2-6 PUAs 43% Organizations know that end users have PUAs, but cannot support or block their use. Manage the PUA problem by engaging users to understand why the users perceive the need for PUAs. Consider the PUA trend as an opportunity to gather more end-user requirements for productivity applications that can be used to compliment your application portfolio, rather than compete with it. Info-Tech Insight Organization preparedness for PUA adoption Percent of organizations that responded Number of PUAs that are in use by end users Most organizations lack both budget [1] and security [2] to allow PUAs 1 2 I think the consumerization discussion moved faster than IT was either capable or willing to move. Also it happened in 2008, 2009, during the Great Recession. We hunkered down in IT. All the end users decided to go buy iPhones, smartphones, and cell phones and embrace social networking. – Bruce Michelson, Distinguished Technologist, HP Source: Info-Tech Research Group, N=67 1 PUA 46% Number of PUDs reported in use by IT

Info-Tech Research Group11 Find common ground to maintain necessary controls Problem An Info-Tech client that handles customer data reports that employees at their organization use Dropbox to store corporate content, including customer IDs. This client uses SharePoint as their content management system. IT has real and justifiable issues with Dropbox, including lack of integration and file encryption. An example of how to manage PUAs. Issues IT needs a solution that integrates into SharePoint to take advantage of the support and collaboration modules that they have designed. The client has a highly mobile work force. End users need a storage solution that has better integration for mobile devices than is currently available in SharePoint. Solution: Make your choice of PUA based on user feedback and the issues that need to be addressed. In this case three items: ability to secure files, integration into SharePoint, and viable mobile application. While Dropbox is not the correct PUA for this client, some of their users have adopted Box.net, which exceeds the client’s needs. It allows file-level encryption and has many out-of-the-box connectors to various enterprise systems, including SharePoint, as well as CRM systems, etc. It not only allows files to be shared, has basic collaboration, and allows full text search across libraries, it has mobile applications for iPhone, iPad, Android (phone and tablet) Playbook, and a mobile website.

Info-Tech Research Group12 Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: