Presentation is loading. Please wait.

Presentation is loading. Please wait.

Info-Tech Research Group1 Integrate Consumer Applications into IT Secure IT’s core assets amidst the flood of personal unmanaged technology.

Similar presentations


Presentation on theme: "Info-Tech Research Group1 Integrate Consumer Applications into IT Secure IT’s core assets amidst the flood of personal unmanaged technology."— Presentation transcript:

1 Info-Tech Research Group1 Integrate Consumer Applications into IT Secure IT’s core assets amidst the flood of personal unmanaged technology.

2 Info-Tech Research Group2 Consumer technology will continue to infiltrate the enterprise, changing the tools and user behaviors that applications managers must work with. Introduction Applications managers deciding whether to select or reject consumer applications for enterprise use. Applications managers working with the CIO, Infrastructure Manager, and others in the organization to develop long-term policies on consumer technologies and behaviors. This Research is Designed For:This Research Will Help You: Understand the impact of consumer technology on your organization’s application portfolio. Identify key risks and benefits you must balance to successfully manage consumerization. Tactically decide which consumer tools to adopt and which to reject now. Strategically develop long-term policies and processes for dealing with consumer tools and behaviors in the organization.

3 Info-Tech Research Group3 Executive Summary Understand the impact of consumer technology Responsibility for security, regulatory compliance, and budget discipline falls to IT. Among Info-Tech’s survey respondents, 73% ranked security concerns first or second on the list of barriers to PUA adoption. Risks and costs of doing nothing about PUAs are greater than the risks and costs of investing the time and resources to develop a strategy, define processes, and apply technical controls. Identify key risks and benefits Go beyond quick fixes; develop a long-term strategy to provide the access to data and collaboration tools that users want without putting IT’s most valuable assets at too much risk. Develop and implement a long-term strategy Consumerization is happening and its challenges will only continue to grow. Doing nothing is not an option. The use of personal and unmanaged devices (PUDs) for work purposes is expected to reach 100% by 2013. 90% of Info-Tech’s survey respondents admitted that personal and unmanaged applications (PUAs) are used by employees in their organization. Applications managers have to catch up. Assess tactical options Users are adopting PUAs largely to make them more productive and efficient at work. Understand the value of PUAs and when it’s appropriate to allow or even sanction and support them. Assess your risk profile and identify feasible and cost-effective ways to allow consumer technologies.

4 Info-Tech Research Group4 This set will help you assess both tactical and strategic options, and choose the right course of action Deal with PUAs in the present while developing a long-term strategy to deal with ongoing consumerization in the future. Tactics: Users are already using PUAs for work. Understand when it’s appropriate to allow, sanction, or support PUAs vs. blacklisting them. Strategy: Enterprise vendors are adapting to consumer trends. Understand the type of enterprise application portfolio you will need to plan and build for the long term. ◦ Develop an application ecosystem: an application portfolio that supports interoperability and synchronization across a wide range of applications and devices. Accept that there is a real cultural shift towards greater usability and access. You will need to work with end users to keep up with those demands. Build data persistence Understand PUAs Evaluate PUA use Implement an application ecosystem

5 Info-Tech Research Group5 What’s in this Section:Sections: Make room for consumer applications in IT Consumerization has a variety of meanings Engage, enforce, enable, extend, and entice Coordinate key roles Applications managers have to catch up Engage early adopters and influencers Make room for consumer applications in IT Understand the risks and benefits Tactically evaluate PUA impact on IT application portfolio Build an application ecosystem Work with consumer demand, not against it

6 Info-Tech Research Group6 Consumerization has a variety of meanings Recognize the risks and the benefits that consumerization has for application management. Personal and Unmanaged Devices (PUDs) Those devices brought into or accessing the facility by the end user (e.g. teleworker, consultants with user devices such as smartphones, tablets, Macs) Personal and Unmanaged Applications (PUAs) Those applications that end users use to access organizational data and move data either individually or in collaboration; PUAs often natively run on PUDs or in any device’s browser All of these user-owned consumer orientated technologies are in use in your organization. While devices and applications fall into different risk, management,and security portfolios, IT should deal with them as a single entity. You cannot separate the technologies, so do not attempt to separate the management.

7 Info-Tech Research Group7 Develop processes for managing consumer behavior as well as consumer technology The aim of engagement is ultimately to mitigate risks and ensure core security, regulatory, and budget responsibilities. IT should use this as an opportunity to engage with users to have a dialogue to really uncover the applications that can enable dramatic benefits for the organization. Think of it as an opportunity to be the enabler of technology, where some is corporate-provided and some is consumer- provided technology. It still needs coordination and integration into backend systems in order to drive real business value. - Nathan Clevenger, Chief Software Architect, ITR Mobility Engage: learn and listen to what end users want – or what they might already be doing behind your back – to identify and react to emerging risks more quickly. Enforce: understand the risks; never compromise on mission-critical security, regulatory, or budget responsibilities. Enable: tactically allow PUAs – not just to compromise, but to help define the areas that cannot be compromised and will be enforced. Extend: strategically deploy enterprise applications to provide more consumer-like usability and access, e.g. more easily available on mobile devices. Entice: make IT-managed tools easier and more attractive to users than unmanaged tools. Enforce EngageEnableExtendEntice

8 Info-Tech Research Group8 Coordinate key roles in IT CIO Risk Management and Security Application Development PUAs Support Network access Policy PUDs For ongoing success you will need to coordinate with the CIO and managers on the infrastructure side of IT. Provision and deploy applications. Drive engagement and follow adoption trends. Provision and deploy applications. Drive engagement and follow adoption trends. Applications Manager Application Manager Infrastructure Manager Develop a single plan incorporating with the Infrastructure Manager to secure organizational assets using appropriate controls for the organization’s risk tolerance. Develop budget for the security solution. See Info-Tech’s solution set Understand and Manage Consumerization.Understand and Manage Consumerization Develop a single plan incorporating with the Infrastructure Manager to secure organizational assets using appropriate controls for the organization’s risk tolerance. Develop budget for the security solution. See Info-Tech’s solution set Understand and Manage Consumerization.Understand and Manage Consumerization Infrastructure Manager Push policy decisions to CIO and ensure that the CIO provides guidance on the acceptable risk. Present budget needs to secure the organization and appropriate application development. Push policy decisions to CIO and ensure that the CIO provides guidance on the acceptable risk. Present budget needs to secure the organization and appropriate application development. CIO

9 Info-Tech Research Group9 Engage the end users who are driving PUA adoption App managers need to listen or get left behind. So imagine you're a consumer and you spent your own personal dollars on this thing that gives you personal productivity that you don't want IT to know about, but you invested your own dollars. All of a sudden, Windows 7 comes out and it doesn't work. You go to IT and you knock on the door and go, ‘It worked until you, IT, implemented this thing and you didn't test my personal app...’ You see where this is going to take us, right? - Bruce Michelson, Distinguished Technologist, HP Recent research by Info-Tech found that application managers and infrastructure managers are least likely to advocate for consumer technology. That alone might not surprise you, but the disparity should be alarming. Get outside the IT bubble and talk to end users to understand what’s already in use. Find out why users are so keen to adopt these new tools before you fall further out of the loop. Source: Info-Tech Research Group, N=52

10 Info-Tech Research Group10 PUA use is very high and IT does not have the tools to stop it 2-6 PUAs 43% Organizations know that end users have PUAs, but cannot support or block their use. Manage the PUA problem by engaging users to understand why the users perceive the need for PUAs. Consider the PUA trend as an opportunity to gather more end-user requirements for productivity applications that can be used to compliment your application portfolio, rather than compete with it. Info-Tech Insight Organization preparedness for PUA adoption Percent of organizations that responded Number of PUAs that are in use by end users Most organizations lack both budget [1] and security [2] to allow PUAs 1 2 I think the consumerization discussion moved faster than IT was either capable or willing to move. Also it happened in 2008, 2009, during the Great Recession. We hunkered down in IT. All the end users decided to go buy iPhones, smartphones, and cell phones and embrace social networking. – Bruce Michelson, Distinguished Technologist, HP Source: Info-Tech Research Group, N=67 1 PUA 46% Number of PUDs reported in use by IT

11 Info-Tech Research Group11 Find common ground to maintain necessary controls Problem An Info-Tech client that handles customer data reports that employees at their organization use Dropbox to store corporate content, including customer IDs. This client uses SharePoint as their content management system. IT has real and justifiable issues with Dropbox, including lack of integration and file encryption. An example of how to manage PUAs. Issues IT needs a solution that integrates into SharePoint to take advantage of the support and collaboration modules that they have designed. The client has a highly mobile work force. End users need a storage solution that has better integration for mobile devices than is currently available in SharePoint. Solution: Make your choice of PUA based on user feedback and the issues that need to be addressed. In this case three items: ability to secure files, integration into SharePoint, and viable mobile application. While Dropbox is not the correct PUA for this client, some of their users have adopted Box.net, which exceeds the client’s needs. It allows file-level encryption and has many out-of-the-box connectors to various enterprise systems, including SharePoint, as well as CRM systems, etc. It not only allows files to be shared, has basic collaboration, and allows full text search across libraries, it has mobile applications for iPhone, iPad, Android (phone and tablet) Playbook, and a mobile website.

12 Info-Tech Research Group12 Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges www.infotech.com Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: 1-888-670-8889


Download ppt "Info-Tech Research Group1 Integrate Consumer Applications into IT Secure IT’s core assets amidst the flood of personal unmanaged technology."

Similar presentations


Ads by Google