SlideShare a Scribd company logo
I BROUGHT MY OWN DEVICE. NOW WHAT?
by Paul Andersen, Marketing Manager at Array Networks


The consumerization of IT is underway. In its report TABLETS WILL RULE THE FUTURE PERSONAL
COMPUTING LANDSCAPE, Forrester predicts sales of 375 million tablets in 2016 with over 750 million
tablets in use. Because tablets are productivity enhancing, portable and trendy, employees are bringing
them to work in droves. Like cloud computing, mobility is causing businesses to reevaluate their
approach to IT.
Not long ago, IT was in the driver’s seat—issuing managed PCs, laptops and mobile phones. With full
control, IT deployed the software and policies needed to ensure security and maintain compliance.
Today, the sands have shifted. Employees want to use tablets and smart phones of their choosing, and
with the flood gates open, many employees also want to work from personal computers at home or on
laptops better suited to the demands of their role.
Commonly referred to as ‘THE CONSUMERIZATION OF IT’ or ‘Bring Your Own Device (BYOD)’, the
trend is here to stay. At the top, executives are demanding tablet access to business applications.
Among the rank and file, employees are bringing personal devices to work irrespective of IT policy.
Within the enterprise, mobile access and BYOD pose two key challenges. The first is security; every
mobile device connected to the corporate network is a threat, and every personal tablet and smart
phone introduce the potential for data leakage. The second is a lack of native enterprise mobile apps;
while this will change over time, there exists a considerable gap between the Windows and desktop-
centric applications used in the enterprise and the glut of consumer mobile apps.
Most mobile security issues arise because traditional VPNs are being used to connect tablets and smart
phones to the corporate network. While VPNs encrypt the connection between the device and the
corporate network, they also create an open tunnel through which corporate data may escape or
attacks may be introduced. The threat is made worse because it is impossible to lock down personal
devices the way one would a managed device. Also, personal devices are greater in number, are more
prone to becoming lost or stolen and are exposed on a more frequent basis to the risks of personal use.
While mobile device management (MDM) provides control and visibility for personal devices that may
connect to the network —and simplifies the provisioning of apps from an enterprise app store— it does
little to address the security concerns described above. What’s more, brute force wiping of work and
personal data on devices that become lost or stolen creates as many problems as it solves. It won’t be
long before the legal ramifications of destroying personal data as part of IT policy begin to hit home.
Let’s pretend the security challenge is somehow magically solved; as the title of this article asks: Now
what? While it is simple to provide email, contacts and calendaring to personal mobile devices— and it
is relatively easy to deploy a few native enterprise apps— the vast majority of applications remains tied
to Windows and traditional desktop environments. As a result, any solution aimed at enabling mobile
access and BYOD must address not only security concerns, but must also provide a means by which to
bridge the gap between mobile access and the applications employees use every day to be productive
and complete their work. Without access to enterprise applications, employees can bring as many
tablets to work as they like and still not move the needle on business productivity.
In response to these challenges, organizations are leveraging a clever approach that relies on extending
applications running on physical or virtual desktops or terminal services to mobile devices. The solution
takes the form of a scalable secure access gateway— with remote desktop functionality—that supports
a range of mobile devices and a mix of application and desktop environments.
From a security perspective, the approach solves all critical challenges associated with BYOD and mobile
access. First, the security posture of office desktops, managed laptops and server-based resources is
already compliant. Second, unlike VPNs, using remote desktop means that mobile devices never connect
to the corporate network. Because data never leaves the corporate network, the risk of data leakage is
fully eliminated; because devices are kept off the network, the risk of attack is also eliminated. Lastly,
the connection between the mobile device and the secure access gateway is encrypted using SSL— with
the gateway itself acting as a separation layer dividing mobile devices from the corporate network.
The approach also addresses traditional enterprise applications that are not available natively on mobile
devices. Any application running on a physical or virtual desktop or in a virtual environment can be
immediately “mobilized” to provide full access to enterprise applications from personal tablets and
smart phones. Because applications developed for the desktop will not always provide the same user
experience in a mobile environment, secure access gateways take extensive steps to create gesture
suites that provide intuitive control of Windows and desktop applications on tablets and smart phones.
While the experience will never be as polished as an application designed for mobile environments, it is
counterbalanced by the benefits of cost-effectively supporting all enterprise applications, right now.
Looking to the future, traditional enterprise applications will not all be re-developed as native mobile
apps; nor will they go away. An equilibrium point will be reached. To manage this transition in the most
efficient manner possible, enterprises are well served to explore solutions that enable mobilization of
traditional enterprise applications today and provide a foundation for playing a critical role in a broader
enterprise mobility strategy tomorrow.
About the author
Paul Andersen is the Marketing Manager at Array Networks (www.arraynetworks.com). He has over 15
years’ experience in networking, and has served in various marketing capacities for Cisco Systems,
Tasman Networks and Sun Microsystems. Mr. Andersen holds a Bachelors Degree in Marketing from San
Jose State University.

More Related Content

What's hot

Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
IBM Software India
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
DMIMarketing
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
K Singh
 

What's hot (18)

BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Maas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMMaas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDM
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Dreamforce 2015
Dreamforce 2015Dreamforce 2015
Dreamforce 2015
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Why cyber security is a priority for your retail business
Why cyber security is a priority for your retail businessWhy cyber security is a priority for your retail business
Why cyber security is a priority for your retail business
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Technology Used in Business 2020
Technology Used in Business 2020Technology Used in Business 2020
Technology Used in Business 2020
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Samsung KNOX for Dummies
Samsung KNOX for DummiesSamsung KNOX for Dummies
Samsung KNOX for Dummies
 

Similar to I Brought My Own Device. Now What?

4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
Hai Nguyen
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
IBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
IBM Software India
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
kostikjaylonshaewe47
 

Similar to I Brought My Own Device. Now What? (20)

IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security Gap
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 

More from Array Networks

More from Array Networks (20)

Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks
 
Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

I Brought My Own Device. Now What?

  • 1. I BROUGHT MY OWN DEVICE. NOW WHAT? by Paul Andersen, Marketing Manager at Array Networks The consumerization of IT is underway. In its report TABLETS WILL RULE THE FUTURE PERSONAL COMPUTING LANDSCAPE, Forrester predicts sales of 375 million tablets in 2016 with over 750 million tablets in use. Because tablets are productivity enhancing, portable and trendy, employees are bringing them to work in droves. Like cloud computing, mobility is causing businesses to reevaluate their approach to IT. Not long ago, IT was in the driver’s seat—issuing managed PCs, laptops and mobile phones. With full control, IT deployed the software and policies needed to ensure security and maintain compliance. Today, the sands have shifted. Employees want to use tablets and smart phones of their choosing, and with the flood gates open, many employees also want to work from personal computers at home or on laptops better suited to the demands of their role. Commonly referred to as ‘THE CONSUMERIZATION OF IT’ or ‘Bring Your Own Device (BYOD)’, the trend is here to stay. At the top, executives are demanding tablet access to business applications. Among the rank and file, employees are bringing personal devices to work irrespective of IT policy. Within the enterprise, mobile access and BYOD pose two key challenges. The first is security; every mobile device connected to the corporate network is a threat, and every personal tablet and smart phone introduce the potential for data leakage. The second is a lack of native enterprise mobile apps; while this will change over time, there exists a considerable gap between the Windows and desktop- centric applications used in the enterprise and the glut of consumer mobile apps. Most mobile security issues arise because traditional VPNs are being used to connect tablets and smart phones to the corporate network. While VPNs encrypt the connection between the device and the corporate network, they also create an open tunnel through which corporate data may escape or attacks may be introduced. The threat is made worse because it is impossible to lock down personal devices the way one would a managed device. Also, personal devices are greater in number, are more prone to becoming lost or stolen and are exposed on a more frequent basis to the risks of personal use. While mobile device management (MDM) provides control and visibility for personal devices that may connect to the network —and simplifies the provisioning of apps from an enterprise app store— it does little to address the security concerns described above. What’s more, brute force wiping of work and personal data on devices that become lost or stolen creates as many problems as it solves. It won’t be long before the legal ramifications of destroying personal data as part of IT policy begin to hit home. Let’s pretend the security challenge is somehow magically solved; as the title of this article asks: Now what? While it is simple to provide email, contacts and calendaring to personal mobile devices— and it is relatively easy to deploy a few native enterprise apps— the vast majority of applications remains tied to Windows and traditional desktop environments. As a result, any solution aimed at enabling mobile access and BYOD must address not only security concerns, but must also provide a means by which to bridge the gap between mobile access and the applications employees use every day to be productive and complete their work. Without access to enterprise applications, employees can bring as many tablets to work as they like and still not move the needle on business productivity.
  • 2. In response to these challenges, organizations are leveraging a clever approach that relies on extending applications running on physical or virtual desktops or terminal services to mobile devices. The solution takes the form of a scalable secure access gateway— with remote desktop functionality—that supports a range of mobile devices and a mix of application and desktop environments. From a security perspective, the approach solves all critical challenges associated with BYOD and mobile access. First, the security posture of office desktops, managed laptops and server-based resources is already compliant. Second, unlike VPNs, using remote desktop means that mobile devices never connect to the corporate network. Because data never leaves the corporate network, the risk of data leakage is fully eliminated; because devices are kept off the network, the risk of attack is also eliminated. Lastly, the connection between the mobile device and the secure access gateway is encrypted using SSL— with the gateway itself acting as a separation layer dividing mobile devices from the corporate network. The approach also addresses traditional enterprise applications that are not available natively on mobile devices. Any application running on a physical or virtual desktop or in a virtual environment can be immediately “mobilized” to provide full access to enterprise applications from personal tablets and smart phones. Because applications developed for the desktop will not always provide the same user experience in a mobile environment, secure access gateways take extensive steps to create gesture suites that provide intuitive control of Windows and desktop applications on tablets and smart phones. While the experience will never be as polished as an application designed for mobile environments, it is counterbalanced by the benefits of cost-effectively supporting all enterprise applications, right now. Looking to the future, traditional enterprise applications will not all be re-developed as native mobile apps; nor will they go away. An equilibrium point will be reached. To manage this transition in the most efficient manner possible, enterprises are well served to explore solutions that enable mobilization of traditional enterprise applications today and provide a foundation for playing a critical role in a broader enterprise mobility strategy tomorrow. About the author Paul Andersen is the Marketing Manager at Array Networks (www.arraynetworks.com). He has over 15 years’ experience in networking, and has served in various marketing capacities for Cisco Systems, Tasman Networks and Sun Microsystems. Mr. Andersen holds a Bachelors Degree in Marketing from San Jose State University.