How users are changing it architecture (and how you can stay ahead of the curve)


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

How users are changing it architecture (and how you can stay ahead of the curve)

  1. 1. How Users are Changing IT Architecture (and How You Can Stay Ahead of the Curve)Due to the proliferation of consumer devices being used in the workplace, the usersthat IT departments serve are completely different than in years past. The game hastotally changed in terms of security, loss of control and support. Employees havemultiple devices and expect accessibility to essential apps and company datawhenever they want. To successfully deal with these changes, IT departmentshave to move away from a device-centric approach but still maintain efficiency.It’s the User, Not the DeviceYears ago, workers would sit at one computer, work for 8 hours and go home.Now, employees can access company data anywhere: on their way to work throughtheir iPad, on a laptop at their desk, through their smartphones after hours.Employees are constantly connected and working from different platforms. IT hasto maintain control over the what, when and where of data being accessed. It’s notabout limited BYOD, but rather about being aware of the different devices,different platforms, and different applications one user will consume in just oneday. To achieve this, your IT department must find ways to automate processes inorder to keep up with efficiency.One company that is working to help companies automate processes in the face ofBYOD is ForeScout Technologies, which provides automated security controlplatform software and hardware that allows customers to increase infrastructureaccessibility while remaining highly secure. According to Forrester, the companyis the top ranked network access control vendor by product offering and execution.“Network access control basically allows companies to in real-time apply policiesto all IP devices that are attempting to attach to corporate network, whether it beservers, desktops, notebooks, phones, videophones or printers,” according to ScottGordon, vice president of worldwide marketing, in this article from MSP News.“Administrators can activate policies that allows the user or device immediate andfull access, or if there is an issue, would potentially deny users access, limit theiraccess or attempt to fix or resolve some of the security issues resolved with thatdevice in a highly automated fashion.”
  2. 2. IT-as-a-ServiceThere are many different ways to deliver technology to employees, from localservers, to the cloud, to virtualized desktops. But each method is not a one-size-fits-all solution. For example, a centrally-hosted virtual desktop would beproblematic for a mobile worker. If IT departments move to an “IT-as-a-Service”model, they can provide the necessary applications at the request of employees,with delivery of these applications being automated. IT-as-a-Service requires adeep awareness of how technology is consumed among different employees. Itserves both the needs of the employee and the needs of IT, allowing employees toget what they want when they want it while allowing IT to keep track of howtechnology is being used.Users Changing Network TechnologyAn example of a company at the forefront of changing network technology due tonew user behavior is Enterasys and its solution OneFabric Edge. OneFabric Edgeis a purpose-built architecture for edge networking to support mobile applicationdelivery. It incorporates both wired and wireless networks, allowing enterprises todeliver high quality applications to mobile users at any scale. OneFabric Edgeprovides both a detailed and holistic view of a company’s entire network. It givesinsight into the who, what, where, and which into the technology being used in thecompany. With this complete overview, it’s much easier to create unified policiesacross the network while at the same time be able to differentiate users and giveeach user the necessary access they need. OneFabric Edge allows IT personal totroubleshoot much faster if a problem should occur, allowing a much morepleasant user experience.This product was born due to the increase of BYOD programs in the enterprise.As Enterasys VP of Market Ram Appalaraju said, this is the product that customersdemanded. It’s a way to manage the multiple devices that are infiltrating theworkplace, while still addressing security concerns and creating unified policiesimportant to the IT department.How has the consumerization of IT changed the architecture of your ITdepartment?For more information visit: