Feeds

Making life easier for the road warrior

Delivering stability for the movers

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Workshop In the past decade we have witnessed the use of laptops in organisations reaching similar levels to those of desktops. All the signs are that the penetration of such machines will soon exceed that of their immobile siblings. Today, they are more than status symbols. They are established as essential business devices, without which many users would find their jobs difficult, if not impossible, to perform adequately.

As the volume of mobile users is growing in many businesses, what can be done to make their lives easier? Is it possible to deliver more stable services to staff and to better protect the devices and the company information they hold as users travel from airport to hotel to customer, and maybe even home?

We know from previous feedback supplied by Reg readers that supporting remote and mobile workers poses more than a few challenges. Indeed, from some of the reports that you have sent in, helping users who are not close by for a quick desk-side visit can be extremely stressful for all parties.

How can the devices that such users rely on be managed most effectively? The basics appear to be clear, although having the ability to deliver on them can be subject to considerable constraints in access to suitable budget availability, time and human resources.

The key stages can be summarised as:

  1. Know what kit you have ‘out there’, and who is using it and why. (How else can you ensure that they are well supported and that appropriate management/service delivery and protection solutions are in place?)
  2. Deploy suitable management tools and service solutions to support the users.
  3. Ensure that the support processes employed by the help desk have been crafted with remote and mobile users in mind.
  4. Train everyone - the help desk, support professionals and the users.
  5. Try to manage the service expectations of remote users.

Each of these steps, individually, is not steeped in rocket science. But we do know that few organisations have the ability to undertake even step one with any degree of accuracy or regularity. We also have your acknowledgement that getting company acceptance of the need for investment in any management tool technology is by no means straightforward, and it's well known how infrequently training budgets actually create trained users.

The failure of organisations to understand the benefits achievable through good investments in these areas is difficult to comprehend, especially as the tools available to support these areas are getting easier to implement all the time.

The last step, trying to manage the expectations of users, is extremely difficult, especially in an organisation where IT and users only communicate regularly via the help desk. But this step is probably the cheapest to take, in terms of capital spend and can, when well executed, have a considerable impact on how well IT support, and almost by definition, IT itself is regarded.

What we do know is that the users’ expectations of service levels get ever higher. It is also clear that more users wish to work remotely, and ‘expect’ to do so using an ever expanding portfolio of PCs, laptops, netbooks and smart phones, company ratified or not. The pressure on help desk and IT support staff will mount.

So, while all is not doom and gloom, we would like to know how you are tackling these matters. Do your remote and mobile users cause you more problems than those in the office? And how do you help them? We’d like to hear about the ways you have discovered to make supporting remote users more effective and less disruptive. What roles do desktop virtualisation and encryption hold as we move forward? Whether your salvation has been found in the tools you use or the processes you have established, please give us your feedback in the comments area below. ®

Application security programs and practises

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.