Feeds

Those demanding mobile users

Please IT, can we have some more?

  • alert
  • submit to reddit

Boost IT visibility and business value

Workshop For years, when we asked Reg readers what worried them about mobile, "security" was top of the list. Now business mobility has become a victim of its own success in many organisations, at least when looked at from IT's point of view. The problems of managing user expectations, integrating kit or compliance are familiar if you work in IT.

Security has dropped to fourth in your list of concerns in our latest Reg reader study on mobile technology adoption - though it is still rightly high in the rankings, given the push by governments to tighten data protection and security through regulation.

The four biggest worries are all a function of more pervasive and mature use. As adoption has escalated, and business users have gained experience, they want to do more than simply keep up with their email. Senior managers, sales staff, and other field personnel want a greater range of applications and services. This adds to the development and integration load on IT.

The problem is that many users often fail to appreciate that what they perceive as a simple requirement involves complex work. This is human nature, but everyone gets frustrated when IT says "No", or at least tries to slow things down while the practical, resourcing and cost implications are properly worked through. This is the root of your expectation and business change management problems.

More devices means more device management problems. Policy enforcement means security, privacy and compliance problems turn up again in a different guise. Then there are the practicalities of software distribution, distributed data management, hardware maintenance and so on. The more devices, the bigger the problem.

Then there is security: more of us than would care to admit have left our laptop on the train, or mobile phone on top of the car. We thank our lucky stars that it wasn’t high profile enough or poorly secured enough to make the headlines.

Fortunately technology has progressed. IT professionals have wised up to the nature of the problem. We understand mobile security better, even though we don't always do a comprehensive job of it.

It is more surprising that compliance and privacy are further down the list. The Financial Services Authority (FSA) in the UK is reviewing the need for the UK financial sector to record mobile phone calls and texts made from business devices by employees of regulated companies to improve governance and to bring them under the same rules as fixed-line communications. Regulation will probably follow. Mobile operators are already helping companies deal with this, because other countries and other sectors will follow.

While many regarded mobile technology as "separate" from mainstream IT, the more it has become part of our lives, the more it simply looks like another set of technologies that needs to be embraced and managed as part of the overall IT and operational plan.

If mobile solutions are not integrated into existing IT processes, management systems and policies, then the disjoints will - at best - mean you duplicate effort and unnecessary costs in many areas. If you don't coordinate policies, it creates risk.

We want to know how you handle users who want everything yesterday, or how you integrate mobile with existing IT processes. If you've succeeded or failed, tell us what you learned. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
EE plonks 4G in UK Prime Minister's backyard
OK, his constituency. Brace yourself for EXTRA #selfies
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.