Feeds

BYOD turns sysadmins into heroes

Intel China's IT boss on consumerisation

Secure remote control for conventional and virtual desktops

Bring Your Own Device programmes can help to keep staff happy and turn IT bods into "heroes" but the hard RoI from spikes in productivity is unproven, according to Intel’s IT manager for China.

Liam Keating told media at Chipzilla’s Cloud Summit event in Bangkok this week that Intel has around 29,000 employee handsets to manage globally, 60 per cent of which are staff-owned.

However, although consumerisation is one of the chip giant’s four key internal focus areas for IT, he fell short of endorsing the classic mantra that BYOD equals productivity, which is used to justify most investments in such programs.

“People will publish productivity numbers saying you can be more productive on the road … but I don’t really know if you can correlate a hard dollar value to that,” he argued.

“There is an employee satisfaction piece to finishing an email on the train so you can spend more time with the wife and kids and dog at home though – it gives you an enhanced work/life balance, and it feels good to use a cool phone to get work done rather than carrying a large overweight [corporate] laptop.”

Intel deals with the complex and usually costly process of managing staff-owned devices by only allowing the use of operating systems and devices which meet a pre-defined list of basic criteria, Keating explained.

If a handset falls short then email, contacts and calendar may only be provisioned by a third party app, which acts as a “secure environment”, he added.

An extra layer of security is added because BYO devices are generally not allowed on the corporate network.

“You can download any app you want onto your phone but smartphones are a huge target for attacks – the phone doesn’t get onto our network,” he said.

“They can interact with the network, though. They can use the IM capabilities, interacting with an environment that looks like the network but isn’t.”

Keating admitted that a lot of work had gone into supporting IT consumerisation, especially co-ordinating with HR and legal teams to draw up agreements on what to do in the event of a device being compromised, for example.

“We have a lot of things on our plate so having to deal with these consumer devices was an irritant and many hoped initially they would just go away,” he added.

“But now we’ve proved we can do it and do it in a secure manner and the employees appreciated it.” ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.