Practical IT Research that Drives Measurable Results
Manage the Invasion of Consumer Technology
Info-Tech Research Group 1
IT is often wary of connecting personal mobile devices to the corporate network. While not without
its risks, the benefits usually outweigh the minimal costs. Learn to efficiently and safely manage the
influx of consumer technology.
• This solution set provides practical steps to take when considering or implementing an official stance on the use of
consumer technology in the workplace. It will help readers understand that:
• Like it or not, consumer technology is invading the enterprise. Recent increases in the prevalence
and variety of smart mobile devices make them an unavoidable issue to consider.
• Allowing personal devices in the workplace boosts productivity and end-user satisfaction. The
majority of organizations are allowing them and having great success doing so.
• There are several different mobile platforms. Each has its own nuances. Understand them and simplify
the management of a personal mobile fleet.
• It is not risk-free. Learn about the technologies that can help mitigate potential damage.
• Safely merging the consumer and the enterprise begins with compliance. Draft a policy and hold
training sessions to help employees deal properly with incidents and keep them from happening in the first
If you can’t beat them, join them.
It is safer to facilitate connecting personal mobile devices to the corporate
network than have end-users connect without IT’s oversight.
Info-Tech Research Group 2
• The last two years have seen a marked increase in end-user comfort with smart phones, resulting
in a greater number of employees bringing in personal technology to aid with performing their job
• 83% of organizations surveyed by Info-Tech allow personal mobile devices on their corporate
networks, though most do so only after an employee has signed a policy highlighting the rights of
IT and the end-user regarding data on the device.
• Regardless of whether users are bringing in tablets or smart phones, the majority of IT’s job on the
management side remains the same. Focus on policy creation, management and enforcement.
• Determine what level of mobile security your organization requires – Minimum, Basic, Enhanced
or Lockdown – and implement policies and technology checks and balances accordingly.
• Remote wipe and over-the-air encryption are the most common security functionalities put in
place by organizations at all levels of the security spectrum to mitigate the threat of sensitive data
• Understand that all mobile platforms are not created equal; each has its strengths and weaknesses.
BlackBerry is the most popular personal device on the corporate network due to embedded
infrastructure and advanced out-of-the-box security functionality.
• Finally, securing end-user compliance with internal mobile policy is the largest contributor to
successfully managing a fleet of personal mobile devices on the corporate network.
Info-Tech Research Group 3
Understand Evaluate Strategize Implement
1 2 3 4
Allow personal mobile technology in the enterprise to boost
productivity and end-user satisfaction.
• Don’t dismiss personal mobile devices without consideration; there are
benefits to be had by allowing end users to connect their personal mobile
devices to the corporate network.
• Think nobody’s doing it? 83% of your peers are allowing personal mobile
devices on the network.
• Determine what level of mobile security is best for your organization.
Support consumer technology & an increasingly tech-savvy
workforce to improve productivity
New technology is often met with disdain from the IT group. Understand that new technology
is brought into the workplace by end-users as a facilitator of job functions.
83% of organizations allow end users to connect BlackBerry, Apple iOS, Android, and Windows Mobile
personal mobile devices to the corporate network. make up the majority of allowed personal devices on
Allow Personal Devices 83%
N = 144
Do Not Allow Personal Devices 17%
*Respondents were asked to select all that apply,
resulting in a cumulative total greater than 100%.
Organizations that allowed devices other than BlackBerry, iOS, Android and Windows Mobile were
drastically less successful than those that did not. Allow personal devices on the network, but stick to
the major players to avoid being trapped in a mobile device jungle.
Info-Tech Research Group 5
Embrace tech-savvy end-users; they are assets to the firm
80% of survey respondents cited end-user demand as the primary driver for
allowing personal mobile devices on the network.
IT brings technology to the end-user End-users bring technology to IT
The flow of new devices to the End-users have become more
end-user was governed by IT. demanding about technology.
Users were not tech-savvy enough to The flow of new technology into the
take advantage of personal workplace has shifted from a
technology in the workplace and dedicated IT group to the user.
limited themselves to what was Employees are now concerned with
provided to perform their job roles. using the latest technology to
perform their jobs more efficiently,
and demand that IT keeps up.
The onus of new technology introduction in the workplace has shifted from IT to the end-user.
Info-Tech Research Group 6
Don’t get mired in definitions; manage any mobile device that
connects to the corporate network
Smart phones make up the majority of mobile devices connecting to the corporate
network, but some users may push for tablets and readers. Don’t panic. The variance in
devices does not matter if you have the right management strategy in place.
Employees use these devices to...
• Check corporate e-mail
• Text message
• Instant messaging
• Connect to the Internet through corporate
phones WiFi networks
• Maintain and reference corporate calendars
Tablets and smart phones access the corporate network in very similar ways. Between
iPhones and iPads, for example, there is no difference in the mobile management
Info-Tech Research Group 7
Don’t try to quantify innovation & productivity benefits,
but understand that they are real
There is no accurate way to quantify the innovation and productivity benefits for
employees, but understand that with improved business connectivity, you can
expect the following changes:
Experience quicker… Because end-users will… Third-party apps can be your friend.
Check and respond to Android, BlackBerry and iOS all have
Turn-around time on independent app stores, which contain
their e-mail more often
time-sensitive e-mails. mobile applications, some of which are
aimed at improving productivity (though
some are productivity killers). Look into
apps aimed at corporate productivity and
Be more aware of their connectivity for quick wins with
Meeting setup times.
availability. employees. Apps designed to transfer
SMS text messages over data networks as
opposed to cellular networks, for
Flow of information Generally be more in example, allow users to send unlimited
between internal and touch with the text messages. Most personal devices can
external parties. organization. also connect to virtual desktops.
Info-Tech Research Group 8
Case Study: YMCA’s experience with cost reduction
Segment: Small Enterprise
“ We had a reduction in costs from no longer covering the
monthly bills. We were spending about $4,000 a month in
Source: Information Technology Executive contracts and now we spend nothing.
-IT Executive, YMCA
Pain Point Solution Insight
• Administering and • Allowed senior employees • Even if they were already
paying for corporate to keep corporate-issued given corporate devices,
devices was significantly phones, but mandated employees can be
driving up costs. that data and voice convinced to attach
• The organization needed contracts were personally personal mobile devices
to find a way to maintain held. to the network.
connectivity with • Junior employees were • If the cost of managing a
employees, but remove stripped of mobile corporate mobile device
the cost burden of devices and encouraged fleet is becoming a
maintaining corporate to bring in personal burden on IT, consider
liable mobile devices. devices to connect to the switching to a personal
network. device setup. Gift
• Saved $48,000 a year in formerly corporate
mobile contracts alone. devices to soften the blow
of transferring the cost to
Info-Tech Research Group 9
Embrace the Apple effect: the iPhone 3G exploded by being a
multi-function communications & recreational device
The introduction of Apple’s iPhone 3G in 2008 spurred a smart phone craze
among recreational end-users, raising their comfort with technology.
The iPhone 3G’s carrier- The iPhone 3G was viewed as
subsidized pricing opened the the first practical convergence
doors to smart phone adoption device; it eliminated the need
for the common man. for multiple devices.
With a subsidized price of $200 in The price tag of the iPhone and an
2008, 48% of iPhone 3G adopters accompanying plan were not feasible
were from households earning for lower-income markets – as a
between $25 000 and phone. But the value gained from
$50 000 annually. eliminating the need to purchase
multiple devices spurred adoption of
the iPhone as an affordable does-it-
Source: comScore all gadget.
“ Smart phones,and satisfying demand for a single appealing to a new
and the iPhone in particular, are
device for communication
and entertainment, even as consumers weather the economy by cutting
back on gadgets.
Info-Tech Research Group 10
Define your security needs based on the sensitivity of your data,
and act accordingly to optimize device management
The level of policy enforcement and security your organization requires is
contingent upon regulatory compliance requirements and data sensitivity.
Minimum Basic Enhanced Lockdown
Companies that do not Companies that are Enhanced security measures Lockdown is necessary for
provide employees with any concerned with employees must be taken by those organizations that
sensitive data (e.g. trade carrying sensitive data in organizations that have must adhere to regulatory
secrets, fiscal information, their corporate e-mail highly sensitive data in compliance and house
and press releases) do not accounts must create a employee in-boxes and potentially damaging
need to invest in mobile device policy to calendars. These business data on end-user
infrastructure to increase enforce the right to remote organizations must develop a devices. In general, these
device security. Creating wipe user devices and mobile device policy, organizations should only be
end-user mobile device mandate password conduct training, and considering BlackBerry.
policies and conducting protection. End-user training consider limiting adoption to Those that accept other
training for such on policy and compliance are only devices with over-the- devices must implement
organizations is often also required. air encryption, such as third-party management
unnecessary. BlackBerry. tools, policies, conduct
training, and limit device
Organizations with more employees had less success in allowing personal devices on
their networks. Large organizations should be particularly stringent in mitigating the
risks of incorporating consumer technology, and look towards Enhanced and Lockdown
levels of mobile security.
Info-Tech Research Group 11
Understand Evaluate Strategize Implement
2 3 4
Multiple mobile platforms exist for end-users; understand the
nuances of each.
• RIM’s BlackBerry offering excels at security, but iOS and Android have
traditionally been more fun; these lines of differentiation are beginning to
blur as BlackBerrys get more fun, while iOS and Android become more
• The majority of organizations allow BlackBerrys and iPhones on the
corporate network, with Android catching up fast.
• Match your level of required mobile security to the platforms you can and
cannot accommodate on the network.
Three players dominate the smart phone market
Each available platform offers benefits and disadvantages relative to competing solutions; more
importantly, the cost of infrastructure will be impacted by what you decide to support.
BlackBerry Apple iOS Android
• Developed by Canadian • Developed by California-based • Seeded by Google in 2005,
company Research In Motion, Apple Inc., iOS runs only on Android-based handsets started
the BlackBerry was introduced Apple devices, such as iPhone, to become available in 2008.
to the market in 2002. iPod Touch, and iPad. • Unlike BlackBerry and iOS,
• Unlike the Android and iOS • The original iPhone OS was Android is not a manufacturer-
offerings, BlackBerry has a introduced on Apple’s first specific OS and runs on
limited app store. iPhone in 2007. handsets from a variety of
• Requires implementation of • The OS is updated with new manufacturers.
BlackBerry Enterprise Server releases of the iPhone and also • The OS is the only one of the big
(BES) or BES Express to sees regular patching between three available as open source
integrate with the corporate major updates. under the Apache Software
e-mail infrastructure. • The Apple app store is the License.
• Security is the platform’s biggest largest of any mobile platform, • While not as large as the iOS
strength, as data is encrypted on now carrying over 300,000 app store, the Android
the device and over the air with apps. application pool is growing
a native BES setup. • The security offering of iOS quickly, and contains over
(renamed from iPhone OS) is 100,000 apps.
less robust than BlackBerry, but • Security offering is slightly less
is adequate for most effective than iOS out of the box,
organizations and can be as Android does not support as
improved with 3rd party many ActiveSync IT policies.
technology. • Ranked first among all smart
phone OSes sold in the US for
Info-Tech Research Group 33%.
the 2nd quarter of 2010 at 13
BlackBerry dominates the market in terms of security features,
but offers little to recreational end-users
68% of businesses allow BlackBerrys on their corporate network.
Company Security. Native security features beat out iOS and Android.
Dedication to enterprise. RIM dominates in the enterprise,
Research In Motion (RIM) and would like to keep it that way. BlackBerrys and the upcoming
RIM PlayBook tablet will continue to focus on business features
but are rapidly catering to the consumer market as well.
Headquarters Physical keyboard. Most business uses require quick text-
based communication. Many users find that a physical keyboard
Waterloo, Ontario has an advantage over the touch-screen-only input of the iPhone
and some Android devices.
Primary Advantage Challenges
The ugly duckling. With the exception of the touch-screen-
Security features are largely equipped BlackBerry Torch, the buttons and menus of BlackBerrys
ahead of competitors. are starting to look dated. A non-intuitive interface means more
help desk calls asking which thing to press to make it do that thing.
Primary Disadvantage Smaller app store. Having fewer apps than other platforms may
limit on-the-go productivity that requires specific software, and be
Smallest app store less appealing to users.
Bottom line: as the security leader, there is no reason to disallow
BlackBerry. For businesses with compliance regulations or sensitive
data, it may be the only option.
Info-Tech Research Group 15
Offering the largest app store & strong multimedia capabilities,
Apple’s iOS is the people’s choice
50% of businesses allow iOS devices on their corporate network.
Company Employee demand. With the recent introduction of the iPhone 4
and iPad, iOS devices lead in new connections to corporate
Apple Inc. networks in 2010.
Ease of use. A user-friendly interface and walled-off app store
mean more employees using their devices without issue, and fewer
Headquarters cries for the IT department’s help.
The most apps, the most fun. There are plenty of productivity
Cupertino, California apps in Apple’s massive store, allowing employees to keep in touch
on the go. The hardware is ideal for consuming media.
Primary Advantage Challenges
Enterprise ready? Although Apple is finally taking enterprise
Largest app store & seriously with iOS 4, the corporate environment is still not the iOS
community device’s native habitat. BlackBerry is at the top of the enterprise
Primary Disadvantage The most apps, the most fun. The same multimedia and app
capabilities that aid productivity can distract from corporate goals.
Security is lacking in More apps also means more potential for security breaches or
comparison to the BlackBerry accidental sharing of sensitive data.
Bottom line: give the people what they want. Allow iOS devices unless
there are specific reasons not to.
Info-Tech Research Group
Android remains the only open source offering in the big three,
and is gaining market share quickly
30% of businesses allow Androids on their corporate network.
Company Future proof. Androids are taking over the world. Google’s OS is
the fastest growing platform of 2010, with a thriving ecosystem of
Google Inc. hardware and apps. Android is unlikely to self-destruct any time
Open development. An open development platform allows easy
Headquarters access to productivity apps, or development of custom apps to fit
the organization's needs, without the hassle of requiring third-
Menlo Park, California party approval.
The cost of openness is security. Fraudulent apps can and
have been developed to gather and transmit sensitive information
Open source OS
for nefarious purposes. Determining an app’s trustworthiness is left
to the end user, who may not always be the best judge.
Primary Disadvantage Fragmented. With a variety of devices made by several different
companies, some with custom versions of the OS, demand for
Concerns about applications support may be more frequent and more taxing compared to the
storing and distributing more focused iOS and BlackBerry lineups.
Bottom line: you will encounter an Android soon. Learn to deal with
its potential security limitations.
Info-Tech Research Group 16
Windows Phone & Symbian round out the top five, but are
significantly less popular among North American end-users
Windows Mobile Symbian OS webOS
• Microsoft’s Windows Mobile OS has • Originally owned by Finnish • First appeared on the Palm Pre smart
been on phones since 2000. corporation Nokia, the Symbian OS phone in 2009.
• Windows Mobile is being phased out has been on smart devices since 2000 • Palm was recently purchased by
to make room for its successor, and became open-source in 2010. Hewlett-Packard. HP is dedicated to
Windows Phone 7. • Symbian is the worldwide leader, updating webOS and leveraging it into
• Early buzz pegs Windows Phone 7 as powering nearly half of all smart new smart phones, as well as tablets
impressive, but it remains to be seen if phones sold, but lacks penetration in and other devices.
it will be another mobile OS North America. • Although webOS does not currently
contender, or too little too late. • Runs on a variety of phones. have a large market share, HP’s
• Open development, but tightly • Open development platform, but enthusiasm makes it worth watching.
controlled app store. certain capabilities require • Runs only on Palm branded devices.
• Typical security features present, with authentication. • Uses existing technologies such as
some extra protection for good • Security has been a problem, but HTML5, Java, and CSS for easy
measure. increasingly stringent app development. Development requires
• Exchange and Mobile Office are useful requirements have alleviated most registration, but is open and free for
in enterprise, but primary audience is threats. in-house applications.
consumer market. • Compatible with Microsoft enterprise • Focus on integrating email, calendars,
solutions, such as Exchange and social networking (including
ActiveSync. Exchange ActiveSync support)
facilitates constant connectivity.
Info-Tech Research Group 17
A few management solutions embrace many platforms
Although each platform has its own challenges and idiosyncrasies, there are commonalities
that make managing them less daunting than it first appears.
• All platforms discussed here support Microsoft
Exchange ActiveSync for e-mail, contacts,
calendars, and tasks.
• Basic security features, such as requiring a PIN,
are present on all modern devices.
• The fundamental connectivity apps – e-mail,
contacts, and calendar – are native to all devices
and fairly intuitive to an increasingly
• Tablet computers have emerged from obscurity
wearing the same operating systems as smart
phones, and they are managed in exactly the
• The sharpest divide is between BlackBerry and
BES 3rd Party Exchange all other platforms. Management solutions such
as BlackBerry Enterprise Server only work with
BlackBerry. Third-party solutions like Good
Technology, MobileIron, and Sybase iAnywhere,
work with everything but BlackBerry.
Info-Tech Research Group 18
Understand Evaluate Strategize Implement
There are various risks involved with each platform; learn what they
are, and how to mitigate them most effectively.
• Data leakage and increasing support costs are the organization’s primary
arguments against personal mobile device adoption.
• Remote Wipe and Over-the-Air (OTA) Encryption are the most effective
ways to ensure lost or stolen devices do not leak sensitive information,
and that information is not intercepted while in transit.
• Third-party infrastructure, such as Good Technology, Sybase iAnywhere,
or Mobile Iron are effective tools for organizations with Enhanced or
Lockdown mobile security requirements.
Technological features, such as remote wipe and over-the-air
(OTA) encryption, decrease data security risks
Native functionality on the BlackBerry via BES and BES Express, iOS and Android
devices require third-party infrastructure, including Exchange ActiveSync, to implement
remote wipe and OTA encryption.
Remote Wipe OTA Encryption
Remote wipe functionality provides IT OTA encryption allows IT to encrypt
with the access to wipe a device back to messages in transit between corporate
factory defaults in the event it is lost or mobile devices. The encryption prevents
stolen. Organizations that require them from being intercepted and decoded
Enhanced or Lockdown levels of mobile by a third party. Again, this is largely a
security must include a remote wipe concern for organizations that require
agreement in their mobile policy and Enhanced or Lockdown levels of mobile
invest in 3rd party infrastructure to enable security. An investment in third-party
remote wipe on iOS and Android devices. infrastructure is required to enable this
functionality on iOS and Android devices.
Info-Tech Research Group 20
Leverage Exchange ActiveSync mailbox policies across Android &
iOS personal devices to minimize security threats
Exchange ActiveSync mailbox policies enable IT to apply a common set of policy and
security settings to individual or grouped users to efficiently control data connections to
At a minimum, implement the following Exchange ActiveSync policies across varying levels of mobile security:
Minimum Basic Enhanced Lockdown
• Enhanced, plus the
• Require encrypted S/MIME
• Basic, plus the following: messages
• Require device encryption • Require storage card
• Minimum, plus the • Password expiration
following: • Minimum device password
• Password enabled • Over-the-air encryption via complex characters
• Device encryption enabled 3rd party infrastructure
• Remote wipe • Maximum failed password
A full listing of available Exchange ActiveSync
policies is available via Microsoft TechNet, here.
Info-Tech Research Group 21
Consider third-party servers as critical to
successfully managing personal mobile devices
45% of organizations that are facing issues with end-
user policy compliance adopt third-party
infrastructure to manage personal mobile devices.
Organizations that use third-party infrastructure to manage
personal mobile devices were 20% more successful than those
that did not.
• Third-party infrastructure, such as Mobile Iron, Use
iAnywhere Afaria, and Good Technology enable Do Not Use
advanced encryption and management functionality.
• Organizations that adopted third-party infrastructure
Degree of Success
to aid with personal mobile device management were
markedly more successful than those that did not.
“ Using than not, but with sensitive data itmore
a [third-party] server is a little bit
the best option. The third-party server makes 50%
our iPhones as secure as the BlackBerrys we
have on the server. 49%
- IT Director, Entertainment
BES Exchange Third-Party
Info-Tech Research Group
Understand Evaluate Strategize Implement
Draft a policy and conduct training sessions to ensure users abide by
it to mitigate security risks.
• Having employees sign a personal device mobile acceptable use policy
that outlines the rights of IT is critical to data security, especially in the
event of loss or theft.
• Signing a policy isn’t enough; run training seminars with employees to
ensure they understand the policy’s nuances.
Draw a line in the sand: tell end users what they can and can’t
do to decrease the effect on support costs
Do support end-users with the following problems: Don’t support end-users with the following problems:
• My phone won’t receive e-mails. • My phone wont turn on.
• My phone and calendar won’t sync. • My phone is frozen.
• My phone can’t access Active Directory. • My screen is cracked.
52% of respondents strongly agreed with the following statement:
Help desk support requirements have increased [since allowing personal devices on the network].
The majority of survey
respondents interviewed saw an
increase in support costs after
n = 113 permitting personal devices on the
network. Those that did not
focused heavily on developing a
policy that outlined resolution
options for common issues.
In short, when it comes to personal device support, focus on mitigating connectivity
issues with corporate infrastructure. Leave end-users to manage their own devices
when it comes to hardware and support issues.
Info-Tech Research Group 24
Maximize the potential for success by securing user compliance
with internal personal mobile standards
Policy training and enforcement, coupled with technological Success was defined by survey respondents’
enforcement, are the largest drivers of user compliance. rating of the following factors:
User Compliance Mobile Security Incidents
Organizations that saw mobile security
Policy 7% Contribution to user compliance. incidents decrease were deemed more
successful than those that had not.
Helpdesk Support Requirements
Organizations that saw helpdesk support
requirements decrease were deemed more
Policy 54% User successful than those that had not.
Organizations that saw costs decrease were
deemed more successful than those that had
Enforcement 35% Accessibility for Remote Employees
Organizations that saw accessibility for remote
employees increase were deemed more
User compliance is the single largest predictor of success when successful than those that had not.
allowing personal mobile devices onto the corporate network,
accounting for 13.5% of the variance in success.
Info-Tech Research Group 25
Develop a policy to ensure that end users are informed of
what is & is not acceptable
Use the Personal Mobile Device Acceptable Use
Policy to outline:
• IT’s right to remote wipe mobile devices in the event
of loss, theft, malware infection or compliance
• IT’s right to refuse access to the corporate network to
any end-user deemed unfit.
• The expectations of the end-user to adhere to strict
data confidentiality standards.
• The requirement that end-users implement
alphanumeric passwords on mobile devices.
• The level of support end-users can expect from the
internal service-desk regarding personal mobile
Info-Tech Research Group 26
Conduct training sessions to reinforce the policy &
provide behavioral examples
Use the Personal Mobile Device Policy Training
Slideshow to reiterate and highlight:
• The purpose of the personal mobile device acceptable
• The major points of the personal mobile device
acceptable use policy, especially security and
• A case study highlighting appropriate actions in
common situations, such as device loss or theft.
• Consequences for failing to adhere to the policy.
• IT’s rights regarding wiping, restoring, and managing
personal mobile devices.
Info-Tech Research Group 27
Respondents cited security as the foremost reason for not
allowing personal mobile devices on the corporate network
Data and corporate security remain the largest factors against personal mobile devices
in the workplace, but support, policy enforcement, lack of control, and corporate
liability also remain significant detractors from adoption.
Info-Tech Research Group 28
Corporate mobile devices – soon to be a thing of the past
Info-Tech predicts major upcoming changes in the way users
perceive and interact with mobile devices.
As personal mobiles infiltrate the organization, the days of corporately owned devices are numbered.
83% of survey respondents allow personal mobile devices on the corporate network; Info-Tech believes this
to be the beginning of an increasing trend, resulting in adoption of personal mobile devices. The increase in
personal devices coupled with the continued pressure on IT to reduce spend will result in corporate devices
going the way of the dinosaur in favor of personal mobile devices.
Android will be the number one mobile platform by 2013.
Current industry rates show Android to be the #2 player in the mobile platform market, and gaining quickly.
Info-Tech believes that the development potential of the platform and the multi-manufacturer support it has
received, Android will be the uncontested market leader by 2013.
The differentiators between app stores across platforms will move from quantity of apps to quality & usefulness.
App stores are currently using the quantity of apps as a selling point for the recreational user. Info-Tech
believes this driver will begin to dissipate as app stores converge on functionality, with resulting quality and
usefulness becoming primary drivers.
Info-Tech Research Group 29
• Consumer technology is invading the workplace. However, unlike an alien invasion, incoming
personal devices bring great potential benefits to humanity – and to the IT department. Reduced
costs and increased productivity follow tech-savvy employees into the enterprise.
• The current big three mobile platforms – BlackBerry, Apple iOS, and Android – each have their
strengths and weaknesses. Understand how to leverage the strengths and avoid the weaknesses of
every personal device that comes in.
• Stick to the major mobile platforms to avoid management headaches, but be up to speed on the less
popular offerings, and realize that a variety of platforms does not always mean a variety of
management techniques and technology.
• Define your security requirements and take a personal device stance that aligns with them. At a
minimum, have a password policy and enable remote wipe as an option. Consider more advanced
options and/or third-party management technology, if users are storing sensitive data.
• Focus on the biggest determinant of success: user compliance. Have a clear policy, and train users
to be aware of how to properly use their device in conjunction with the corporate network. Put
down limits on what IT can help with, to avoid increased support costs.
• Info-Tech believes that corporately-owned devices are being driven off the planet in favor of the
new rulers-of-mobile in the enterprise: personal devices. Adapt or face extinction.
Info-Tech Research Group 30