Tactical Advice

5 Tips on Deploying Tablets

Heed this advice to ease implementation and gain the greatest benefit from tablet devices.
5 Tips on Deploying Tablets

Tablets quite possibly represent the hottest trend in computing since the introduction of the personal computer. A broad range of devices support multiple operating environments, offer enterprise-class connectivity options and sport consumer-friendly price tags.

For users who mostly consume rather than produce content, tablets will become the computing device of choice. At a minimum, their light weight, ease of use, flexibility and convenience point to increasing popularity.

But making the best use of your tablet isn’t a slam-dunk. While tablets have long been used for healthcare, warehousing, logistics, transportation and similar purposes, we expect today’s tablets to handle essentially any application. With just a little work by IT staff, tablets can do exactly that. What follows are some tips for easing the process of deploying tablets and making the most of your organization’s tablet upgrade investment.

1. Enforce Policies

Adding a new device to your arsenal presents a great opportunity to review your key operational policies: security, acceptable use, network selection and personal liability (if you go the “bring your own device” route). Remind everyone regularly that the security of organizational information is of paramount concern, no matter what device is in use.

2. Deploy Mobile-Device Management

IT and network operations need visibility into the status of the device, and many even require more intensive control capabilities, such as being able to wipe a mobile device under some circumstances. Because users can download malicious applications, serious remediation may be required in some cases and should be acceptable as long as users understand the policies applied. Also, consider inventory management, a feature offered by many mobile-device management systems. If your IT department hasn’t yet explored MDM, tablet implementations provide a big motivation to do so.

3. Set Application Strategy

What apps will users be allowed to run? Can they download whatever they want, or will the organization provision a private app store? Will you go with mostly local apps on the tablet, or expand your web and cloud services strategy? I recommend the latter to provide a greater degree of device independence. With all the tablets out there, managing apps for several platforms could become tricky. Verify browser compatibility, and make sure whatever you implement reflects your security policy. In an era of numerous compliance regulations, this is critical.

4. Consider Network Operations

Tablets are fundamentally wireless — wired operation makes no sense in most cases. The load on your wireless LAN will almost certainly increase, continuously and over time, necessitating reconfigurations and upgrades in many cases. Spend some time exploring the management console of your WLAN to verify sufficient coverage, throughput, capacity and room for growth.

5. Strengthen Support

IT support professionals must develop expertise in tablet software and other facilities to minimize end-user downtime and thus maximize overall productivity. This calls for an investment in training. The more quickly problems are resolved, the more quickly people can return to work and the greater the return on investment.

When it comes to tablets, it’s not a question of if or even when. IT organizations can minimize the stress of supporting this important new class of mobile technology through a few simple activities that will benefit IT, users and the bottom line.

Sign up for our e-newsletter

About the Author

Craig J. Mathias

Craig J. Mathias is a principal with the wireless and mobile advisory firm Farpoint Group. A well-known technology analyst and consultant, he’s been active in the field for 20 years.


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.