Tactical Advice

Mobility and Consumerization Are Birds of a Feather — Quick Take

BizTech Quick Take is our digital tour of the web, serving up news and notes on IT and business that you need to know — and some things you’ll simply be glad to know.
Mobility and Consumerization Are Birds of a Feather — Quick Take

The unthinkable for some IT departments is happening right before their eyes and there’s little they can do to stop it: Users are bringing their own devices into the corporate network.

If you haven’t given thought to a solid BYOD plan yet, you might understandably worry about the security and compliance implications. Some might argue, “Well, if users want mobility, why don’t they just use company-provided mobile devices?” Because, they don’t wanna.

It may sound childish, but users are going to use the mobile devices that they’re most comfortable using. And if they can get away with having to carry only one smartphone rather than two, they will.

Gartner Fellow Mark P. McDonald explores the symbiotic relationship between mobility and IT consumerization further in a post for the Gartner blog. He urges IT workers to embrace the trend, rather than fight it.

While it’s possible to keep [mobility and IT consumerization] apart, I believe in recognizing that those looking for consumerization are also looking for mobility. There is little difference between the two and creating effective solutions to both comes from re-imagining IT’s role in ways that see consumerization as a complementary rather than competing technology.

Read more about mobility and IT consumerization in McDonald’s post on the Gartner blog.

For more great stories from around the web, visit our list of 50 Must-Read IT blogs.

Sign up for our e-newsletter

Security

Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
Tools to Maintain Mobile Sec... |
Far-flung devices pose serious challenges, but a variety of technologies can help protect...

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...
The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...
XP-iration Date: Today Is th... |
It’s officially lights out for Windows XP as an operating system. Here’s how the world is...