Brian d kelley cio portage county oh
This presentation is the property of its rightful owner.
Sponsored Links
1 / 26

IT Consumerization Kent State CIS PowerPoint PPT Presentation


  • 121 Views
  • Uploaded on
  • Presentation posted in: General

Brian D. Kelley, CIO, Portage County, OH. IT Consumerization Kent State CIS.

Download Presentation

IT Consumerization Kent State CIS

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Brian d kelley cio portage county oh

Brian D. Kelley, CIO,

Portage County, OH

IT ConsumerizationKent State CIS


It consumerization kent state cis

  • Because of user demand, the iPad managed to penetrate 50 percent of Fortune 100 companies in less than 90 days. Of everyone I spoke with, Frank Modruson, CIO of Accenture, had the most vivid explanation of how the iPad penetrated that organization:

  • “The day the iPad was introduced we had some discussions about adding them into our environment; 24 hours later, we had 500 devices accessing e-mails. People expect their personal devices—iPads, iPhones and the like—to be usable at work. They want to be more productive, they want do a better job, and there’s an expectation that they’ll be able to integrate consumer devices with enterprise applications at the office.

- Nathan Clevenger, author of “iPad in the Enterprise”


It consumerization

IT Consumerization

  • The process of enterprise technology being changed or influenced by new technologies emerging from consumer markets into professional arenas

    Source: http:/www.businessdictionary.com/definition/consumerization.html

    “There is no reason for any individual to have a computer in his home.”–Ken Olson, president and founder of DEC, at a 1977 meeting of the World Future Society in Boston


It consumerization kent state cis

Source: “IPhonePowers Apple Sales

Earnings More Than Double as Demand for Handset, iPad Tablet Continues,” WSJ. July 20, 2011


It consumerization kent state cis

The demarcation between our personal and business life has become very blurred!


It consumerization kent state cis

“By being more flexible, companies are hoping that workers will be more comfortable with their devices and therefore more productive”.


Byoc or byod

BYOC or BYOD!


Surrendering

Surrendering………..

At Kraft Foods, the I.T. department’s involvement in choosing technology for employees is limited to handing out a stipend. Employees use the money to buy whatever laptop they want from Best Buy, Amazon.com or the local Apple store.

A similar B.Y.O.D. program at Citrix Systems, a software maker that also helps its clients implement such programs, saves the company about 20 percent on each laptop over three years. Of the 1,000 or so employees in Citrix’s program, 46 percent have bought Mac


It consumerization kent state cis

Surrendering………..

“Corporate I.T. departments often resist allowing consumer technology on their networks because of security concerns. Adding a hodgepodge of devices and services also complicates their job.

But I.T. departments are gradually warming to the idea simply because their bosses left them little choice. The I.T. staff may grieve for their lost power, but they do it.”


Adopt or fight

Adopt or Fight?


Reality check

Reality Check 

  • IDC surveyed more than 2,600 information workers and 550 IT administrators in nine countries and found that IT administrators aren't aware of how many people use their own devices at work and how extensively they use those devices to access corporate applications.

Source: IDG Study, InfoWorld, July 12, 2011

http://www.infoworld.com/d/mobile-technology/idc-it-hasnt-grasped-consumerization-trend-725


Reality check1

Reality Check 

  • Eighty-seven percent of IT managers said workers get their smartphones and other mobile devices from the company, and that the company covers their costs. Yet more than half of employees with iPhones, Android phones and iPads said they bought the devices themselves, according to the survey.

  • "Enterprises think they are in control of these devices, but in fact they are in control of only a small part of their infrastructure, with a significant number of employees going off the grid in acquiring and using their own devices," IDC said.

Source: IDG Study, InfoWorld, July 12, 2011

http://www.infoworld.com/d/mobile-technology/idc-it-hasnt-grasped-consumerization-trend-725


Reality check2

Reality Check 

  • IDC found that 40.7 percent of devices, including PCs, smartphones, and tablets, that people use to access business applications are owned by the workers. That's up from 30.7 percent last year. Nearly 10 percent of those surveyed this year said they use a personal tablet for work.

Source: IDG Study, InfoWorld, July 12, 2011

http://www.infoworld.com/d/mobile-technology/idc-it-hasnt-grasped-consumerization-trend-725


Reality check3

Reality Check 

  • IT departments also seemed unaware that people are using devices like smartphones and tablets to access company applications. IT managers said they thought 34 percent of staff were using a smartphone to access business apps. But 69 percent of workers said they used smartphones, whether personal or corporate-owned, for business apps. Asked the same question about tablets, IT administrators said 6 percent of workers used tablets, but more than double that number -- 13 percent -- of workers reported doing so.

Source: IDG Study, InfoWorld, July 12, 2011

http://www.infoworld.com/d/mobile-technology/idc-it-hasnt-grasped-consumerization-trend-725


Reality check4

Reality Check 

  • Nor are IT departments moving to support mobile devices. Seventy-six percent of IT staff said they had no plans over the next 12 months to modify internal business apps for tablets and smartphones. An even greater proportion, 89 percent, had no plans to modify customer-facing apps for tablets or phones.

  • Security was the biggest barrier to letting workers use their own devices at work, with 83 percent of administrators saying security concerns were holding them back.

Source: IDG Study, InfoWorld, July 12, 2011

http://www.infoworld.com/d/mobile-technology/idc-it-hasnt-grasped-consumerization-trend-725


Gartner recommendations

Gartner Recommendations

  • Analyze changing demand of the enterprise and younger, digitally savvy end users for IT. Use this insight to develop an IT strategy that includes a multiyear business-driven sourcing strategy, with a thorough exit plan from traditional outsourcing providers, and best-practice provider evaluation and selection process.

  • Understand the risks of IT and sourcing and develop strategies based on potential scenarios to guide appropriate decisions to invest early.

  • Learn more about the benefits and consequences of new delivery models such as cloud computing.


Gartner findings recommendations

Gartner Findings &Recommendations

  • Smartphones based on consumer-oriented designs can interfere with the ability of IT departments to set, manage and enforce secure business practices.

  • Data losses from smartphones are increasing, and will reach breach and disclosure problems comparable to PCs.

  • Limitations and inconsistencies in security functions among different smartphone operating systems (OSs) and in device manufacturer platforms make it impossible for any device vendor to deliver a consistent management and security experience across all major platforms.


Gartner findings recommendations1

Gartner Findings &Recommendations

  • Develop and weight security requirements in all evaluations of smartphones. Mitigate what risks you can, then approach the providers with specific demands for increased security and manageability.

  • Limit business data and business application support on smartphones that cannot be adequately managed. Methods include filtering e-mails to remove attachments, restricting application functions, and using portals instead of local processes and data.

  • Assign liability directly to individuals and business units that override company policies in order to use smartphones in ways that cannot be secured in compliance with company requirements.


It consumerization kent state cis

Q/A

Contact Info:Brian Kelley

[email protected]

330-297-3588


  • Login