- Top 10 Recession-Proof IT Jobs
- 7 Hot IT Jobs That Will Land You a Higher Salary
- Link Building Strategies and Tips for 2014
- Top 10 Accessories for Your iPad Air
Network World - Despite the abundance of expert opinion, commentary and debate surrounding BYOD and mobile device use in the enterprise, there are still few clear answers to some of the biggest problems out there, according to a panel of experts that spoke at Interop Thursday.
There was general agreement that traditional mobile device management – which generally focused on locking down entire devices – was insufficient in an age of employees demanding to use their own gadgets for work.
|How Facebook aims to reinvent hardware|
|Interop: the quiz|
|Interop planning guide 2013|
|Wicked cool things to do in Las Vegas – after the tradeshow|
Ahmed Datoo, Citrix's product marketing vice president, said that while there are still use cases out there for MDM, such tools are frequently “insufficient” for more sophisticated deployments.
“I think that the evolution of how people are using mobile devices has caused a change in thinking about what else is needed,” he told the audience.
Other panelists echoed the idea that rapidly growing complexity has made it difficult to use traditional methods of handling BYOD.
Control was a lot simpler in the days when all IT departments had to deal with were corporate BlackBerries used almost exclusively for email, according to VMware Senior Director Srinivas Krishnamurti. But times have changed.
“I think ever since the iPhone was introduced, the more profound thing than BYOD is just in terms of how users use [their devices] has changed,” he said.
Essentially, businesses now have to provide security and services to employee-owned devices while leaving personal data and apps untouched.
For his part, SAP Americas Vice President Tony Kueh advocated simply issuing company devices to sidestep the issue entirely.
“Every single one of [our customers] asks us about BYOD,” said Kueh. “But at the end of the day, based on the applications we’re deploying, none of them are doing it.”
He also noted that SAP has put its money where its mouth is on the issue – the company purchased 17,000 iPads in 2010, for use by field staff.
“Steve Jobs – Apple is a customer of SAP – called up [SAP CEO] Bill McDermott and said ‘What are you doing? Are you trying to sell these in the secondary market?’” Kueh said.
[Kueh contacted Network World after publication to clarify that SAP doesn’t advocate direct purchasing of devices in all cases, and that he was referring only clients with high security requirements here.]
However, many are trying to address the issue of BYOD directly – which, at the device level, requires either a solution so comprehensive that it can handle any of the myriad devices that can be brought in, or buying into the few OEM-supplied methods available, like Samsung’s Knox or BlackBerry’s Balance.
Another idea, however, is to move away from device-level management and attack the problem at the application level, by building strong encryption capabilities and other security features into company-issued apps. FixMo Chief Marketing Officer Tyler Lessard said his company does this via a specialized SDK that clients can use to develop apps with the appropriate security, but that others use the container approach by simply adding pre-set code to existing apps.