As enterprises have adapted to the innovations of mobile computing, it has become evident that technology itself is not the only thing that has changed in the IT landscape. Devices have also driven change in user and workplace behaviour as well, necessitating new responsiveness on the part of organisations in the planning and management of their IT and mobility strategies.
Multiple device access is the new norm and as consumer-grade technology sets new benchmarks for the expectations of users, the need for more adaptive security when integrating personal devices into the larger structure of enterprise computing is increasingly apparent. Classification of information, rather than of a given device, is rapidly proving paramount in the effective management of sensitive data.
Organisations need to focus on people, rather than the technology: how people use technology, how it can be secured and how devices can unlock greater productivity have therefore become primary considerations. What does the user do? Where are they whilst they are doing it? More so than ever before, context matters.
In Technical Considerations for Mobility in the Enterprise, Data#3 reveals how the paradigm needs to shift from the visionary to the pragmatic in addressing the new enterprise computing landscape. This white paper reveals that security policies must follow the class of user and the class of information regardless of the device used for access.
Provisioning such user access has typically placed a heavy burden on IT departments. This is where the right Identity Management (IDM) solution from vendors such as VMware and Microsoft can make a difference, sitting between Active Directory and everything else. To understand more about this and the broader implications of mobility in the enterprise click here.