July 2016 - Triangle Computer Services
HIGHLIGHTING THE GAP BETWEEN IT AND THE END-USER

HIGHLIGHTING THE GAP BETWEEN IT AND THE END-USER

IN AN IDEAL WORLD, THE AIM OF THE IT DEPT GAME…

should be to deliver solutions that empower the user. Thus, reducing the pressure on IT and improving overall employee happiness and productivity.

 

So why do we still see this gap (aside from the monotonous – lack of money, resources, and so on)?

 

Everyday businesses pour massive amounts of time and resources into how the consumer interacts with their technology. Why are we not seeing the same approach within the enterprise? And not just in the tech industry but across the board.

 

The gap seems to be widening as users are empowered in their daily lives, but often not at work. IT can be slow to react to their needs due to this disconnect. It’s impossible to understand how the business consumes technology, what their associated frustrations are, and most importantly where the risks are – without seeing or hearing about it! This lack of opportunity to understand the core business is bringing about a growing enterprise mobility crisis.

 

With a lack of day-to-day understanding – we’re watching the enterprise move from Shadow IT to Shadow Productivity.

 

In today’s world, where we see unprecedented technological advancements at ever decreasing costs, it seems investment in IT should be top priority. It brings too much value to the business to be a side project. You look across all sectors, in all parts of the world – those who are embracing technology are steaming ahead. They have IT embedded in their organisations and allow technology to be in the front seat streamlining business processes, driving efficiencies and delivering a comparable user experience.

 

I read somewhere that the average lifespan of a company has gone from 50 years to 10 years. Those smashing onto the scene and those which are growing dynamically, are the ones who are embracing technology ‘At The Speed of Life’ (to quote VMware). Unless traditional companies are consuming this stuff with the relative speed and agility seen today, the gap will continue to widen.

 

Management across the board should be working with IT to identify bottlenecks and work out what is possible. IT must enlighten decision makers on ‘the possible’ and they (the business) need to be talking in terms of IT. Imagine what would happen if you had a techie at every board meeting. In a board meeting people solve problems – technologies evolution is solely based on solving problems. Merging the hardwired logical techie way of thinking with creative emotion, is proven. Look at FB, Google, LinkedIn. Is that a valuable resource that is being ignored? It could be a culture shift that will see IT providing virtual solutions to real world problems.

 

In the 21st century IT no longer lives in the basement!

 

 

Business and IT priorities must align- and it is up to the business to lead that conversation. Identify leaders within your organisation who ‘get it’, who will drive change on behalf of both sides. Moving past controlled interaction, through pilots and the likes. The message being delivered needs to be altered- Enterprise Mobility Solutions are an absolute no brainer. Delivering business value seen on the bottom line and securing us in a world full of increasing threats to our data.

 

It’s not only businesses that are seeing value through employee mobility and security.

 

In patient care, hospital staff are saving 3-5 minutes per patient, through a one tap sign on system. Is this why we’re seeing a rise in newly appointed Clinical Information Officers (CCIOs)? They’re business purpose being clinical adoption and engagement in the use of technology. Should all verticals be adopting this mindset – will we see Education Information Officers? Legal Information Officers? Insurance Information officers?

Looking to our imminent future, it’s either bridge the gap or fall through the cracks – is this the way to do it?

 

Eagerly awaiting developments and your thoughts…

ACCOMODATING BYOD & SAFEGUARDING SECURITY

ACCOMODATING BYOD & SAFEGUARDING SECURITY

ACCOMMODATING EMPLOYEE OWNED DEVICES…

 

is fundamentally based around the management of the device and OS ecosystem in a secure fashion while not prohibiting productivity, and ensuring employee privacy is not restricted as company IP is protected. With all these considerations, it’s not surprising that companies need direction.

 

As much as IT departments are predicting future user needs and educating them on the possible, so must they be educated themselves.

 

When looking at enterprise mobility most organisations are encountering a number of different issues as the enterprise incorporates new SaaS applications and mobile devices into business process. Password management, legacy application mobile availability and IT resource drain – to name but a few. Triangle are helping organisations overcome this with employee self management portals. This involves a corporate ‘app store’ with single-sign on functionality. Without IT involvement, employees are empowered to download applications which they have permission to access, onto any enrolled device and they will be automatically signed in.

 

They do not actually hold specific login credentials per application, which adds an extra layer of security for the organisation.

 

An effective enterprise mobility strategy is focused on the user, from day 1 through to that employee leaving. Upon enrolment, specific securities policies can be set through a user friendly management portal. That employee has access to all the applications and documentation they need to be productive immediately. Throughout their time there, they are bound to security policies (eg. passcode on the device) which will automatically action restrictions without IT intervention. When that employee decides to leave, data on that device can be quickly wiped and access to corporate applications and data revoked.

 

These policies will be tailored to corporate owned or BYOD devices, which is invaluable with the employee privacy versus IP security debate.

 

The answer we’re seeing to BYOD is the container, which places a wrapped folder on the employee owned device. This holds all corporate data in a secure manner while separating it from any personal apps and data. Suddenly the container can be viewed, in IT management terms, the same as a corporate device.

 

This same idea can be applied to corporate documentation, those which need to be up-to-date – health and safety policies, sales presentations, board papers, contracts and so on. With content lockers, companies can securely push corporate documents onto a container on the phone, where they will always have the latest version. Again, access can be restricted or revoked at anytime, meaning this can be on corporate owned or BYOD devices. There are also a host of productivity add ons to facilitate mobile collaboration.

 

Answering the question of how to accommodate the new world, starts with discovering what needs to be achieved. Mobile being such a growing industry, and user driven space there is hundreds of different use cases and applications. At Triangle we’ve seen a lot of them, we’ve been on this journey since day 1.

 

We’re plotting your business processes and identifying the most appropriate technology to suit the organisation and user’s specific needs.

SHADOW IT TO SHADOW PRODUCTIVITY: THE END-USER THREAT

SHADOW IT TO SHADOW PRODUCTIVITY: THE END-USER THREAT

I’M YOUR TYPICAL MILLENNIAL EMPLOYEE…

 

with unparalleled access to applications that will enable me to do my work quicker and to a higher standard. Google Docs, Prezi, Screenshots… The majority of those applications my IT department have no control over.

 

When I first entered the world of IT – I heard about shadow IT in the context of massive AWS bills coming through the door. My first thought was ‘that’s fair enough’. Developers are under massive pressure to get product out the door- to them that’s the most important thing.

 

But of course MASSIVE security concerns….

 

Now I have entered the world of the end user, it seems many are taking the same approach and I’m the biggest culprit! Let’s face it, when you’re comfortable doing things a certain way – when you will get away with doing it – you will. It’s not a malicious thing, we’re just busy people who want to hit deadlines and reach targets. Which is what an organisation likes to hear.

 

But again, MASSIVE security concerns….

 

And it isn’t just technology, it can be as simple as printing sensitive documents and losing them, or using pen and paper opposed to a CRM! So maybe it’s about rethinking our approach to end-user security. No longer can we throw technology at people and expect them to use it. Technology today is built for the end-user, organisations need to be thinking the same way.

 

I heard someone speak about the future of security. Namely how organisations should be thinking about security in light of such massive growth and innovation in the malware and ransomware space. Your organisation WILL be attacked – what do you do about it when it happens? It can have a small or monumental impact, it’s your policies and procedures that will determine that.

 

pin unlock

 

So taking that premise into our context in the end-user world, what does that mean?

  • Someone will leave a laptop on the bus…
  • Someone won’t put a pin on their device…
  • Someone will copy and paste sensitive data into a 3rd party app….

 

These are the end user threats. We must assume that the rules will be broken and mistakes will be made. It’s human nature! It’s about having policies and procedures built with the user in mind for if and when that happens.

 

In most organisations you have throngs of new tech-savvy individuals entering the workforce. With the economy growing and competition for talent heating up- it’s important to think like they do. Let’s face it, most of this shadow use of productivity apps will never have a real negative impact.

 

But, will it take a massive data leakage for the business to take notice?