Get Instant Access
to This Blueprint

nil icon

Manage the Invasion of Consumer Technology

Mobile devices in the enterprise... now, it's personal.

  • End users are bringing in personal mobile devices to increase job productivity.
  • IT has difficulty managing these devices and ensuring the security of the network they connect to, and the data stored on them.
  • Depending on the level of mobile security required, IT can implement policies, conduct training, or install third-party infrastructure to mitigate the risk of allowing personal mobile devices on the corporate network.

Our Advice

Critical Insight

  • Allowing personal mobile devices increases employee productivity and job satisfaction, but focusing on user compliance is critical to success. Be prepared to develop and enforce a personal mobile device policy to minimize the chance of failure.
  • There are four levels of mobile security: Minimum, Basic, Enhanced and Lockdown. Assess what level the organization needs to maintain and act accordingly to minimize risk of security breaches.

Impact and Result

  • Maximize your success and credibility with a personal mobile device acceptable use policy that clearly defines IT’s control over personal mobile devices.
  • Prepare to get tough. If employees refuse to play by the organization's rules, bar their personal device from the network.

Manage the Invasion of Consumer Technology Research & Tools

1. Get the whole picture.

Determine what level of mobile security is required, and the available security options.

2. Force users to comply with an internal personal mobile acceptable use policy.

Ensure end users understand IT's role in managing personal devices, and guarantee security in case of device loss or theft.

3. Train users on acceptable use of personal mobile devices.

Develop user buy-in and understanding of the consequences of non-compliance to the organization.

Manage the Invasion of Consumer Technology preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Authors

Rahul Parmar

Michael Battista

Contributors

  • YMCA
  • Home Box Office (HBO)
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019