CTO Blog

CTO Blog

Opinions expressed on this blog reflect the writer’s views and not the position of the Capgemini Group

TechnoVision 2014 - Get A Life

Category : Innovation
You Experience #4 – Get A Life
Consumerization has made us extremely sensitive to exciting, desirable user experiences, more and more on the devices of our own choice as the divide between our personal and work lives keeps blurring. Mobile Device Management helps to stay in control and keep such a heterogeneous platform secure. Furthermore, the latest mobile operating systems have strong support for mixing private and business roles and also bring the next level of user experience. It’s all a matter of finding a healthy balance between our perspectives as a consumer and business professional.
The explosion of smartphones and tablets has resulted in the trend for consumers to bring their own devices into the workplace, which is becoming a firmly accepted business practice. In turn, the need to manage and secure those devices has given rise to some sophisticated Mobile Device Management (MDM) tools and security applications. Cloud-based, scalable and affordable MDM solutions are now widely available.
But if enterprises are to maintain a truly secure and carefully managed environment, while also providing their employees with a dynamic and exciting consumer experience, there is a strong case for Bring Your Own Device to be transformed into Bring Your Office Device - providing company-issued devices that can be used at work and away from the office for consumer applications.
Operating systems such as Windows Phone 8 and Windows 8.1 can provide a rich consumer experience as well as powerful and secure business functions, helping organizations and their employees to create a new work-life balance. Employees are more likely to adhere to company policies, for example, if they are able to switch identities easily between business and consumer roles - something Windows provides.
There are some key practical reasons for companies to issue devices to employees, starting with security. By owning and managing devices, companies can be certain that they are able to lock them and wipe sensitive data remotely in the event of theft or a security breach. As a result, enterprises are more likely to provide employees with access to critical data and applications through a company-owned and company-managed device - often leading to greater productivity. Company-issued handsets can also help to manage and encourage the use of branded enterprise apps and content.
Whether businesses restrict mobile device usage to company-issued products or encourage a Bring Your Own Device strategy, consideration must be given to the apps themselves and how they are secured, managed and deployed. Apps and data must be secure across all devices. Mobile Application Management (MAM) complements device security by wrapping apps and data individually at the application level. Encryption and other security controls offer data protection and access control while still giving users the mobile experience they want.
Enterprises need a coherent, end-to-end policy strategy and a flexible content-management system to manage corporate and consumer apps running across different operating systems. And they need to put in place data loss protection controls that restrict the forwarding or accessing of sensitive data.
It’s time to assess the benefits of adopting a Bring Your Office Device approach. Enterprises could take greater control and use the full capabilities of a more business-oriented mobile OS, issuing a company-standard device that is easier to manage and secure and, by switching to a different identity, also satisfies consumer needs away from the workplace.

In the end however, no matter what approach you choose - Bring Your Own Device or Bring Your Office Device - it is key to understand the dynamics of our rapidly intwining business and work lives and turn it into a proper mobility strategy.
This contribution by Fernando Alvarez  

Part of Capgemini's TechnoVision 2014 update series. See the overview here.

About the author

Ron Tolido
5 Comments Leave a comment
Hi Ron, that’s a nice description of what’s going on in today’s businesses. Indeed, if we step back to the time where employees came to the office, turned on their computer and made a couple of calls with their desk phone, we definitely see that the rise in mobility has brought with it a new way of working/billing/securing. Instead of having employees call/connect solely for business purposes and solely on business hours, today’s employees look more like grasshoppers jumping from Social Media, to corporate emails, to roaming. As such a “connected world” allows most employees to be more flexible and reachable, many companies still struggle to manage this new way of working. Indeed, if poorly implemented and monitored, the freedom given to employees to have both private and corporate communication means available anywhere/anytime is a serious financial and security risk. As you wrote in this article, “Cloud-based, scalable and affordable MDM solutions are now widely available” and allow mitigating the risk of skyrocketing bills, data breaches and unproductivity without preventing the employees to leverage their mobile device outside business hours. And from my experience, nice mobile devices remain retention perks.
rtolido's picture
Quentin, thanks for your build!
Hi, I have joined Capgemini last week and am an ardent MAC fan. Could anyone tell me if they are using their Mac for office use. I am struggling to connect VPN/ Email, etc and would be very thankful for some help.
rtolido's picture
Hi Mrinaline, very nice to you have onboard in our company! You may however want to look for other virtual places to discuss our internal IT, rather than our external company website. Could I suggest you familiarize yourself with our Yammer system? You will find all the information you need over there.
Very true, though companies are encouraging BYOD initiative very much right now, the major challenge will be to maintain the privacy and secure the data. One initiative taken by companies is by blocking sending any sensitive data/documents from company mail server to other mail servers.

Leave a comment

Your email address will not be published. Required fields are marked *.