Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are typically insufficient in current tablet form factors. However, carrying a laptop around with you everywhere you go just so you can access email is not very practical either. The reality is that we live in a multi-device world where the average worker employs 3 – 5 different computing devices in the regular performance of their job function. . . . and I would argue that’s exactly how it should be. Each user employs the device they prefer to optimally perform tasks at any particular time or place.
What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control!
I just got off the phone with a reporter from a major industry trade magazine (no names please!) who is preparing an article on enterprise mobile device adoption. Wanting to help ensure accuracy in the reporting, I provided him with statistical details from our recent research into the use of mobile devices in the enterprise and stepped him through the findings. He was fascinated by the results and asked lots of follow-up questions. In the end, however, he admitted he would likely not be able to use any of the information in his article (say what?!). Apparently, his editor had specifically tasked him with writing an article showcasing how tablets are rapidly replacing PCs in the workplace, even though this is completely contradictory to reality.
Recently I briefed with ForeScout Technologies, a Network Admission/Access Control (NAC) vendor, to get an update on the CounterACT platform it has been delivering and developing for a few years and to see its recently announced ControlFabric technology. I thought it wise to take another look at NAC vendors and how they address BYOD, rogue, or non-compliant devices that can be the source of many compliance and security headaches including advanced/targeted threats.
IT marketing hype has generated quite a few ridiculous and sometimes outright bizarre phrases to describe trends in technology adoption, but few on the list of the absurd top the insistence that we live in a “post-PC” era. The concept of “post-PC” derives from the (correct) fact that mobile device adoption has broadly accelerated, but makes the incorrect assumption that this is causing a substantial decrease in PC use. Nothing could be further from the truth – especially in relation to the business use of desktop and laptop PCs.