GOAL OR METRIC: Have a PC Strategy that Embraces "Consumerization" of Business PCs
RATIONALE:.A more mobile workforce and the ‘consumerization’ of work and personal computing are completely changing the profile of what an organization delivers to its workers. It’s not just about the increasing use of social media – it is about the blurring of the lines between personal and workplace computing. End users want one digital identity that follows them everywhere. There are more devices, including smart phones, tablets, Bluetooth, RFID and netbooks, in addition to personal and work desktops and laptops – an average of four devices and third-party applications each day.
End-user computing always begins the basic considerations of the cost to buy, deploy and support the devices that are used by the workforce. But the consumerization of end-user computing has added a new wrinkle that is completely changing how IT supports a more mobile and “tech-savvy” workforce. The key issues that the CIO must address whether they will allow personal their workforce to use personal devices at all. Then they must decide kinds of devices and platforms will they allow. Then the biggest and most costly component must be considered – security. It is critical to have a strategy that addresses they will protect access to the devices, the data on the devices (especially sensitive organizational information), and how they will insulate the organization from potential threats coming from these devices. And then, of course, the organization needs to be able to afford it all. So the metric is simple: You either have a strategy that addresses this or your don't.
POTENTIAL RESULTS: Results seem to be a tradeoff: An organization can limit what personal devices it is willing to support (saying "no" to requests or providing very strict guidelines on operating systems, devices and platforms it is willing to support) or have more of an open policy. A more open policy introduces two issues: increased support costs (more devices, more options) and potentially greater security risks, due to the immaturity of some mobile operating systems and the sheer complexity of integration.