SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez nos Conditions d’utilisation et notre Politique de confidentialité.
SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez notre Politique de confidentialité et nos Conditions d’utilisation pour en savoir plus.
MOBILE DEVICES ENABLE COMPANIES TO CONNECT TO A
NETWORK OF INFINITE POSSIBILITIES: THE INTERNET OF THINGS.
The number of smart
mobile devices used at
work and home is
expected to reach 905
million by 2017. Smart
managers and employees
the business value of
mobile devices, from
smartphones and tablets
The survey revealed that
76% of employees
believe their companies
need to take further
steps to fulﬁl the potential
productivity gains that
smart devices offer. Steps
proposed by employees
include increased use of
cloud solutions, greater
use of specialist software
and greater support for
smart device users.
Exponential growth in the
use of these smart devices
has led to a staggering
increase in demand for
across 84% of
to the ﬁndings from a new
commissioned by BT and
«The growth in employee smartphone and tablet ownership is
changing the ways we work… Draconian Wi-Fi access limitations or
failure to invest in sufﬁcient Wi-Fi coverage is a fast way to ensure
a poor employee experience»
Adrian Drury of Ovum
of employees still don't have wireless access
to their corporate networks.
of IT managers think adopting a BYOD policy
gives a competitive advantage to a company.84%
With more than 76% of users convinced that their
organisation needs to step up to the opportunity, it's clear
that enabling BYOD in its many forms is about much more
than simply cool devices and a mobile contract”,
says Neil Sutton of BT Global Services. “Organisations need
to consider elements of device compatibility, security,
Wi-Fi, network, application performance, with a focus on
driving costs down.
The problem lies in a lack of progress in adopting or
articulating a consistent policy across wired, wireless
and Virtual Private Networks.
A study by SecureWorld
found that 60% of
business and IT
professionals say their
BYOD policy does not
Additionally, 83% of
wearables are as risky as,
or riskier than, BYOD.
Security consultant Rafay
Baloch emphasises how
easily information can be
compromised on mobile
devices. He claims that
79% of security incidents
within the past year
involved a mobile device.
“BYOD should be one of
the main concerns of the
information that is
transported or stored on a
mobile device can be
to Prepare for the Workplace of Things:
Revisit your BYOD strategies:
Study the latest projections about wearable device adoption in the
workplace and try to predict how your employees will use wearables at
the ofﬁce or in the ﬁeld.
Identify new security requirements:
Anticipate the development of new security apps for wearable devices.
How will the use of cameras on these devices be restricted, for example?
Experiment as much as possible:
Test how wearable electronics could boost productivity, streamline
efﬁciency, and change the way your company does business.
Prepare for employee adoption:
Wearables have the potential of not only impacting workplace
productivity but also how employees think about work-life balance. In a
Cornerstone survey, 66% of respondents said they’d try wearable
devices if they helped them do their job better.
Be proactive, not reactive:
Don’t wait for employees to bring these devices to work. Actively try
them out ahead of time in controlled applications to understand how
wearables will work in real-world situations.
Ensure that devices are updated:
IT managers need to make sure that the latest available security
protocols are installed on BYOD devices. It’s estimated that up to 72%
of devices are not up-to-date enough for secure use in the workplace.
Source : http://blogs.ofﬁce.com / http://www.wired.com / http://qz.com / http://www.processor.com
http://www.rapid7.com / http://www.hcamag.com / http://business.ﬁnancialpost.com
http://www.appstechnews.com / http://www.cornerstoneondemand.com / http://www.ﬁercecio.com
1 2 3