IT's 6-step guide to adopting consumerization

Most businesses are accepting, even embracing, consumer technology. What do they know that you don't?

1 2 3 4 Page 3
Page 3 of 4

Consumerization step 4: Tap into your employee base for app ideas

For application development and deployment and the kinds of apps employees are allowed to use, many organizations are trying to catch up with the consumer marketplace, says X by 2 consultant Petersmark.

Most new employees enter an organization with a more capable set of productivity and networking tools, not just devices, than supplied by their new employer, Petersmark says. It's problematic at best and catastrophic at worst from a talent recruiting and retention perspective "if the best and the brightest decide that their new employer's infrastructure and application portfolio is far inferior to what they already have in their pockets," he says.

Forward-thinking companies are trying to embrace those in their organization who tend to push the boundaries on the consumerization front. Rather than considering those people to be troublemakers, Petersmark advocates that you bring them into the planning and deployment process and ask them why they use the devices, services, and apps that they do, how they use them, what benefits they derive, and so on.

Consider creating a small team of the more cutting-edge employees and ask them to help re-create some of the core application functions the company uses in the form of more consumer-friendly technologies, Petersmark says.

Consumerization step 5: Get over security skittishness around BYOD

Most organizations historically denied network and data access to anything that was not company-issued. But that doesn't work in a consumerization context. Thus, companies are increasingly creating secure access points via virtualization or cloud services that allow employees to safely access company resources with their own devices.

If done correctly, this tactic can yield several benefits, Petersmark says, including allowing employees to be more productive and maybe even more innovative by permitting some flexibility in how, when, and from where they are allowed to engage the company's resources.

Still, security remains one of the biggest concerns among IT executives when it comes to consumer technology in the workplace. Although some of the fear is fueled by vendors and analyst reports seeking to sell security tools, some of the worries are legitimate. But with tools for encryption and access control, you should be able to safely provide access to some enterprise data and applications to trusted users.

The adoption of a virtualization strategy addresses many of the challenges of consumerization of IT, says Paul Martine, CIO of Citrix Systems, a virtualization technology provider. By hosting all applications, virtual desktops, and data in the data center, you can deliver these services to any consumer devices in a controlled and secure fashion, Martine says.

However, many virtual desktops are designed for use on Windows PCs and Macs, and they don't work well in a mobile environment. The issue is not just screen size, but lack of support for touch and other native user interface methods, as well as back-end applications that don't reformat themselves to the current context, says Ryan McCune, senior innovation director at Avanade. He notes that Citrix and others now offer APIs to help developers make their back-end apps mobile-savvy, so they can adapt to the device being used.

Cloud services that are designed to deliver apps and data securely over a network can also help address security concerns. But few cloud services yet work well with mobile devices, Google Docs and Microsoft Office 365 being prime examples of such PC-oriented services. And many apps make it easy to use cloud storage services -- such as Apple's iCloud,, Dropbox, and Microsoft SkyDrive -- that IT can't manage. However, more options are emerging to make consumer-class cloud storage more palatable to IT.

1 2 3 4 Page 3
Page 3 of 4
How to choose a low-code development platform