CYOD is the new BYOD


AJAY KAUL Di­rec­tor & Gen­eral Man­ager, Global Commercial Chan­nels Dell In­dia

“What’s the next big IT trend?” I of­ten get asked this ques­tion dur­ing my meet­ings with busi­ness lead­ers and CIOs. Cus­tomers want to know how they can lever­age trends as well as how they can ad­dress the ac­com­pa­ny­ing chal­lenges. Cer­tain trends— in­clud­ing the ex­plo­sion of data, cloud com­put­ing, and the mul­ti­tude of per­sonal de­vices on the cor­po­rate net­work—are fast chang­ing the way or­ga­ni­za­tions man­age their businesses. The chal­lenges and op­por­tu­ni­ties are now more ap­par­ent than ever be­fore, and look set to drive IT and busi­ness de­ci­sions in the com­ing year.

Here are a few trends that will be­come even more rel­e­vant in 2014.

One cloud does not fit all

In the past, most or­ga­ni­za­tions jumped on the cloud com­put­ing band­wagon, adopt­ing cloud ser­vices with no con­sid­er­a­tion of their com­pany size or na­ture. How­ever, cloud com­put­ing has reached an in­flec­tion point, and as For­rester pre­dicts in its Cloud Com­put­ing Play­book, en­ter­prises to­day rec­og­nize that they need a com­pre­hen­sive strat­egy be­fore par­tak­ing of the cloud.

In 2014 or­ga­ni­za­tions will in­creas­ingly re­al­ize that one cloud does not fit all. There will be more in­ter­est in the op­tions avail­able, in­clud­ing the type of cloud—pub­lic, pri­vate or hy­brid.

CYOD is the new BYOD

CIOs con­tinue to fret over the loss of con­trol over de­vices, and worry about al­low­ing cor­po­rate net­works to be­come vul­ner­a­ble to em­ploy­ees’ viruses, apps, open ports and cloud ser­vices.

An al­ter­na­tive mo­bil­ity busi­ness model that Dell sees businesses ex­plor­ing is Choose Your Own De­vice (CYOD). CYOD bridges the gap be­tween em­ployee choice and the CIO’s need to man­age and se­cure the or­ga­ni­za­tion. It en­ables or­ga­ni­za­tions to of­fer their em­ploy­ees a choice of a com­pany-ap­proved de­vice with the ap­pro­pri­ate se­cu­rity and stan­dard­iza­tion. With CYOD, CIOs can eas­ily man­age the de­ploy­ment of mul­ti­ple de­vice op­tions with the right se­cu­rity con­fig­u­ra­tions.

Big data an­a­lyt­ics gets sim­pler

Big data an­a­lyt­ics are used by or­ga­ni­za­tions to bet­ter run their op­er­a­tions, un­der­stand their businesses, cus­tomers, con­stituents and the en­vi­ron­ments in which they op­er­ate. In­flu­enced by oth­ers who have suc­cess­fully used big data, or­ga­ni­za­tions are keen to find how they can lever­age in­sights from big data an­a­lyt­ics to ben­e­fit their busi­ness.

How­ever, con­vert­ing data to de­ci­sions is made

CYOD is an al­ter­na­tive mo­bil­ity model which en­ables or­ga­ni­za­tions to of­fer com­pany-ap­proved de­vice with ap­pro­pri­ate se­cu­rity and stan­dard­iza­tion

dif­fi­cult when you con­sider the in­crease in data vol­umes, ve­loc­i­ties, va­ri­eties and vo­latil­ity. There is also the added con­sid­er­a­tion of the growth of event- and ma­chi­ne­gen­er­ated data. Un­for­tu­nately, not all or­ga­ni­za­tions are ready to make the cap­i­tal-in­ten­sive in­vest­ments in the hard­ware, nor do they have the in-house skillsets to build and main­tain a com­plex big data an­a­lyt­ics in­fra­struc­ture.

IT so­lu­tions see greater adop­tion

The year 2014 will see even more or­ga­ni­za­tions be­com­ing IT-en­abled with the help of the chan­nel. They may be equipped with just ba­sic IT equip­ment such as lap­tops and desk­tops, but they will move up to adopt­ing more com­plex so­lu­tions such as servers. We will see more part­ners move up the lad­der from be­ing IT so­lu­tion providers to be­ing IT con­sul­tants. It will be im­per­a­tive for them to evan­ge­lize end cus­tomers about the ben­e­fits of IT so­lu­tions be­yond desk­tops and note­books so that more com­pa­nies are IT-en­abled due to a ma­ture chan­nel ecosys­tem.

Se­cu­rity is at the core of strat­egy

The ma­jor chal­lenges im­pact­ing IT to­day make it cru­cial for or­ga­ni­za­tions to move away from man­ag­ing se­cu­rity in si­los. Or­ga­ni­za­tions will in­creas­ingly em­brace a holis­tic strat­egy fo­cused on con­nect­ing se­cu­rity to the in­fra­struc­ture, in­for­ma­tion and ap­pli­ca­tions that are crit­i­cal to the or­ga­ni­za­tion.

In this age of in­creas­ing risk, or­ga­ni­za­tions can no longer have se­cu­rity as just a com­po­nent of their IT strat­egy. In­stead, they have to learn that se­cu­rity is very much a busi­ness strat­egy in 2014.


Newspapers in English

Newspapers from India

© PressReader. All rights reserved.