Monthly Archives: June 2014

Does Your Company Have a Mobile Computing Strategy?

Meeting the challenges of mobile computing is top-of-mind for most IT executives and business owners.  According to research firm Gartner, table computing shipments surpassed desktop computer shipments for the first time during 2013.  According to the Computing Technology Industry Association (CompTIA), mobile workforce dynamics are driven by traveling employees and those employees bringing work home. These competitive market forces mandate (require) companies to develop a mobile computing strategy for their businesses.

Why Have a Mobile Computing Strategy?

Cloud computing, broadband Internet, and consumerization of IT are fueling the demand for mobile computing.  Supporting employees in the field and traveling employees and connecting with customers are top areas of focus for IT today.  Support for employees working from home and mobile commerce also drive the demand for mobile computing.  The outbreak of mobile computing raises a number of concerns, including device theft and loss, mobile-specific virus/malware, and personal use of business devices. Additionally, mobile users may put additional strain on your corporate network and WiFi connections.

Responsible Mobile Computing

There are a number of factors to help reduce the risks of mobile computing.  Requiring a passcode to unlock a device may be the first line of defense but may not be enough to fully protect your corporate applications and data.  Using encryption for data on the device and in transit can keep your information secure if your device is lost, stolen, or exploited by a mobile virus or malware.  As a last resort, having the ability to track and wipe a compromised device (e.g. having a kill switch) is another option to protect your critical information from falling into the wrong hands. Also, be sure to test your corporate network bandwidth and security to ensure that they meet the demands of your mobile users

Focus on the Mobile User

Awareness of your employees is a key consideration of your mobile device plan.  It is important that your mobile employees have a clear understanding of the threats and risks of mobile computing.  Keeping mobile devices up to date with O/S security updates, anti-virus, and anti-malware protection is key.  Training your employees to identify phishing schemes and having a protocol for reporting lost or stolen devices and data breach improve your organization’s readiness for adopting a mobile-computing strategy.

The adoption of mobile computing is expected to continue at a rapid pace over the next few years.  This growth will meet the demands of the mobile workforce and the desire for businesses to improve customer satisfaction through connected applications.  Having a proactive plan for securing mobile devices and their access to corporate applications and data is critical.  It is equally important to educate your mobile employees on the threats, risks, and responsibilities of a mobile computing user. Contact your Mobile Computing Expert to help deploy mobile computing within your organization.

Is Your Network Ready for Cloud Computing?

Cloud-based based computing adoption is increasing among many businesses.  According to the Computing Technology Industry Association (CompTIA) Annual trends in Cloud Computing study, 60% of business owners reported having 30% or more of their IT Systems in the cloud.  Additionally, research firm IDC predicts cloud-computing solutions to total $24 billion by 2016.

Why Cloud Computing?

CompTIA research reports that of those businesses adopting cloud technology, 49% have experienced the ability to cut costs. Popular uses of cloud-based applications include business productivity, cloud-based email, virtual desktop, HR management, and financial management.

Taking Advantage of Cloud Computing Cloud Computing Why Now?

Cloud Computing Growth and adoption is driven by a number of trends in IT, including affordable broadband, Internet, virtualization, and mobile computing.  Businesses find it easier than ever to reliably and securely connect to cloud-based infrastructure.  Cloud providers use virtualization to share computing resources, which helps keep costs down and aids in migration and upgrade of hardware platforms.  Mobile users expect cross-platform connection of smart phones and tablet computers to corporate applications and their data.  These factors combined add to the appeal of cloud computing

Cloud computing Deployment Scenarios

Most cloud-computing deployments use public-cloud, private-cloud and/or hybrid-cloud platforms.  Selecting the right cloud architecture depends on a number of factors, including industry and regulatory compliance requirements, integration with legacy applications, security, and other considerations.  It is equally important to consider your network reliability and availability to ensure a smooth of cloud computing.

Most industry analysts agree that cloud computing is here to stay.  Cloud computing is becoming an increasingly important component of IT infrastructure, and companies adopting cloud computing are deriving a variety of benefits.  To ensure a smooth transition to cloud-based computing, having a plan will ensure an easy, secure, and compliant migration to the cloud.  Consult your IT Service Consultant to get the most from your cloud-computing resources.