Within the last year, businesses have undergone a major transformation as the consumerization of IT makes its way into the enterprise and bring-your-own-device (BYOD) policies become more prevalent. As today’s workforce increasingly requests the capability to use the same technologies on the job as in their everyday lives, IT departments have been forced to adapt to workers’ preferences and implement policies to support the use of personal devices within the enterprise. According to a 2011 Citrix survey, more than 67 percent of senior executives and IT managers reported that they don’t have policies, procedures or IT systems in place to manage the use of personal devices for business purposes.
This consumerization of IT is also further enabling an increasingly mobile workforce. In order to strategically embrace this trend, CIOs must understand how these changes have and will continue to impact the enterprise. Rather than work to block these technologies, CIO’s must find ways to leverage them while maximizing employee efficiency and helping to streamline business processes.
The question is what do organizations gain from allowing employee devices with the walls of enterprise IT? One of the biggest challenges now is keeping a balance between consumerization and the security needs of legacy systems. Since our employees are also consumers, when we understand them we’ll better understand our customers. So while IT needs to adapt in order to keep up with IT consumerization, they also need adopt a “manage the middle” attitude in order to bridge the gap between the consumer and the corporation. It’s a challenge granted but doing so will allow employees to leverage enterprise technologies without sacrificing security while using the tools and techniques that best engage customers.
Latest posts by Tim Dreyer (see all)
- Psyched About Automated Interaction? Make Sure You Think Outside the Bot - September 21, 2016
- What Can ‘Pokémon Go’ Teach Contact Center Leaders About Customer Expectations? - August 22, 2016
- Text-Driven Interaction Key to Virtual Assistant Adoption - August 2, 2016