How are you keeping your end users happy and productive in the age of mobility and BYOD?
In my last post, I described the Dell KACE-Dell Enterprise Mobility Management combination for bringing all of your organization’s traditional, mobile and BYO devices under one umbrella in a single systems management product.
“That’s all right for the devices,” you say, “but what about the people using them? How does Dell KACE-Dell EMM deal with issues of privacy and productivity?”
Fair enough. After all, what good is it to address IT’s concerns for tracking and managing all connected devices if it only leads to resistance among users worried about privacy on their personally owned devices?
Balancing privacy and productivity
Don’t forget that the main reason for putting all your blood, sweat and tears into a BYOD initiative is that users can be more productive when they use their own devices. The freedom to use the corporate network as productively as possible lets users take advantage of the apps, devices and means of communication they know best. But in the same way that users expect the organization to respect personal privacy, they also expect it to respect the privacy of personal data on their own devices.
The balance, then, is to separate business and personal use clearly and securely right on the device. The Dell KACE-Dell EMM combination for anypoint systems management strikes that balance with the Dell Mobile Workspace app that users install on their own smartphone or tablet and the Dell Desktop Workspace application for their BYO laptop. Other than installing the secure workspace on their personal device, where they can securely access corporate resources and do their work, users don’t see any difference in their devices. IT has access only to the workspaces on their personal devices and users can be assured that personal apps and data are safely partitioned and completely inaccessible by IT. Workspaces also assure IT of the same level of security desired for corporate-owned assets, with features like encryption, secure remote access, firewall and prevention of data loss for the corporate information residing within the workspace on a user-owned device.
In my next post I’ll have more details on how anypoint systems management looks from the IT perspective, so stay tuned. Meanwhile, have a look through Part 2 of our new e-book, “A Single Approach to Anypoint Systems Management,” right now.