10 key points for establishing a multi political terminals in the business

Fixed computer, portable, ultra-mobile, tablets, smartphones or phablettes; companies are abandoning homogeneous fleets. The general idea that supports this development is that the diversity of tools provides easier interaction between employees and with customers. The flip side of this trend remains the increasing complexity that this entails in terms of management and CIO-side security. And of course the limits of the company to train employees on these issues.

Therefore, how to successfully implement a multi-device policies in the company? Here are 10 tips to achieve both aspects governance, communication, and change management.

1. A project manager that holds up, supported by DG

Ask a pure juice technician to set up the park management policy returns to entrust the keys to the truck to someone who does would not even have a license. Especially because one of the challenges is to put in place a program that brings businesses and CIOs to firstly understand the business challenges and other technical constraints that a heterogeneous fleet suppose.

The head of the establishment of multi-unit enterprise policy must be legitimate for all at the outset. And in case of hiccups, it must be reinforced by senior management.

2. A mobility charter known and recognized by all

Who says politics said legislation, at least as a reference. You can then cut to the establishment of a mobility charter, which without going into obscure details will outline the “do & do not” to be followed in this regard.

The writing is not a gift from heaven. Legal services, HR or trade unions and staff representatives should be involved in this work. Then the document will be signed by all employees, whatever their level of seniority.

3. The basic respect

No single password for multiple users, no network overload, respect of service contracts, the rules must … enable everyone to use the devices and networks without entering conflict and without undermining the integrity of the whole. These rules must be clear to all. What is not so simple.

4. A software solution for device management

They are neither your employees and even less that you will do the same employee around to make sure in time the observance of safety rules. It is therefore necessary to implement a software solution for management of the devices. Thus all devices used in the business are known. Others must be banned, or limited use.

On this point, the additional complexity caused by mobile devices may require the use of a dedicated solution for MDM (Mobile Device Management) for encryption by eg.

5. An assessment of the sensitivity of the data

The degree of confidentiality and sensitivity of the data require different levels of protection. Weak or strong authentication should be considered accordingly. Especially, movable side, should be distinguished in this regard Sir data is consulted remotely and / or synchronized on the local memory of the mobile device.

6. Follow the activity of each

Establish traceability of employee shares is not designed to turn you into a bogeyman. It’s just the best way to detect an intrusion. Cel through the establishment of dedicated tools, statistical monitoring or to lift and log analysis.

Moreover, a sharp look at these data could improve application performance .

7. Promote the benefits of working freed of the limitations of terminals

Not only the range of devices managed by the DSI and used by business departments will be extended, but in very many cases employees will have to juggle multiple terminals. This is not necessarily simple. It should therefore insist on the profits made by a cross-terminal work experience.

This will continue working in situations of mobility on the one hand but also uncoupling data devices via synchronization functionality. Something to appeal the most reluctant, or at least interest in a development that seems in many intangible aspects.

8. Trusting the user experience

Due to security constraints, you will necessarily limited the ambitions of the company’s employees. Pass this pill taking into account their demands (realistic) could limit the bitterness of the process.

Above all, the company’s employees already have mostly multi-station management experience. Think of their day to justify your approach. They use Dropbox? Evoke this solution to explain your data management policy. They use the application Buy Me a Pie! to their race? Press your approach based on this tool.

9. Appoint ambassadors

They are experienced users of IT solutions, good at their jobs and skilled in the use of new tools. Talk to them first. Thanks to them, your multi-device policy will find lawyers and defenders before being attacked. They will also go up the real problems.

10. Facilitate the autonomy of users

“The law is wise, but the men are not the” wants us to believe a Chinese proverb. Nevertheless, circumstances are changing the rules. Giving more autonomy to users, with some landmarks, they will be less fussy. And that, in a sagging under ISD projects, it is priceless.

The Crip has published a fact sheet that provides an update on the many technical and organizational aspects induced establishment of a multi terminal company policy. BYOD, user empowerment, suitability of the application portfolio, evolution and transformation of IT infrastructures, management of different security levels, use of MDM and MAM solutions; this document allows to go further to calmly consider this transition.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS