Article

RSA study: Enterprises should embrace end user influence on technology

Kathleen Kriz, Contributor

End users are influencing IT and security decisions in the workplace more than ever before, according to two reports released by RSA, the security division of EMC Corp. According to the study released by RSA and the Security for Business Innovation Council (SBIC), nearly 76% of the 400 security executives polled see a rise in users' influence on device and application purchasing decisions.

    Requires Free Membership to View

Enterprises can't just let any device in.
Avivah Litan,
vice president and distinguished analystGartner Inc.

The two reports, on the consumerization of IT, provide recommendations to enterprises on how to deal with consumer devices and Web-based services are introduced to the workplace. Avivah Litan, vice president and distinguished analyst of Gartner Inc., said the consumerization of IT is certainly on the rise. "Especially with the digital natives, people that grew up with technology, are now going into the workplace and insist on using their own devices, but also want access to Facebook and Twitter."

But the trend holds new risks for enterprises. With employees campaigning for use of their personal devices and social networking sites during the workday, information security teams are finding themselves with a choice to make, most of them leaning toward the same one: give the users what they want.

"The use of consumer devices open up security issues because, basically, uncontrolled endpoints can inject viruses and threats on corporation networks," Litan said. "Enterprises can't just let any device in."

The IT departments used to control 100% of the company's infrastructure, but now with user-driven IT, it's beginning to change. The line is now blurred between the use of IT devices at home and in the workplace.

The survey, conducted by IDG Research Services, found that more users are running their own computers at the office. In addition, 80% of companies surveyed allow social networking. According to the study, the RSA Fraud Action Research Lab found that using a personal computer at work causes a threat to security and puts the company at a greater risk for Trojan infections and data leakage.

This doesn't stop employees from wanting access to these devices on the job though. Over 60% of security executives say that users have a say on the type of smartphones they use, and 20% said they let users decide altogether. These devices make it easier to get things done, but they can also provide distractions. If employees can use personal cell phones and computers, then how can a company make sure they're actually working?

Brian Fitzgerald, vice president of marketing for RSA said it's all a matter of trust. "Hire good people," he said. "Trust they'll use the products appropriately and effectively."

Enterprises surveyed for the report said they didn't know how to deal with the rising use of social networking and other web-based technologies from a security perspective. Just 11% were very confident that they have the right level of security in place to accommodate increased access to consumer devices and applications. So what's the best advice for dealing with this new user-driven IT era? Fitzgerald said to enlist the energy that employees have for the use of consumer devices, and don't try to fight it.

"Companies should understand what users are trying to do and take those ideas and IT and turn it into something positive for the company," Fitzgerald said.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: