ALL >> Computers >> View Article
The Consumerization Of It, Byoc, And The (new) Role Of It
Total Articles: 35
It has been a decade since Nicolas Carr published his controversial essay “IT Doesn’t Matter” in the Harvard Business Review. Back then, he claimed that companies weren’t really getting a competitive advantage from the technology advances – the bits and bytes – of hardware and software. Carr argued that IT infrastructure was becoming commoditized, and it was the business strategies using that technology rather than the technology itself that would give companies their competitive advantages.
Ten years later, Carr’s ideas really have become a reality. Now we are in the era of the consumerization of IT and Bring Your Own Cloud (BYOC), where individual workers and business departments rent hardware and software—the virtual machines, the applications, the storage capacity, the big data processing capacity, and so on. Often, they make these choices without IT’s knowledge or approval.
This shift from “own the infrastructure” to “rent the applications” leads to the next question: What is the role of the IT department now? If we no longer need this group to select, install and maintain the latest model server, do they still play a strategic role in the enteprise?
I’d like to share a real-world story that demonstrates that IT departments do have an important and significant role in the BYOC era. Not only does IT have the critical responsibility for protecting corporate data as it moves to the cloud and from the cloud, but this group also makes certain that the right Cloud Security services are being used, in the right way (meeting company policies) and in a productive and cost-efficient manner.
Leveraging Skyhigh, one Fortune 100 company’s IT department gained visibility into the use of public cloud storage services by the company. On average, a company uses 19 different Cloud Security storage services and this particular company was no different. Of course some services are more popular than others with workers, and the company ranked its top 5 cloud storage services by number of users:
2. Google Drive
With 19 different services in use, how can employees effectively collaborate and share their work? The IT team polled employees and found they were struggling with managing multiple file sharing services and would prefer having one corporate standard.
Skyhigh analysis of their Cloud Security storage use gave them necessary insight to understand which services were actively being used, by how many users, how frequently, for how much data and which ones people had signed up for but used less often. The usage ranking was:
4. Google Drive
The data revealed that Box was used most often. And Skyhigh’s CloudRegistry showed that Box was also the lowest risk service. Armed with this data, IT negotiated a corporate-wide deal with Box and set this as the company standard for public cloud storage services. An IT manager at the company told me, “By leveraging Skyhigh data, we are able to look through the landscape of file sharing services and understand employee usage. This presents a clearer and accurate picture, giving us a better context for decision-making that supports our employees.”
If you’d like to take a look at the file sharing services in use at your organization to understand the risk profile for each service and the usage beyond “user count”, schedule a free file sharing cloud assessment with Skyhigh (note: assessment results returned in 12 – 24hrs.).
And…if you attend Boxworks next week, make sure to ask Nicolas Carr, who’s speaking at the event, for his take on the role of IT in the BYOC era.
Lauren Ellis is a research analyst covering the technology industry’s top trends & topics, focusing on Cloud Security, Cloud Computing, Data Loss Prevention etc.,
Computers Articles1. How Best Pc Backup Software Assists In Recovering Accidentally Deleted Files From The System?
Author: Shashikant Shukla
2. Selling Customized T-shirts: How To Sell Old Wine In A New Bottle?
Author: Pratik Shah
3. Ensure Security, Use It At Ease With The Avg!
4. How To Use Built-in Tools And Settings To Secure Your Windows 10?
Author: Ellie Williams
5. Reason For Why Business Runners Really Need Alibaba Clone Script Pro
Author: sawati rawat
6. Diy Or Hire Professional For Computer Repairs?
Author: Michael Clark
7. See How Snmp Is Made Simple
Author: James J. Adams
8. Top Computer Hire Services
9. Windows 10 Pro Promo Code: Take Care Of Your Business From Everywhere!
Author: Christine Bleakley
10. 7 Practices That Make Your Organization Vulnerable To Cyber Attacks
11. How To Win Customers Faith And Run Your Own Online Business Portal With Alibaba Clone Script Pro
Author: sawati rawat
12. Call +1-855-490-2999 Microsoft Office 365 Customer Support Number
Author: Microsoft Office 365 Customer Support Phone Number
13. Top Laptop Rental Providers
14. A Plan Of Snmp Monitoring
Author: Gambit Communications
15. How To Minimize Threats Inside Your Network?