In a recent post about new technology paradigms for SME we have been trying to provide reasons for SMEs to consider the changing of their computing model from “IT to own” to “IT to use”. Questioning the model is useful always and may bring a great gain for the organization.However, the decision to change may pass over some bumpy roads.
Today we try to put you in front of a real life scenario.
Imagine that you are the IT Manager of a very dynamic organization of around 100 people. Change is the constant in your day-by-day work: you serve a very mobile commercial force, several executives that travel all time, and, among many, two groups (marketing and development) that remain in the headquarters but take work at home after hours too.
They all ask for access to company resources, for their work to remain secure and available from various locations and at any moment. However the owners keep telling you that you must remain in control and protect their investment.
What would you do to harmonize all these potential irreconcilable requirements?
Option 1: You do as you have learned in the old school and try to maintain an entire in-house infrastructure allowing remote access to company data by VPN and secure access to business applications. You make a list of users that will be allowed to use mobile devices, select several vendors, make business cases, get them approved and purchase and distribute company owned smartphones and several tablets – trying to standardize the use on one single mobile OS.
And the challenges begin, because you will have to: keep the VPN accesses under control; maintain updated and secure a multitude of devices that include desktops, servers, laptops, smartphones and tablets: monitor the accesses to applications, and periodically backup business application data and user data (resident on many devices) and secure all of that. Looks a bit nightmarish but it’s the daily life of thousands of people. Not to mention that some managers will be angry because the selected platform for the mobile devices may not be their preferred one.
Option 2: Assume please that you are not afraid to think differently and change your mindset. You consider implementing a Virtual Desktop Infrastructure (VDI) and start by dividing your clients by groups of interests and needs, identifying what are their major business necessities and what keeps them happy.
And you may find out that:
This may be an oversimplification, but if you follow our 2nd scenario you will see that many important aspects are being addressed in a consistent and effective manner with this approach:
It is evident that this approach requires a different security model and a different solution because your traditional perimeter has totally changed; you use new technologies now and because of all the specific needs of virtualized environments. You may use a traditional security product on the physical machines (centralized, client-server protection) but inside the virtualized environment you will notice big challenges. And of course, you will need protection and control over those mobile devices. Or you can choose a security solution that has been anticipating these needs and has developed a specific solution.
We are not intending to make an economic study here but we think that the costs for the VDIs and for the services of a specialized provider are easily overcome by the costs of keeping up to date a whole fleet of desktops and servers, the hardware maintenance, the backup space, the VPN solution and the bandwidth. Not to mention that the gains in flexibility, control and fluidity of operations may result in happier employees and increased productivity, and the mental sanity of the IT Manager.
Ready to explore a sanity-saving solution?
tags
Horatiu B has been in the field of information security for about 14 years, switching lanes between marketing, sales, consultancy and business development. Engineer by formation, he thinks that a diagram says 10 times more than a speech but sometimes you have to employ words in order to describe diagrams. Horatiu’s principal areas of interest are in security management, practices, processes, buying behaviors and psychology.
View all postsDon’t miss out on exclusive content and exciting announcements!