Recruitment firm SThree has taken on mobile device management provider Good Technology's Good for Enterprise product to manage mobile devices being used by nearly half of its 2,000 workforce.
SThree was looking into challenges it faced with staff bringing their own smartphones and tablets into work to use for business, as well as personal purposes, and saw an opportunity to increase productivity, efficiency and client service by giving staff access to corporate information and business applications on the go.
Garry Lengthorn, director of IT services at SThree, claimed that a secure bring your own device (BYOD) model could allow the recruitment firm to meet its business goals.
"Being able to finalise contracts and share information securely, remotely and flexibly means the difference between a sale and a missed opportunity. Consumerisation is an interesting opportunity in our organisation due to the proliferation of Generation Y graduates, but it comes with serious security risks and the BYOD element can be complicated to implement effectively," he said.
The recruitment firm has allowed employees to use their personal devices to access corporate email, calendar, contacts, documents and applications while ensuring that all confidential client and candidate information is secure by encrypting it within the application, separate from all personal data held on the device.
SThree's IT department can then manage all data, and can also wipe data remotely without wiping personal data if the device is lost, stolen or damaged.
Lengthorn explained that SThree chose Good Technology as opposed to other vendors because it enabled the firm to become more flexible.
"Good Technology offers a managed secure ‘turnkey' solution for all devices and platforms, which enables BYOD and generates efficiencies and cost-savings, allowing us to nurture the flexible working culture our business needs without compromising on security," he said.
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)