Nearly half of all enterprises are refusing to embrace BYOD (bring your own device) and risk falling behind in terms of productivity as well as appearing old fashioned to employees, Oracle's EMEA VP of security and identity solutions, Alan Hartwell, said at the Enterprise Cloud Forum in Monaco today.
"Forty-four per cent of companies don't do BYOD because they can't satisfy themselves about the security aspect," said Hartwell.
"So therefore they lock themselves off from all productivity gain, and they make themselves look almost prehistoric to some of their employees. There's almost a need for a whole industry to solve these problems. It's been very rapid adoption, and we need to be careful that we don't actually start to slow down."
Hartwell highlighted "big enterprises" as being particularly slow to mobilise BYOD, saying that while they are keen to "take advantage of cost reduction and becoming more agile", these companies tend to "fail at the security and, sometimes, identity part of the project".
Hartwell suggested that CISOs have an increasingly difficult time managing BYOD due to the fact that they are attempting to use outdated systems to manage device security, which now commonly lies outside the company network as users bring their own hardware.
"If you look at the CISO's point of view, they're now managing multiple applications, sometimes hardware, that have all been introduced to solve a weakness or a problem that happened in the last five or seven years," said Hartwell.
"But now [they are] managing this complex infrastructure of solutions that solved the previous problem everyone knew about, but they don't necessarily know what's coming along. That compromises the experience for employees and customers."
Hartwell also warned on the general state of enterprise IT.
"It's getting close to the point where no one really understands what's going on", he said.
"It stops any development happening, because everybody is so busy analysing where they are, they don't see the next step. The next step is almost too big, because there's so much stuff to check through."
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)