How do tablets fit into your business?

Tablets may be the must-have device for consumers, but do they fit into the workplace, and if so, how? Clare Hopping investigates.

Quocirca's advice is to try and abstract away from the device itself as much as possible.

"If the last few years have shown anything, it's that there will be continued change, so trying to keep up with the number of new operating systems and devices coming to market is not a workable solution," explained Longbottom.

"However, looking to abstract the actual work environment away from the device through using virtualisation provides total control over the work side of things all data can still reside within the corporate data centre, users can be prevented from cutting and pasting or even printing if required."

It will be increasingly difficult for any organisation to try and dictate what a user can and can't use.

Advertisement
Advertisement - Article continues below

"If necessary, the virtual sandbox can be streamed to the device so that a user has a degree of disconnected use. Through such means, the user can carry on using the device for their personal life and even if it gets infected with a virus, it will have no impact on the work side of things. Even if they lose the device, there will be no work data held on it, so device security is not an issue."

Longbottom concluded: "It will be increasingly difficult for any organisation to try and dictate what a user can and can't use the PlayBook may be more of a business device but if the individual doesn't like the device or doesn't feel that they can get the personal apps that they want, they'll just go out and buy what they want and just expect that it will work with the business environment."

"As such, Quocirca does not advise that any organisation should be looking at a formal plan to introduce any specific tablet device it should be looking at how it manages its intellectual property across its total value chain which will include an individual's devices including those across contractors, consultants, customers and suppliers."

This means applying security to the data and documents, not to the devices something the PlayBook can certainly do without any input from the IT department.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019