We are so excited to be here at TechED 2014 where there will be much discussion about new trends in IT and the cloud. In particular, the bring-your-own-device (BYOD) phenomenon is really driving many of Microsoft's latest innovations, and unlike the past when IT administrators focused on managing the end user devices, BYOD is shifting that focus to the end users themselves. Market research highlights that the phone is becoming the only screen that matters for communication and email. With the proliferation of devices, it appears that smartphones will soon be more important than PCs in personal and professional workplaces.
So how does this influence the future of Exchange messaging platforms? In today's cloudy and mobile world, increasingly demanding end users expect to be able to access their applications and data from whatever devices they choose and from wherever they are on the network. IT administrators need new tools to manage and secure these environments and Microsoft has a number of solutions that can help:
- Increase user productivity
- Unify management infrastructure
How to take all of the power of social and machine learning to bring it right into email to provide a riche tailored experience on all screens to help business lines to stay on top of things.
There are many considerations IT managers face when embracing messaging and BYOD. From a security perspective, several questions need to be considered, including:
- What is the security policy regarding company data on employee devices?
- How can we secure data on an employee device?
- What if the employee leaves?
- Who will have access to corporate information?
- What services will be available?
Once deployed, continuing operations, capacity planning and monitoring take center stage.
- What is the user experience?
- How can we ensure that service is delivered as expected?
- How can we determine performance is an internal or external issue?
In order to manage users that are accessing apps and data from multiple devices, and depending on corporate security policies and regulatory compliance mandates, IT managers can use Microsoft technologies to restrict what employees can or can't do based on:
- User credentials
- Devices used
- Network locations
With personal devices now entering the corporate environment, IT administrators need to deliver access to all business applications without compromising security making sure the end-user will be able to access all its applications the same way he does when he is connecting from his office. The challenge for IT folks is quite large and they have to figure this out before the user experiment any outage.
If you have any good experience interesting for the community please add a comment to start the discussion with your peers.
See you at TechED 2014 booth #1234