View
212
Download
0
Category
Preview:
Citation preview
7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
1/15
Handbook
1EDITORS NOTE
2APPLYING IT
GOVERNANCE TO BYOD
3FOUR BYOD HURDLESTO CONSIDER
4BYOD STRAINS CORPORATE
WIRELESS BANDWIDTH
VIRTUALIZ
ATION
CLOUD
APPLICATI
ONDEVELOPMENT
NETWORKING
STORAGEARCHITECTURE
DATACENT
ERMANAGEMENT
BIAPPLICA
TIONS
DISASTER
RECOVERY/COMPLIANCE
SECURITY
Solving the Challengesof BYODBring your own device policies bring hidden challenges, including
additional costs and dangers to data. IT must consider factors
including user device choices, network bandwidth and security,as well as tools for monitoring diverse mobile devices.
7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
2/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
2 S O L V I N G T H E C H A L L E N G E S O F B Y O D
1EDITORSNOTE
Minding Your Business with BYOD
Whats wrong with allowing users to access corporate systems with their
own devices? Businesses can save money on hardware, workers can be effective
anywhere, and managing mobile devices is a breeze. Well, all but that last part.
Enterprises should have consistent bring your own device (BYOD) policies, or IT
could be overwhelmed by the proliferation of laptops, smartphones and tablets.Luckily, existing tools can help. Expert Lisa Phifer discusses how to apply IT
governance to wireless environments. Admins need to weave BYOD into IT strat-
egy, which requires some forethought and the right combination of software and
best practices. Mobile device management tools have emerged to help.
As you consider policies, Craig Mathias takes a look at potential hurdles for
BYOD success. James Furbush takes a closer look at how BYOD affects corporate
wireless networks, which might not be ready for the bandwidth demands placed
on them. Its up to IT to make sure that availability and security are maintained. n
Eugene Demaitre
Associate Managing Editor
Data Center and Virtualization Media Group
7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
3/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
3 S O L V I N G T H E C H A L L E N G E S O F B Y O D
Applying IT Governance to BYOD
Many companies hope that bring your own device programs will reduce costs
by shifting mobile device purchases and monthly service fees from employer to
employee. Unfortunately, these savings are offset by new expenses. Wi-Fi-enabled
consumer electronics have triggered an explosion in the number of devices con-
necting to corporate networks and requiring some degree of governance. A recentCisco IBSG Horizons survey found that the average number of devices per knowl-
edge worker will jump from 2.2 in 2012 to 3.3 by 2014, increasing IT spending on
mobility initiatives to 20% by 2014.
Laptops, smartphones and tablets have a direct effect on the total cost of
ownership of corporate networks. Wireless LAN infrastructure must be added to
satisfy growing bandwidth demands. Security systems must spot and block non-
business trafc, such as streaming video and back channels for Trojan horses.
Bring your own device (BYOD) policies should include quality-of-service
mechanisms to ensure performance. IT must create diagnostic tools and mobile
management processes to deal with diverse and often cranky consumer devices.
Furthermore, every new employee-owned device represents an opportunity to
leak corporate data. BYOD challenges include lost or stolen devices with data that
2GOVERNANCE
http://www.cisco.com/web/about/ac79/docs/BYOD.pdfhttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://www.cisco.com/web/about/ac79/docs/BYOD.pdf7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
4/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
4 S O L V I N G T H E C H A L L E N G E S O F B Y O D
2GOVERNANCEcannot be remotely wiped, malware infections, and sensitive data thats too easily
forwarded outside the workplace.
To avoid these pitfalls, businesses must implement BYOD safeguards and
monitor mobile device usage to detectand preferably preventsuch leaks.
HOW IT GOVERNANCE CAN HELP
These BYOD challenges are not insurmountable, but they require careful consid-
eration, backed by a plan for action. The intersection between corporate networksand the wireless world should not be a wild west where anything goes and IT
cant stop it. Instead, administrators can stem potential BYOD bleeding with de-
vice discovery, impact assessment and minimum criteria for acceptable use.
Many contemporary WLAN and network access control (NAC) products have
device discovery and ngerprinting features that IT can use to identify mobile
devices. Those that fall into known categories can be automatically redirected to
mobile device management (MDM) enrollment portals. Previously unseen devices
can be blocked, awaiting further BYOD consideration.
To decide which devices to block vs. enroll, assess those already used in your
workplace. Consult with business units to determine application and data require-
ments, and identify associated risks and security capabilities.
This assessment should result in documented BYOD criteria that any device
7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
5/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
5 S O L V I N G T H E C H A L L E N G E S O F B Y O D
2GOVERNANCEmust pass to be authorized. Typically, minimum criteria include support for re-
mote wipe, passcode-based device access control and hardware encryption.
These security capabilities reduce risks from lost or stolen devices. Some busi-
ness units that handle more sensitive data may impose more stringent require-
ments, such as support for two-factor-based access control, FIPS 140-certied
encryption or forensic data scrubbing.
In addition to establishing criteria, create and maintain lists of mobile devices
that IT agrees to fully support and those that you have deemed so disruptive or
dangerous they cannot be tolerated. Most employee devices will fall in betweenthese two extremes, letting you grant access while minimizing associated support
and troubleshooting costs.
MOVING FROM ACCEPTANCE TO ENABLEMENT
Ultimately, BYOD governance should go beyond triage to enable business pro-
ductivity. Enterprise mobility management software can help you enable safe use.
For example, MDM enrollment portals check redirected devices against minimum
criteria; those that pass muster can immediately proceed on to MDM security
policy management without requiring any IT assistance.
These tools can speed and simplify enablement by applying BYOD security
policies, such as requiring passcodes and timeouts and creating secure network
http://searchconsumerization.techtarget.com/tip/BYOD-pros-and-cons-Spend-less-on-devices-more-on-supporthttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-management-Choosing-the-right-approachhttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-management-Choosing-the-right-approachhttp://searchconsumerization.techtarget.com/tip/BYOD-pros-and-cons-Spend-less-on-devices-more-on-support7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
6/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
6 S O L V I N G T H E C H A L L E N G E S O F B Y O D
2GOVERNANCEor email connections. Once congured, MDM software can also repeatedly check
to make sure settings have not changed.
Next, these tools can give devices extra attention where needed. For example,
use MDM software to deploy enterprise applications and remote diagnostic tools
to fully supported devices. These steps can let IT admins quickly and easily turn
an employee-owned device into a fully functional business platform.
In addition, deploy secure data lockers or secure email clients when you want
to keep corporate data safe on less-trustworthy devices. This is yet another way to
enable devices that might otherwise be considered unsafe. These MDM-deployedtools can help IT ll safety gaps and therefore permit more devices.
These automated, over-the-air management techniques can help promote safe
business use while avoiding the need for IT to manually provision and maintain
mobile devices.
KEEPING A WATCHFUL EYE
Finally, use network tools to monitor trafc, and make sure that all authorized
devices are playing by BYOD rules.
Next-generation rewalls and a growing number of WLAN products are
application-awarethat is, they can grant selected users and devices broader ac-
cess to specic applications and commands. This is a great way to inch open the
7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
7/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
7 S O L V I N G T H E C H A L L E N G E S O F B Y O D
2GOVERNANCEoodgates for BYOD while retaining IT controls to rein in bandwidth hogs and
acceptable-use violations.
For the best results, combine network trafc rules with intrusion prevention
and link-layer prioritization to ensure that mission-critical trafc gets preferential
treatment and will not be slowed by BYOD-generated personal trafc.
Of course, even with the best plans put into action, problems will arise. De-
velop new procedures for BYOD security incident response and troubleshooting.
Focus on quickly containing the potential damage from a cranky, hacked, lost or
stolen device.For example, establish a process for BYOD users to report missing devices. IT
should also have plans for locating such a device, quarantining it, wiping business
data and (where necessary) permanently disabling future corporate access.
Mobile devices will continue to require IT effort and toss a few curve balls.
However, taking a methodical approach to BYOD governance can make a world of
difference in IT overhead and worker productivity. Lisa Phifer
http://searchconsumerization.techtarget.com/tip/How-to-plan-for-BYOD-securityhttp://searchconsumerization.techtarget.com/guide/Bring-your-own-device-policy-Everything-you-need-to-knowhttp://searchconsumerization.techtarget.com/guide/Bring-your-own-device-policy-Everything-you-need-to-knowhttp://searchconsumerization.techtarget.com/tip/How-to-plan-for-BYOD-security7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
8/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
8 S O L V I N G T H E C H A L L E N G E S O F B Y O D
Four BYOD Hurdles to Consider
Before jumping into the bring your own device race, think about the potential
hurdles, including cost, policies, user support and security.
If youve read my column on the advantages of a bring your own device (BYOD)
program, you may have guessed that I am a huge fan of the BYOD movement. I
think it will easily dominate the client/access end of enterprise IT over the nextfew years. But there are some BYOD challenges, many of which are cultural and
operational, as opposed to purely technological. End-user education and careful
analysis of BYODs effects on how organizations work are just as important as the
tools that IT ultimately applies to handle BYOD.
COST AND POLICY CHALLENGES
First, consider how to pay for services. Users may cover the cost of their own
devicesalthough the employer might provide a subsidybut who pays for
a devices voice and data plans? There are a number of possibilities for BYOD
cost-sharing.
Employers can reimburse a xed amount or a certain percentage of a wireless
3BYOD HURDLES
http://searchconsumerization.techtarget.com/tip/Four-BYOD-challenges-to-consider-before-diving-inhttp://searchconsumerization.techtarget.com/tip/BYOD-advantages-Save-money-mobilize-workers-embrace-the-cloudhttp://searchenterprisedesktop.techtarget.com/news/2240148535/BYOD-and-mobile-cloud-apps-lead-to-licensing-compliance-issueshttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchenterprisedesktop.techtarget.com/news/2240148535/BYOD-and-mobile-cloud-apps-lead-to-licensing-compliance-issueshttp://searchconsumerization.techtarget.com/tip/BYOD-advantages-Save-money-mobilize-workers-embrace-the-cloudhttp://searchconsumerization.techtarget.com/tip/Four-BYOD-challenges-to-consider-before-diving-in7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
9/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
9 S O L V I N G T H E C H A L L E N G E S O F B Y O D
3BYOD HURDLESbill, or companies can pay only for business-related phone calls. Accounting for
data usage is far more complex, because it can be difcult to determine whether
the access was business or personal.
In most cases, I recommend a predened xed-percentage reimbursement for
data. Its easy, simple to calculate and minimizes the opportunity for disputes.
Companies can also look into corporate plans to cut
the base cost overall.
Next, youll need policies, agreements, education,
training and consciousness-raising. At the very least,youll need acceptable-use and security policies. A
BYOD agreement should reect users understanding
of all policies, procedures and tools involved.
A training class, online educational tools and
regular reminders of the importance of adhering to policies are essential, as is
appropriate disciplinary action when employees violate policy. Make it clear that
careless regard for corporate data is not acceptable, nor is exposing the organiza-
tion to potential legal or regulatory risks.
Then theres the challenge of user support and its associated costs. It begins
with onboarding users and their devices, a process that needs to be as simple
and self-service as possible. Help desk staffers need to be up to speed on common
problems and how to x them with minimal effort.
At the very least,youll need accept-
able-use andsecurity policies.
http://searchconsumerization.techtarget.com/tip/BYOD-security-policy-considerations-and-best-practiceshttp://searchconsumerization.techtarget.com/tip/BYOD-security-policy-considerations-and-best-practices7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
10/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
10 S O L V I N G T H E C H A L L E N G E S O F B Y O D
3BYOD HURDLESI recommend limiting users choice of devices to a few on an approved list. Re-
ducing the opportunity for device proliferation can limit the overhead that comes
with supporting any given device or version of an operating system. Bring your
own device isnt the same as bring any device.
MANAGEMENT AND SECURITY CHALLENGES
While mobile device management is the best way to handle enterprise-owned de-
vices, personal devices present a challenge. Policies should clearly spell out whatthe organization can and cannot do with respect to device conguration, enforce-
ment and usage tracking, as well as how enterprise-owned data will be managed.
A major BYOD challenge is security. Any IT manager who isnt concerned
about sensitive organizational information walking around on user-owned devices
isnt paying attention. There are steps IT can take to improve security, even though
the security challenge crosses technical, operational and even cultural lines.
It would be wrong to jump into BYOD without careful consideration of po-
tential challenges. But as BYOD gains popularity, the technologies, systems and
procedures required to make it work are evolving just as rapidly. The hurdles may
seem insurmountable initially, but most IT shops will eventually nd that the race
to BYOD is indeed worth running. Craig Mathias
http://searchconsumerization.techtarget.com/tip/Mobile-device-management-checklisthttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchdatabackup.techtarget.com/news/2240178774/Cloud-backup-BYOD-challenges-can-threaten-IT-control-over-datahttp://searchconsumerization.techtarget.com/tip/BYOD-FAQ-Answers-to-ITs-burning-questions-about-BYODhttp://searchconsumerization.techtarget.com/tip/BYOD-FAQ-Answers-to-ITs-burning-questions-about-BYODhttp://searchdatabackup.techtarget.com/news/2240178774/Cloud-backup-BYOD-challenges-can-threaten-IT-control-over-datahttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchconsumerization.techtarget.com/tip/Mobile-device-management-checklist7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
11/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
1 1 S O L V I N G T H E C H A L L E N G E S O F B Y O D
BYOD Strains Corporate Wireless Bandwidth
It used to be that enterprises could plan for a ratio of one device per user. But
with bring your own device programs, each employee uses multiple devices, put-
ting signicant strain on traditional wireless network infrastructures.
In the bring your own device (BYOD) era, a corporate wireless network that
scales up to 50 devices is no longer enough, said RobShaughnessy, chief technology ofcer at Circadence,
a WAN optimization company in Boulder, Colo.
Its triage. The scaling that were seeing is thou-
sands of endpoints, Shaughnessy said. We have a
customer in Asia with 500,000 endpoints. Can you
imagine the challenges that presents?
IT professionals run into problems with band-
width performance in part because a single Wi-Fi
connection can really support only 15-20 devices
any more than that, and the connection signal strength begins to deteriorate sig-
nicantly, said Perry Correll, senior technologist at Xirrus, a Wi-Fi technology
company in California.
Its triage. Thescaling that wereseeing is thousandsof endpoints.ROB SHAUGHNESSY,
chief technology ofcer,
Circadence
4WIRELESSBANDWIDTH
http://searchconsumerization.techtarget.com/tip/How-to-control-enterprise-tablet-bandwidth-consumptionhttp://searchconsumerization.techtarget.com/tip/How-to-control-enterprise-tablet-bandwidth-consumption7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
12/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
12 S O L V I N G T H E C H A L L E N G E S O F B Y O D
4WIRELESSBANDWIDTHIf 30 people are sharing a single [connection], then each device is only getting
a 1 Mbps connection, and that is terrible, he said.
IS CORPORATE WIRELESS INFRASTRUCTURE READY FOR BYOD?
Building a modular corporate wireless network with the ability to add more con-
nections is one of the simplest things enterprises can do to future-proof their
networks, Correll said.
Even companies that dont yet support a BYODprogram should recognize that tablets and smart-
phones have been making their way onto corporate
networks, and IT better plan for more devices to
come.
In fact, by 2015, 80% of recently installed cor-
porate wireless networks will become obsolete
because of poor infrastructure planning, according
to a new study by Gartner Inc. The same report
suggests that, as a response to widespread mobile
device adoption, enterprises will need to deliver 300% more wireless access
points to provide Internet performance that is similar to the performance of the
pre-BYOD era.
By 2015, 80% ofrecently installedcorporate wirelessnetworks will becomeobsolete because ofpoor infrastructure
planning.
http://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-workhttp://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-workhttp://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-workhttp://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-work7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
13/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
13 S O L V I N G T H E C H A L L E N G E S O F B Y O D
4WIRELESSBANDWIDTHOther Wi-Fi-enabled devices such as projectors, scanners and printers could
cause similar network problems if businesses dont plan accordingly.
INCREASING WIRELESS NETWORK BANDWIDTH FOR BYOD
Even Emulex, a company that solves networking problems, experienced its own
share of bandwidth difculties, forcing the company to prioritize a long overdue
Wi-Fi infrastructure update.
The Emulex headquarters consists of three buildings in Costa Mesa, Calif., witha tech-savvy workforce. Employees continually used Skype between international
corporate locations and use Wi-Fi on their personal devices while walking between
buildings on campus. All of that amounts to a lot of bandwidth use.
BYOD has put a strain on our network, said David Goff, Emulexs chief tech-
nology ofcer. Its requiring us to be more proactive.
Emulex increased wireless network bandwidth, access points and available
coverage. The company also devised a strategy for offering two separate Wi-Fi
networks: the corporate wireless network and a guest network.
The guest network is password-protected and keeps sensitive corporate data
behind the rewall. Mainly for employees personal use on their own devices, only
users with mobile devices that meet Emulexs security protocols can access the
corporate wireless network with that device.
7/28/2019 Handbook-Solving Challenges of BYOD_hb_final
14/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
14 S O L V I N G T H E C H A L L E N G E S O F B Y O D
4WIRELESSBANDWIDTHThe company also upgraded its Wi-Fi to the 802.11n wireless LAN standard,
laying a stable foundation for the years to come.
SECURING CORPORATE WIRELESS NETWORKS
IT departments shouldnt simply throw more bandwidth at their BYOD problems.
They also need to consider the network stability and security ramications of
employees Wi-Fi use and plan accordingly, said Frank Andrus, CTO of Bradford
Networks, a network access control company.Do I really want someones iPhone on the network? he said. Its causing ca-
pacity problems if its on the network. Businesses need to evaluate what devices
are really needed to perform the day-to-day functions.
A good way to do it is with network access controlsa security method that
limits which devices can access the corporate network based on either a business-
dened or a role-based policy.
Ideally, what you want is full visibility to what kind of assets have access and
what the user has been doing, said Rainier Enders, CTO of NCP Engineering Inc.,
a virtual private network provider in Mountain View, Calif. James Furbush
http://searchsecurity.techtarget.com/news/2240178706/Vendors-showcase-MAM-products-that-ease-BYOD-challenges-at-RSA-2013http://searchconsumerization.techtarget.com/tip/Network-access-control-policy-Handling-smartphone-access-controlhttp://searchconsumerization.techtarget.com/tip/Network-access-control-policy-Handling-smartphone-access-controlhttp://searchsecurity.techtarget.com/news/2240178706/Vendors-showcase-MAM-products-that-ease-BYOD-challenges-at-RSA-20137/28/2019 Handbook-Solving Challenges of BYOD_hb_final
15/15
Home
Editors Note
Applying IT
Governance
to BYOD
Four BYOD
Hurdles to
Consider
BYOD Strains
Corporate
Wireless
Bandwidth
15 S O L V I N G T H E C H A L L E N G E S O F B Y O D
AUTHOR
BIOS
LISA PHIFER owns Core Competence Inc., a con-
sulting rm specializing in business use of emerg-
ing Internet technologies. For nearly 30 years, she
has been involved in the design, implementationand evaluation of networking, security and man-
agement products.
CRAIG J. MATHIAS is a principal with Farpoint
Group, a wireless and mobile advisory rm in
Ashland, Mass. Mathias is an internationally
recognized expert on wireless communications
and mobile computing technologies. Contact him
at craig@farpointgroup.com.
JAMES FURBUSH is the news reporter for Search-
Consumerization.com and contributes coverage
on desktop, virtualization and cloud topics. Be-
fore joining TechTarget in 2012, he was the man-
aging editor of HyperVocal.com, an operations
specialist at IBM, the founder of SlyOyster.com
and a features reporter at The Patriot Ledger inQuincy, Mass. He graduated from Syracuse Uni-
versity with a bachelors degree in American stud-
ies and received a masters degree in journalism
from Emerson College.
Solving the Challenges of BYOD is a Search-Consumerization.com e-publication.
Margie Semilof|Editorial Director
Lauren Horwitz |Executive Editor
Phil Sweeney |Managing Editor
Eugene Demaitre | AssociateManaging Editor
Laura Aberle | AssociateFeatures Editor
Linda Koury |Director of Online Design
Neva Maniscalco |Graphic Designer
Rebecca Kitchens |Publisherrkitchens@techtarget.com
TechTarget275 Grove Street, Newton, MA 02466
www.techtarget.com
2013 TechTarget Inc. No part of this publication may be trans-mitted or reproduced in any form or by any means without writtenpermission from the publisher. TechTarget reprints are availablethrough The YGS Group.
About TechTarget: TechTarget publishes media for informationtechnology professionals. More than 100 focused websites enablequick access to a deep store of news, advice and analysis about thetechnologies, products and processes crucial to your job. Our liveand virtual events give you direct access to independent expert com-mentary and advice. At IT Knowledge Exchange, our social commu-nity, you can get advice and share solutions with peers and experts.
mailto:craig%40farpointgroup.com?subject=http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/mailto:rkitchens@techtarget.comhttp://reprints.ygsgroup.com/m/techtargethttp://reprints.ygsgroup.com/m/techtargetmailto:rkitchens@techtarget.comhttp://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/mailto:craig%40farpointgroup.com?subject=Recommended