Bring Your Own Devices (or BYOD) is one of those hot topics this year that seems to have every IT department worried. What does BYOD mean for the future of IT? People have already begun to call it the consumerization of IT and IT professionals everywhere are terrified that the traditional role of IT is ending and that BYOD is shifting all control into the hands of the end users.
Is this really the case? In a world where security and control of data are becoming increasingly regulated and exposed and as the public takes a growing interest in how companies are securing their data it is safe to assume that the movement of the IT field is not going to be towards a loss of control. And, in my experience, BYOD means exactly the opposite.
There is no ignoring the fact that BYOD signals many changes and demands IT departments rethink traditional approaches. But is that such a bad thing? The old model was one of a network castle. The firewalls were the moat and all of our devices from servers to desktops sat huddled together inside the castle courtyard talking freely one to another. One of the greatest fears was that one of those desktops were to become “compromised” and would unleash a fifth column attack from within the castle where there were practically no defenses of which to speak.
The old model created a quagmire of issues and required complicated workarounds in order to accommodate modern changes in computing environments. When businesses existed in only a single location or when businesses would regularly purchase leased lines connecting all of their offices the model worked rather well. Once workers began to need to work remotely, whether at home or when on the road, the model became difficult to support and the concept of VPNs were introduced in order to extend the castle wherever it was needed. VPNs changed how companies could physically exist but did so without addressing some fundamental issues with the architecture of a traditional IT infrastructure.
The solution to this infrastructure reinvention has been coming for a long time now. The movement towards web applications, “cloud services”, hosted applications, Software as a Service and other terms for the new ways in which people were thinking about applications. Slowly we started exposing applications to the “outside”. We started simply with email, then basic web applications and slowly more and more components of business infrastructure start to be exposed externally without requiring the use of a VPN.
The advent of smartphones accelerated this process as certain applications, email and calendaring being the biggest drivers, absolutely demanded extension to these mobile devices. For the most part, IT departments did not even see a significant shift occurring. Instead it was little pinholes, small changes as more and more of the tools used in the business were available without connecting to the VPN, without sitting inside the office.
Today a new business might legitimately ask its CIO: “Why do we even need a LAN? What benefit do we get from everyone sitting on a single, physical network?” There are still plenty of good reasons why a LAN might be needed. But it is a valuable question to ask and the answer might surprise you. I was asked this myself and the answer was that we didn’t need a LAN, every app was available through its own, secure channel, without a need for VPNs or a local network.
Where LANs continue to shine brightest is in desktop management. If you need to lock down and control the actual end user equipment then LANs work their best here – currently. This too will change in time. But this is where BYOD becomes the secret weapon of the IT department.
BYOD, while creating its own raft of obvious complications, especially around end user support expected after decades of total IT control of end user devices, offers the opportunity to eliminate the LAN, pull back the walls of the castle to surround only the core infrastructure where no end user ever need venture and to drop the support of end users devices solidly into the lap of the end users themselves. With modern LAN-less application publishing strategies (this includes web apps, remote desktop technologies and others) end user devices are effectively thin clients often providing no more processing capacity than is necessary to display the application. They are a window into the infrastructure, not a gateway. They look at the servers, they aren’t sitting inside the castle with them.
Thinking of end user devices as view panels or windows rather than computing devices is the key to making BYOD an advantage to the IT department rather than its bane. Of course, this plays into the usual ebb and flow and fat and thin clients over the history of computing. The tide will change again, but for now, this is our current opportunity. End users want the illusion of control and the reality of picking the device that is best suited to their needs – which are almost strictly physical needs whether of fashion or function. IT departments want the reality of control and should be happy to allow end users to pick their own devices. Everyone can win.
The key, of course, is eliminating legacy applications or finding workarounds. Technological approaches such as VDI, terminal servers or even racks of datacenter-housed desktops potentially provide fallback strategies that can be accessed from nearly any device while “view” layer technologies like HTML 5 look to provide elegant, modern options for exposing applications, shifting display-related processing to the end user device and standardizing on a protocol that is likely to exist ubiquitously in the very near future. The technologies are there today.
With the corporate network shrunk down to being only the infrastructure servers and associated networking gear suddenly IT departments have the potential for greater control and more flexibility while giving up little. End users are happy, IT is happy. BYOD is an opportunity for IT to exert greater control, tighter security all while giving the impression of being approachable and flexible.