Countering the consumerization of IT

Consumer-oriented smart phones and gadgets are infiltrating the government workplace, adding new security and management problems

The feverish adoption of iPads — and their arrival in the hands of some federal users — highlighted the consumerization of enterprise IT as an important trend in 2010.

Apple sold nearly 7.5 million iPads in the first two quarters the devices were available for sale, from April through September. That buying spree followed the wave of iPhone adoption that began in 2007.

But Apple isn’t the only consumer influence in the enterprise. Smart phones that run Google’s Android mobile operating system began outselling iPhones in recent months. And a number of vendors are expected to join Apple in the media tablet category, which fills a niche between laptops and smart phones.

Personal devices have already made their way into some government offices. Meanwhile, agency IT departments are gearing up for what could become the greatest device management task since the arrival of PCs more than a quarter-century ago. Fittingly, many IT shops are working on approaches for dealing with the implications of consumer technology invading the workplace.

“Use of many of these consumer-grade mobile devices is limited as we continue to try to identify security and management solutions that will scale at an enterprise level,” said Rob Glenn, IT security officer at the National Institute of Standards and Technology.

Glenn said device-level encryption validated against FIPS 140-2 requirements is essential for broad use of consumer technology. He noted that iPad and iPhone modules are in the early stages of the validation process.

Another big security problem is how easily the devices let users download applications. Much of the popularity of smart phones and media tablets stems from the variety of readily available applications. But agencies see indiscriminate downloading as a recipe for viruses.

Agencies are taking a range of stances on security, said Lee Koepping, senior director of technical solutions at Iron Bow Technologies, a government solutions provider that operates a security practice. Most agencies are enforcing a security policy that includes device encryption, transmission encryption and single-factor authentication.

To deal with application security, he cited white listing as the most popular trend. With this method, agencies let users download only approved applications and block all others. Some agencies also use antivirus platforms designed for mobile devices.

The quest for security will no doubt continue next year. But the anticipated bevy of new product options might emerge as the most notable development in 2011, adding more force to the consumerization trend. Apple’s iPad might have launched the media tablet category, but offerings from Samsung and Dell recently hit the market, and additional competition is expected in the coming months.

“The foremost change you are going to see is more vendors,” said Jeff Orr, a principal analyst at ABI Research.

The new tablets will feature a mix of operating systems, including Android and Microsoft Windows 7. And that brings up another issue that agencies will need to navigate in 2011 and beyond: standardization.

Problems aside, consumer technologies look set to become increasingly common in the federal workplace.

“I honestly think widespread adoption is coming,” Koepping said. “It is a movement that is not going to go away.”

Read more of 6 ideas with some 2011 bounce or return to the 2011 Federal List.

About the Author

John Moore is a freelance writer based in Syracuse, N.Y.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group