Here's an ad you'll never see: "The new Verizon (or T-Mobile or Sprint or
AT&T) smartphone: Your IT department's best friend." After all, the smartphone
wars have been about the consumer for some time now, promising more features,
more fun, more glitz.
Despite earlier reservations, I've come to love my iPhone, especially when
visiting a part of the country -- New York City comes to mind -- where AT&T's
much maligned 3G network actually works. But when it comes to business
environments, the iPhone falls short. In fact, with the exception of the
BlackBerry (which isn't much fun), the smartphone as a class appears to be
putting the needs of enterprise users and the IT jockeys laboring to protect
enterprise security firmly in the backseat.
[ Find out Android 2.0's real odds of unseating the iPhone in "Android 2.0: The
iPhone killer at last?" | Find business-oriented iPhone apps the easy way with
InfoWorld's online app finder. | See the 21 apps Apple doesn't want on your
iPhone. ]
Indeed, something ugly is under way. IT has the same responsibility for security
and network management it's always had, but armed with powerful and relatively
cheap smartphones, users increasingly have the power to circumvent those
policies, says Gartner analyst Ken Dulaney.
And it will only get worse. Smartphones now account for 14 percent of overall
mobile device sales, but by 2012 they will make up around 37 percent of global
handset sales, according to a recent Gartner report. You'll see PC makers
jumping into the fray, the Android platform will take off, and the battle will
continue to be about consumer-oriented features -- not business readiness.
That's great news for consumers, who will benefit from competition-driven
innovation and, hopefully, lower costs. But for the hardworking folks in the
trenches of network management? "IT will be in a losing battle, blamed for
things it can't control," says Dulaney.
IT security: All about the image
Notebooks and desktops, says Dulaney, "are typically managed by restricting the
choices that users have by reducing the number of software images. This
standards-based process ensures control by reducing flexibility." But try
maintaining that system when users can buy a relatively cheap smartphone with as
much power as a desktop had in the early 1990s.
"Furthermore, attempts by IT organizations to prevent the use of handheld
devices has largely failed because of the number of tools [available] to work
around IT policies. For example, users who are restricted from using wireless
e-mail often find ways to redirect e-mail to outside ISP services, where they
synchronize e-mail to their personally owned devices. This raises the security
threat for enterprises because it means that control of e-mail routing has been
lost," Dulaney says.