Sales & Marketing
Training & Development
PCs & Servers
Imaging & Printing
Analysis: The 'naked' laptop
Sep 12, 2008 9:24 AM
Naked home workers may be the stuff of fantasy but flexible working is now a corporate reality, according to Tim Dickinson country manager A/NZ Kaseya.
Ready availability of broadband combined with the reliability and speed of wireless communications has transformed home and remote working.
However, flexible working is also proving to be a major business risk. Organisations struggle to impose adequate data storage, back-up and security policies for remote workers.
With increasing volumes of valuable data at risk through storage on laptops and home PCs, the flexible working nirvana is losing its shine. It’s the home worker’s laptop, which is rarely backed up and secured, that is truly naked.
Organisations are increasingly creating flexible contracts for workers, allowing home working one or two days per week. Customer facing employees are now in constant communication with head office irrespective of location.
In an environment promoting improved work and lifestyle balance, the flexibility offered by reliable remote working is transforming the workplace.
No longer chained to the desk, home workers are free to choose the attire, location and time for work – giving rise to the notion of the naked home worker!
While offering many clear benefits, ad hoc policies for remote working also creates significant corporate risks.
After years of investment in data back up and security, organisations are now victim to vital company data leaving the organisation unsecured, unprotected and un-backed up.
More often than not organisations are delivering laptops and VPN access with no more than generic LAN-based policies for regular back ups, security and data synchronisation.
The result is intermittent local backups at best, a tendency to override data synchronisation with the corporate network to save time and sporadic virus/security checks.
As a result, vital corporate information is being left exposed. It is often only shared with other workers via email, undermining management policies and challenging expensive compliance strategies.
More critically however, any damage or theft of these remote devices will result in employee downtime and complete data loss while vital documents and information – from new business propositions to customer correspondence – may be lost for good.
So how can organisations protect the growing volume of data now located outside the safe confines of the corporate IT infrastructure?
Larger organisations with deep pockets are imposing complete control by combining VPN access with automatic security updates, back up and synchronisation whenever a remote machine logs onto the corporate network.
Further safeguards are imposed with often severely restricted access to corporate applications when outside the network.
However, even tightly defined policies can cause problems. By only allowing restricted access to corporate applications and significantly reducing the facilities available on portable devices, organisations are running into problems with knowledge workers who are simply not able to work effectively.
In addition, synchronisation and updated backups/security upgrades are only conducted when the user is connected to the corporate network because the majority of tools automating these processes are LAN based.
The only way organisations can truly impose control over the remote workforce and protect data outside the corporate network is to adopt web-based technology that provides monitoring and support irrespective of location across every wired and wireless Internet connection.
By extending internet-based monitoring and support of devices from within the IT infrastructure to every remote device organisations can regain control over their flexible workers.
Combining real time security downloads with automated back-ups transforms the safety and reliability of the remote working model.
Indeed, even if an organisation opts not to enforce automation, real time monitoring ensures visibility whether or not employees are following back up and security procedures remotely.
Using such a model data can either be streamed to an off site repository, or backed up onto a local device controlled remotely from within the corporate business, while security scans and updates can be scheduled and enforced should a machine be off-line at the scheduled time.
Snapshots of the entire machine taken at regular intervals ensure that should failure occur, the device can be remotely rebuilt and reinstalled within minutes, transforming productivity.
With ever growing demand for flexible working policies that embrace home working, hot-desking and the use of satellite offices, the pyjama wearing employee is a growing breed. But if they are to continue to deliver corporate value, organisations have got to recognise the dangers posed by unsecured data and unprotected machines.
Today, too many in-house and outsourced IT teams are veering from imposing excessive controls that constrain productivity to no control, leading to remote data anarchy.
Unless this risk is addressed, organisations will begin to rapidly rethink the value of remote working. It is only by leveraging web-based tools that organisations can achieve the remote monitoring and automated back up and security required to cost effectively bring the remote workforce back into the controlled environment of the corporate infrastructure.
Follow us on
Lithium-air batteries to make smartphones last for days
Microsoft unveils first laptop and Surface Pro 4
Revealed: Samsung's plan for a Android-Windows hybrid
Kogan launches $329 Windows laptop
US$5 Raspberry Pi Zero: smallest, cheapest model yet
Mitel chief talks possible merger with Polycom
Tech giants divided over digital assistants
HP Inc shares plunge 16% in one day
What’s the big secret with Surface?
Send us your tips
You must be a registered member of CRN to post a comment.
Click here to login
Click here to register
Channel's best mingle at 2015 CRN Fast50 networking drinks
[Photos] Who was at the Four Seasons, Sydney on 26 November?
Former SMS chief Tom Stianos joins Inabox board
Spent 26 years at SMS.
Revealed: The 2015 CRN Fast50!
Meet the fastest-growing IT service providers in Australia.
Sign up to receive CRN email bulletins
Revealed: The 2015 CRN Fast50!
Microsoft Band 2 review: good... but not great
Dimension Data still on notice as NTT plans $500m cost cutting
Telstra kicks off 'root and branch' review of partner program
The full list of the 2015 CRN Fast50
Powered by Disqus
Was your most important vendor the same in 2015 as in 2014?
view previous polls »
Powered by Disqus
CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.
What's in this issue?
Most popular tech stories
14 Windows 10 problems… and how you can fix them forever
The 15 ESSENTIAL Windows 10 tips and tricks you need to know
7 accounting packages for Australian small businesses compared: including MYOB, QuickBooks Online, Reckon, Xero
Windows 10's Cortana gets Australian makeover
Do you use Dropbox? Here are some clever tricks
NBN considering overbuilding dodgy $800m Optus cable
IAG hires Deloitte IT director as 'disruptive' tech deputy
Telstra to cut 150 jobs from enterprise services group
RMIT hires six new IT execs in leadership overhaul
Dimension Data wins Qld's 1 William Street IT fit-out
How to: How much RAM do you really need?
Top 25 fantasy games of all time
14 Windows 10 problems - and how to fix them forever!
Our second Intel 750 SSD winner!
Backups: the 3-2-1 rule and you
Get a Paladins closed beta code!
Star Wars original trilogy heroes and villains
Fallout 4 first beta patch notes
Review: Intel i7-4970K
10 Xbox One exlusives that Microsoft needs to port to Windows 10
PC & Tech Authority
nextmedia Pty Ltd
. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's
Terms & Conditions
Login to CRN
Email or Username:
* Email or Username required
* Password required
Forgot your password?
Don't have an account? Register now!
To request a
, enter the email address linked to your CRN account and we'll send one to you.
* Email required
* Invalid Email address
* Invalid Email address
Click here to return to Login Form
comments powered by Disqus.