Mobile communication is exploding and by the end of the decade over 30 billion devices will be permanently connected and another 150 billion will be intermittently connected. Earlier this year, Gartner held an IT Expo and Symposium focusing on IT security challenges, mobile computing, big data, the cloud and how these factors will affect the future of IT.
According to the research company, more than 1.6 billion smartphones will be purchased worldwide by 2016. An estimated two thirds of mobile workers will own a smartphone and 40 percent of employees will be wireless. Research also estimates that in less than two years, iPads will outnumber the amount of BlackBerrys used in business. Within two years, 20 percent of sales forces will be utilizing tablets as the primary mobile platform. In addition, by 2018, 70 percent of the mobile work force will be using a hybrid mobile device with tablet-like characteristics.
Cloud computing, big data and social media are also major influencers shaping the future of enterprise computing. Big data spending is expected to drive 3.8 percent of IT spending and surpass $3.7 trillion worldwide next year. By 2015, approximately 4.4 million IT jobs will support big data (1.9 million in the U.S.). Gartner estimates that in three years the largest corporations in the world will each be spending over a billion dollars on social media.
Businesses need to focus on the future of enterprise IT as well as mobile data security. Over the next five years, anticipated government regulatory compliance is expected to cause significant increases to security investments. Additionally, an urgent need exists for businesses to implement a mobile security strategy that separates personal and business operations on consumer-owned smartphones and tablets. BYOD or ‘bring your own device’ is quickly becoming the mobile standard in most organizations and businesses need to implement a mobile security solution that is inexpensive, easy to use and provides appropriate safeguards for confidential company data.
When recycling used electronics and mobile devices, it is essential that businesses protect their corporate brand and reputation by ensuring their sensitive business data remains secure. Partnering with e-Stewards® and R2 certified mobile buyback and recycling companies will guarantee your recycling partner adheres to the highest data deletion procedures. e-Stewards, the world’s most rigorous standard for electronics recycling, ensures certified recyclers consistently conform to the highest standards for responsible recycling of electronic equipment, worker safety and data security. Businesses should insist that their recycling partners utilize third-party forensic auditors to validate data deletion processes and do not outsource their data deletion services to non-certified partners.
Mobile technology is rapidly changing and businesses need to adapt their IT strategy before their current IT infrastructure becomes obsolete. Over the next few years, IT departments need to stay ahead of the curve in regards to mobility as well as IT cost structure.
Based on the article iPads will be more common in the enterprise than BlackBerrys in two years, predicts Gartner by Fred Donovan.
e-Cycle Provides Secure Mobile Device Asset Recovery and Recycling for Enterprise
As businesses and organizations begin transitioning to tablets and upgrade to the newest mobile technologies, e-Cycle provides secure, profitable and responsible solutions for reusing and recycling used mobile phones and devices. e-Cycle collects used mobile devices from businesses and organizations, reimbursing them for mobile devices that retain value and recycling all other wireless devices at no charge. The information on every phone is either deleted or destroyed using the industry’s most rigorous data security measures. In January 2012, e-Cycle became the only mobile buyback and recycling company in the world to become e-Stewards certified. For more information, visit www.e-cycle.com.