The new face of the ITDM

Spoiler alert: It’s everyone who works in your company.

Make no mistake: in a world where employees now use their own devices, applications and software to get work done, they have an increasingly persuasive voice in the decisions an organization makes regarding IT policy.

Gone is the IT department autocracy with its centralized command and control approach. New IT will be defined by a democratized approach, driven predominantly by the phenomenon of consumerization.

Now, more than ever, enterprises need to consider what this democratization means to their respective business cultures—and whose responsibility it is to define changes to their existing IT policies.

Priority #1: Who gets invited to your policy setting party?

One of the first priorities when planning the journey towards a democratized IT environment is identifying who should be included in policy setting.

If your company’s IT policy is to truly reflect a cultural change in the way your people use and consume IT assets, then it is vital that any policy amendments be made not just by the IT department, but by representatives from HR, legal and key business units within your organization.

It’s easy to see why. Consider the BYOD phenomenon. Should bringing your own devices to work be an employee perk or an integral part of an employee contract? The decision affects many employees and their POV is a valuable component in making an effective, well-informed call.

A big change in thinking.

Granted, IT still has a vital role in this new age of policy setting but that role has evolved from being strictly a policy definer toward being more of a policy enforcer or deliverer, an enabler for employees to get the tools they need to perform the work.

This might not be welcome news to the IT professionals with entrenched views as it represents a major change in thinking and it’s never easy overhauling a long-standing approach.

But with the growth of social media, mobile devices and the BYOD trend, major changes for CIOs and IT managers are inevitable. These changes strip away some control, some power and perhaps even some budget, resulting in a sense of uncertainty and an understandable desire to stick with the standardized approach.

On the flip side this presents an opportunity for forward thinking IT departments to align IT with business strategy and leverage the unique position of IT to become a business productivity enabler and company innovator.

More than a technology fix.

The industry’s mixed response to a new way of creating and evolving IT policy is indicative of IT democratization’s infancy—as well as the need for forward-thinking companies to clearly identify the steps that need be taken to evolve toward decentralization.

The first step is identifying which business departments need to be involved in your company’s IT policy-making decisions, then clearly defining the roles and responsibilities of those people and departments selected.

From there, businesses can carve a clear pathway toward a decentralized IT department capable of providing employees with an IT service that best suits their work needs.

HOW JUNIPER CAN HELP

Mobility

The consumerization of IT has resulted in an explosion of mobile devices, creating new opportunities for enterprises and service providers alike. Juniper Networks is helping enterprises by enabling users to safely access the network on the device of their choice, making them more productive, and helping service providers to secure their mobile infrastructure and monetize services for mobile subscribers and enterprise customers. Happier, more productive users, and happier, more profitable service providers. Either way, it’s a win-win.

Read more about Juniper Networks solutions for Mobility.Connect to Sales

Net News

Mobility

Whether you're a service provider with millions of customers or a large enterprise enabling thousands of employees, mobility is at the heart of every challenge, opportunity and necessity facing your business today.


Security

The rise of social networks have given cyber-criminals a new way to wreak havoc on network security, but it’s hardly the only trend threatening your business. There’s the myths and realities of cloud security to be sorted through, plus the proliferation of new platforms and devices.


Software

When it comes to technology, consumers are spoiled. They take for granted the simple but powerful applications they encounter on the Internet, and expect their enterprise apps to act the same way.


The Internet of Things

The phrase “everything’s connected” has never been more true or measurable than now. The amount of devices connected to the Internet will soon exceed the number of people connected, and the opportunities presented by this constant flow of information are endless.


Virtualization and the Cloud

Everyone’s talking about the cloud because, frankly, everyone needs it. The opportunity to access and create content remotely cannot be ignored, nor can the ease of scaling that allows enterprises to tap into more server farms whenever they’re needed.


Web of Services

As the demands of the masses grow, more services have migrated online to meet them, creating incredible opportunities for even “the little guys” to access trends and big data once reserved for large enterprises.


Wireless LAN

Going wireless is not just about keeping down IT costs; it’s about taking advantage of the proliferation of mobile computing devices among your workers, vendors and colleagues to unleash unprecedented levels of productivity.