Many IT staffers are trying to figure out how to deal with the avalanche of requests for iPad connectivity. The iPad represents that dam bursting that many have predicted for nearly a decade. Imagine. A small, lightweight computing platform with fast network connectivity and several hours of battery life – not to mention that it fits nicely on a coach seat tray – what’s not to like? The time-honored IT paradox returns: a CISO nightmare and a user’s dream – especially those road warriors who have lugged 5 to 7+ lb., long-life battery-equipped laptops for two decades. The question remains: “how safe is the device and how do I assure the safety of my network and data center?”
For years, the fear has been data loss – the device with your three year sales projections, draft SEC filings or patient records manages to find its way onto eBay or Craigslist – remember that investment banker’s Blackberry a few years ago?
It’s baaaack! The reinventing monster has returned.
The Citrix value proposition – proxy-based application delivery – offers the simplest and best approach to assure key IT standards are met and maintained. Why? No data file ever leaves the datacenter, XenApp and XenDesktop have the richest administrator authorization controls and security gateway is between the device and datacenter. Oh yeah, assurance that a VPN tunnel is never opened to the enterprise network.
But those basic protections miss the point. Our research is indicating that Microsoft Office applications are likely to be the most commonly used on an iPad – what the …? Look around. I’m starting to see a bunch of Bluetooth keyboards and iPads around (Starbuck’s, airports, etc.). Anybody want to start running Word or PowerPoint on an iPad natively? Quality, open source solutions are starting to pop up. Then again, your users can probably use the Web-based versions soon – what a warming thought!
… And guess what? Even Dilbert’s IT guy can do it! Almost a no brainer to deploy. Stay tuned…”