A: Once the ease of use of a solution is verified, a solution provider must prove its mettle in three key areas: an emphasis on ongoing research and development, strong and deep device industry ties, and a history of both design and business stability. The first requirement may seem counterintuitive if you think a lock is just a lock, but from the time the first PCs were rolled out in businesses until now, a lot has changed, including the physical security we use. IDC expects that pace of change to continue, so it’s important to find a partner that will continue to evolve its solutions as the endpoints change.
You also need a provider that works closely with the device industry on design, standards, and compatibility. This close collaboration was a key to the success of physical security on early desktops and laptops, and it becomes even more important as we move to ever-slimmer devices such as ultrabooks and tablets. Finally, it’s important to find a provider that has a long history of both design and business stability and stands behind its products. Big or small, once a company commits to a solution, it doesn’t want to find out that its current lock is no longer viable or that the solution provider is no longer around to service ongoing needs.
We also asked Tom 4 more hot BYOD questions.
- How has the proliferation of BYOD made the IT organization’s job of securing hardware and data more difficult?
- What role does physical security play in the overall security strategy in light of BYOD?
- What are some of the current solutions or processes in place to address BYOD security?
- What are some of the best practices for implementing physical security (i.e., what factors should be considered when adding physical security to an organization’s overall strategy)?
Read the whole Q&A at Kensington.com