We recently spent time with Tom Mainelli, IDC’s Program Vice President, and discussed five of the most common BYOD conversations we’re having with our customers with him.


You won’t be surprised that we’re often asked about the role of physical security in environments where BYOD has changed the level  of control an IT Manager can exert over the devices connected to “their” network.  We asked Tom what traits organizations should be seeking in their physical security partners.


Q: What requirements should drive the search for physical security solutions?


A: Once the ease of use of a solution is verified, a solution provider must prove its mettle in three key areas: an emphasis on ongoing research and development, strong and deep device industry ties, and a history of both design and business stability. The first requirement may seem counterintuitive if you think a lock is just a lock, but from the time the first PCs were rolled out in businesses until now, a lot has changed, including the physical security we use. IDC expects that pace of change to continue, so it’s important to find a partner that will continue to evolve its solutions as the endpoints change.


Kensington MiniSaver Lock

The new MiniSaver lock is the result of our user insight studies and our reaction in to the trend for slimmer devices

You also need a provider that works closely with the device industry on design, standards, and compatibility. This close collaboration was a key to the success of physical security on early desktops and laptops, and it becomes even more important as we move to ever-slimmer devices such as ultrabooks and tablets. Finally, it’s important to find a provider that has a long history of both design and business stability and stands behind its products. Big or small, once a company commits to a solution, it doesn’t want to find out that its current lock is no longer viable or that the solution provider is no longer around to service ongoing needs.

We also asked Tom 4 more hot BYOD questions.

  1. How has the proliferation of BYOD made the IT organization’s job of securing hardware and data more difficult?
  2. What role does physical security play in the overall security strategy in light of BYOD?
  3. What are some of the current solutions or processes in place to address BYOD security?
  4. What are some of the best practices for implementing physical security (i.e., what factors should be considered when adding physical security to an organization’s overall strategy)?


Read the whole Q&A at Kensington.com