Consumerization of IT is now a reality and users expect to be able to use their own devices, such as smartphones, tablets or laptops, for their work. In enterprises, IT departments can prevent problems by enabling these typical scenarios and being aware and ready to meet both users’ needs and security policies.
“Consumerization of IT” is the current phenomenon where consumer technologies and consumer behavior are driving innovation in IT products and practices. As people become more comfortable with technology innovation in their personal lives, they expect it in their professional lives. This evolution is already well under way, and is blurring the lines between work and leisure time as well as work and leisure computing devices. This shifts the power of computing innovation from the corporate IT organization (that previously provided computing capabilities) to the user who can easily obtain relatively sophisticated computing capabilities outside of the corporate environment.
While Consumerization of IT (CoIT) has remarkable potential for improving collaboration and productivity, many companies are grappling with the potentially enormous security risks of introducing consumer technologies in their IT environment. Therefore, IT needs to strike a balance between user expectations and enterprise requirements for security, privacy, control, and compliance.
The Consumerization of IT (CoIT) series of documents comprises the following documents :
The first document discusses this trend that is definitely to consider. It constitutes the introduction of a series of documents on Consumerization of IT. This series comprises seven Test Lab Guides (TLGs) to demonstrate typical CoIT scenarios in a logical progression.
- A white paper entitled Consumerization of IT (CoIT), A Trend To Be Considered that introduces as its name indicates the topic;
- Test Lab Guides (TLGs) that allow you to get hands-on experience using a pre-defined and tested methodology that results in a working configuration for the most frequent and relevant CoIT scenarios. Each of these guides also covers how to test and demo each capability.
When you use a TLG to create a CoIT test lab, instructions tell you what servers to create, how to configure the operating systems and platform services, and how to install and configure any additional products, technologies or devices. A TLG experience enables you to see all of the components and the configuration steps on both the front-end and back-end that go into a single- or multi-product or technology solution.
The CoIT Base Configuration TLG is the beginning of the CoIT test lab experience. Other CoIT TLGs of the series focus on a specific scenario, and describe how to set up the components that are necessary to demonstrate the scenario in a logical progression. All the remaining TLGs of the series use the CoIT Base Configuration TLG as a starting point.
The TLGs as a whole demonstrate how current Microsoft technologies such as Windows Server 2008 R2 can enable the most frequent and relevant Consumerization of IT scenarios. The following table sums up the illustrated scenarios.
- Base Configuration - Provide secure corporate network access
- Internet Proxy - Provide Internet access
- Exchange Messaging - Provide email access and manage non-corporate devices security policies
- Data Protection - Manage email security
- Data Classification and Server Isolation - Manage sensitive server and application security
- Remote Desktop Services Desktop Virtualization - Deliver applications to any devices
- Remote Access Gateway - Secure remote access
Supported Operating System
Windows Server 2008 R2 Enterprise, Windows Server 2008 R2 SP1
To be able to build the lab according to the provided guides, you need at least :
- A lab network with working DHCP and DNS services.
- Two Ethernet switches
- Two Wi-Fi access points, one of which with 802.1X capability.
- One Windows Server 2008 R2 server, with 64-bit quad-core, 2GHz CPU, 20GB RAM and 500GB of available disk space, and with the Hyper-V role installed.
- One Windows 7 compatible laptop
- One iPad device
- The following Microsoft products:
- Windows Server 2008 R2 Enterprise with Service Pack 1
- Microsoft Forefront Unified Access Gateway (UAG) 2010
- Microsoft Exchange 2010
- Microsoft Office 2010 Professional Plus or Standard
- Microsoft SharePoint 2010 and Microsoft Office Web Apps