Once upon a time, not so long ago, provisioning and managing mobile devices within the business was a relatively straightforward exercise. Corporate devices were issued to the upper echelons of management, and based on a handful of standard models \u2013 which is pretty much all that was available. Usage was relatively light, restricted initially to voice, and over time, some data traffic.\nFast forward to present day and the picture is a very different one. Mobile devices occupy a critical position in many businesses, and have moved far beyond their humble beginnings. Technology has leapt ahead, and in doing so, has underpinned the dramatic revolution in working practices, practicality, applications and communications.\nIn this new world, IT finds itself dealing with a number of different aspects around provisioning and management. The challenges arising from these aspects range from securing the best pricing packages to integrating the plethora of mobile devices with corporate applications and systems.\nThe chart below (click to expand), taken from recent research carried out by Freeform Dynamics with IT and business professionals into their use of mobile devices in the business environment, shows some of the issues that companies are facing.\n\nAlthough no one particular area stands out as being trouble-free, what causes the most difficulty is dealing with changing user expectations. This is unsurprising, given that mobile technology is so pervasive in both personal and work life, and people increasingly want to incorporate more of their personal applications and services into their work life.\nBut giving users what they want is likely to be risky on a number of levels. Security, for example, becomes a much greater challenge as the resulting permutations and combinations of devices, services and applications give rise to increased risk of security breaches. Even if most users follow company policy pretty diligently, there will always be the few that bypass the rules, potentially leaving the company exposed. And from an integration and support perspective, meeting user expectations fully would put an unnecessary and significant burden on resourcing.\nEven if IT was able to deliver what users wanted at a given point in time \u2013 which is unlikely as IT managers tell us that, from their perspective, expectations are often not grounded in reality \u2013 it probably wouldn\u2019t be able to keep up with the current trends. The mobile world is a fast changing one, and new demands would quickly surface, much like a spoilt child who has too many toys at his disposal, but still wants more.\n\nThis doesn\u2019t mean that companies should completely ignore what users want and enforce a complete clamp-down, micro-managing the environment to ensure that everyone does as they are told. This in itself can be very resource-intensive and counter-productive. The need to allow exceptions to the rule will always arise, irrespective of how tightly things are implemented which could lead to a level of dissatisfaction across the company that will be hard to dispel.\nWe all know how it goes, the marketing director demands that IT integrates and supports the new nifty piece of kit he has bought, as he feels it is absolutely critical to his job \u2013 even though everyone knows it isn\u2019t really. Such \u2018special treatment\u2019 can reinforce political divisions, and create a cascade of resentment, particularly if the majority of users have to work with what they have been given. And once individuals realise that something different is permissible for the select few, the temptation to procure services or kit independently, using local budgets or expense accounts, or even out of their own pocket, will surface.\nThis has the potential to be much more detrimental to the business than meeting users at least part way. For example, while some of the services, applications, or devices that users self-source over and above standard company issue might deliver a few additional benefits, critical functionality could be missing. Moreover, the likelihood is that users are more likely to do things that are superfluous to company requirements, and potentially dangerous to the business, such as synchronising sensitive data to devices with limited or no encryption and only basic pin code protection.\nWhile the role of IT is to deliver the services that their \u2018customers\u2019 need, the user experience only matters to the point that staff are able to carry out their work properly, and morale remains good. Creating the illusion of choice while ensuring that security and application integration is properly addressed \u2013 using an official platform and a selected list of devices, for example \u2013 could comfortably achieve this.\nAscertaining the right balance between what works operationally and from a user\u2019s point of view is the unenviable task of the CIO or IT director, but approaching it with the user needs in mind is undoubtedly the best staring point. Our research has shown that the companies which have the most satisfied users tend to be those that have sought user counsel, and taken their needs and wants into account, while at the same time working within defined boundaries reinforced by the development of a culture of responsible behaviour.\nConversely, probably the biggest cause of failure across most implementations is when IT tries to go it alone. This holds true across all aspects of IT and communications provision.\nOf course, there will always be some users who complain \u2013 it is in their nature. Like the spoilt child, protecting them from their own actions while carefully guiding them works much better in the long run than giving in to every whim and fancy.