Due to the proliferation of consumer devices being used in the workplace, the users that IT departments serve are completely different than in years past. The game has totally changed in terms of security, loss of control and support. Employees have multiple devices and expect accessibility to essential apps and company data whenever they want.\u00a0 To successfully deal with these changes, IT departments have to move away from a device-centric approach but still maintain efficiency.\n\tIt\u2019s the User, Not the Device\n\tYears ago, workers would sit at one computer, work for 8 hours and go home.\u00a0 Now, employees can access company data anywhere: on their way to work through their iPad, on a laptop at their desk, through their smartphones after hours.\u00a0 Employees are constantly connected and working from different platforms.\u00a0 IT has to maintain control over the what, when and where of data being accessed.\u00a0 It\u2019s not about limited BYOD, but rather about being aware of the different devices, different platforms, and different applications one user will consume in just one day.\u00a0 To achieve this, your IT department must find ways to automate processes in order to keep up with efficiency.\n\tOne company that is working to help companies automate processes in the face of BYOD is ForeScout Technologies, which provides automated security control platform software and hardware that allows customers to increase infrastructure accessibility while remaining highly secure. According to Forrester, the company is the top ranked network access control vendor by product offering and execution.\n\t\u201cNetwork access control basically allows companies to in real-time apply policies to all IP devices that are attempting to attach to corporate network, whether it be servers, desktops, notebooks, phones, videophones or printers,\u201d according to Scott Gordon, vice president of worldwide marketing, in this article from MSP News. \u201cAdministrators can activate policies that allows the user or device immediate and full access, or if there is an issue, would potentially deny users access, limit their access or attempt to fix or resolve some of the security issues resolved with that device in a highly automated fashion.\u201d\n\tIT-as-a-Service\n\tThere are many different ways to deliver technology to employees, from local servers, to the cloud, to virtualized desktops.\u00a0 But each method is not a one-size-fits-all solution. For example, a centrally-hosted virtual desktop would be problematic for a mobile worker.\u00a0 If IT departments move to an \u201cIT-as-a-Service\u201d model, they can provide the necessary applications at the request of employees, with delivery of these applications being automated.\u00a0 IT-as-a-Service requires a deep awareness of how technology is consumed among different employees.\u00a0 It serves both the needs of the employee and the needs of IT, allowing employees to get what they want when they want it while allowing IT to keep track of how technology is being used.\n\tUsers Changing Network Technology\n\tAn example of a company at the forefront of changing network technology due to new user behavior is Enterasys and its solution OneFabric Edge.\u00a0 OneFabric Edge is a purpose-built architecture for edge networking to support mobile application delivery.\u00a0 It incorporates both wired and wireless networks, allowing enterprises to deliver high quality applications to mobile users at any scale.\u00a0 OneFabric Edge provides both a detailed and holistic view of a company\u2019s entire network.\u00a0 It gives insight into the who, what, where, and which into the technology being used in the company.\u00a0 With this complete overview, it\u2019s much easier to create unified policies across the network while at the same time be able to differentiate users and give each user the necessary access they need.\u00a0 OneFabric Edge allows IT personal to troubleshoot much faster if a problem should occur, allowing a much more pleasant user experience.\u00a0\n\tThis product was born due to the increase of BYOD programs in the enterprise.\u00a0 As Enterasys VP of Market Ram Appalaraju said, this is the product that customers demanded.\u00a0 It\u2019s a way to manage the multiple devices that are infiltrating the workplace, while still addressing security concerns and creating unified policies important to the IT department.\n\tHow has the consumerization of IT changed the architecture of your IT department?