{"id":618,"date":"2017-03-27T13:49:28","date_gmt":"2017-03-27T17:49:28","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/industry\/2017\/03\/27\/people-centric-technology\/"},"modified":"2017-03-27T13:49:28","modified_gmt":"2017-03-27T17:49:28","slug":"people-centric-technology","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2017\/03\/27\/people-centric-technology\/","title":{"rendered":"People-Centric Technology"},"content":{"rendered":"
It\u2019s a reality in today\u2019s workplace that employees demand flexibility, access and collaboration when it comes to their work tools \u2013 and providing these tools across a variety of devices and platforms is starting to become table stakes when attracting top talent. Employees want anywhere, anytime access to all the documents, emails and information they need to do their jobs\u2014and they want to access that content on any device.<\/p>\n
What happens when your employees don\u2019t have the tools they need to do their jobs? They resort to their own devices\u2014or apps. Did you know that more than 65% of employees use personal devices for work purposes<\/a> \u2013 and that consumer devices encounter 2x as many threats as enterprise devices?<\/p>\n This can be a major challenge: while IT wants to enable users to work the way they want, it also needs to control access to sensitive information and mitigate potential security risks. At Microsoft, it\u2019s our goal to help bridge the gap between employee needs for device and app flexibility and enterprise needs for data protection and security.<\/p>\n As a mobile-first company, we have adopted a \u201cpeople-centric approach to IT\u201d, placing the User in the center as our No. 1 priority.\u00a0 Users want access to corporate applications and data from anywhere on any device\u2014including personal ones.\u00a0 Our security offerings enable organizations to provide flexibility and preference to their users while keeping employee and company data safe and help prevent future security risks from happening.<\/p>\n Check out, for example, how Avanade was able to implement a secure bring-your-own-device (BYOD) program<\/a>, supporting both employee choice and protecting data security. Or how Just Energy enabled employee mobility<\/a> (and streamlined operations to boot) by implementing Enterprise Mobility Suite. Or how Pepsi was able to drive seamless connection<\/a> between its field and home office employees.<\/p>\n