Ready for some practical guidance on the consumerization of IT? Although many see consumerization as a growing trend, it’s fast becoming a permanent fixture in the enterprise environment. Chances are, it’s already happening in your own organization.
To minimize the risks associated with unsecured and unmanaged technologies in the enterprise, it’s important to take a proactive approach. This practical guide to the consumerization of IT explains how IT managers can adopt a user-centered strategy—one designed to optimize the computing experience and keep the user productive on any device—all while maintaining the performance, security, and manageability that IT demands. Moreover, this new approach gives IT a powerful opportunity to retain the organization’s reputation as a technology innovator—especially when it comes to Bring Your Own Device (BYOD) programs. This guide also includes insights and best practices for supporting employee-owned devices and selecting the right employer-provided tools for diverse roles and responsibilities and a range of technology needs.
1. Five Steps to Consumerization
Intel’s Guide to Embracing the Inevitable
2. Intel’s Definition
Consumerization:
The technology we use in our personal
lives—applications, hardware, and even
Internet services—has a distinct impact on the
technology experience we expect at work.
Extends beyond devices to include the entire computing experience—much
broader than Bring Your Own (BYO)
2
3. Rethink Your Approach
By better aligning employees’ at-work technology experience
and their at-home experience, you can:
Increase Retain your Gain greater IT
productivity and organization’s security and control
improve employee reputation as a over employee-
morale technology owned devices
innovator—especially
when it comes to
Bring Your Own
Device programs
3
4. Manage Consumerization in Five Steps
1 Understand the powerful forces driving consumerization.
2 Rethink user computing with a user-centered strategy.
3 Create an inclusive approach by creating a two-way
communication channel with users.
4 Support employee-owned devices with known best IT practices.
5 Find the right employer-provided tool for the job to give
employees what they need: One size does not fit all.
4
5. Step 1. Understand the Forces at Work
Traditional
IT Requirements
Standardization
Compliance
=
Manageability
Security
IT Innovation
+
Emerging
IT must balance traditional IT
requirements with emerging
end-user needs.
End-User Needs
Freedom Flexibility Individuality
DRIVERS
Device Innovation
Increasing Mobility
Cloud Services
Increased Data Availability
Natural Interaction with Technology
Evolution of the User
5
6. Step 2. Rethink User Computing
Rethink the Maintain the Use centralized
compute comprehensive management
experience to security, to securely
give users the automated deliver the right
freedom and management, resources.
flexibility they compatibility,
want. and compliance
that IT requires.
6
7. Step 3. Create an Inclusive Approach
Communication Security
Adopt a two-way Improve job satisfaction
communication channel vs. while you gain stronger
the traditional IT-to-user security and control.
model.
7
8. Step 4. Support Employee-Owned Devices
Ensure Success with Best Practices:
Engage Update Decide on Plan Stay
stakeholders your security OS and deployment current with
model devices technology
1 2 3 4 5
• Engage key stakeholders. • Enable the technology and plan
• Update your security model. deployment.
• Choose which operating systems and • Stay current with technologies and
devices you will support. trends.
8
9. Step 5. Find the Right Tool for the Job
OPTIMIZED FOR BATTERY LIFE OPTIMIZED FOR PERFORMANCE
CONTENT CONSUMPTION CONTENT CREATION
TABLET ULTRABOOK™ ULTRABOOK™
CONVERTIBLE1
Information at your fingertips. A versatile two-in-one device An outstanding mobile
Enables stand-up computing, that seamlessly adapts to your computing experience in sleek
data snacking, and usages that needs. and responsive designs, with
need lighter weight, long great performance and battery
battery life, and an always life.
connected experience.
HIGHLY MOBILE WORKER
TASK WORKER KNOWLEDGE WORKER
1
Ultrabook products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook manufacturer. For more information and details, visit intel.com/ultrabookforbusiness.
9
10. Innovation for Business
Ultrabook™, Inspired by Intel 1
Available as a two-in-one device
with a detachable touch screen that converts to a tablet
Also available in convertible models that offer swivel capabilities
and slide and flip screens for standing use
Offers built-in security2 for greater protection
with the 3rd generation Intel® Core™ vPro™ processor3
1
Ultrabook products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook manufacturer. For more information and details, visit intel.com/ultrabookforbusiness.
2
No computer system can provide absolute security under all conditions. Built-in security features available on select Intel Core processors may require additional software, hardware, services, and/or an Internet connection. Results may vary depending
upon configuration. Consult your PC manufacturer for more details. For more information, visit intel.com/technology/security.
3
Intel vPro technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more about the breadth of security
features, visit intel.com/technology/vpro.
10
11. Learn More
• Read the full planning guide, Five Steps to Consumerization:
Intel’s Guide to Embracing the Inevitable.
• Find out more about managing consumerization from Intel
at intel.com/consumerization.
• For more information about Ultrabook™ products, visit
intel.com/ultrabookforbusiness.
11