SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Bring Your Own Device[ BYOD]
Implementation
Md Yousup Faruqu
IT
AGENDA
Background & Bring Your Own Device (BYOD) Overview
Implementation Roadmap And Approach
Costing And Budget
Analysis And Key Findings
Objectives Of BYOD
Recommendation
BYOD describes an end user computing strategy
supported by a set of policies and controls,
which in conjunction with a technical solution
provide a managed and secure
framework for employees to access corporate
data from their personal device whilst
providing the enterprise with a level of control
over both the device and the data it
can access.
AppleiPhone
Android
Mobile
Windows
Phone
AppleiPad
Android
Tablet
Blackberry
Playbook
Mobile Phone Tablet
Windows
Laptop
AppleMac
Hand Held Laptop
Mobile Device
Desktop
Device
BYOD
The BYOD policy must detail which
items are allowed and the controls
that will be applied.
When defining the scope of any BYOD
implementation consideration must
be given to which end user devices*
will be allowed.
Each device type has its own set of
risks and management issues.
 What devices will be subject to BYOD
 What over arching method of resource access will
be used for:
 Hand held devices
 Laptops
 How will the solution and end users be supported
 How will business units be charged for the service
Strategy
The business reasons for
adopting BYOD, for a
successful BYOD
implementation
Policy
Policy right protects the
business from the risks
associated with BYOD
 What devices makes and models will be allowed
 How will Antivirus be handled
 What actions does the company reserve the right
to carry out on an employees personal device
(e.g. remote wipe on loss)
 How will leavers be handled
 What access controls will be used (Certificate
based authentication, Pin Number lengths)
 Empower users to choose their own devices to
improve productivity, collaboration and mobility
 Protect sensitive information from loss and theft to
meet privacy, compliance and risk management
standards
 Reduce costs and simplify management through
self-service provisioning and automated management
and monitoring
 Simplify IT by deploying apps once for use on any
device
6
 On-demand delivery of data, apps and desktops to any device
– personal or business
 Transform corporate application as well as desktops into an
on-demand service available on device.
 A self-service app store providing unified access and single
sign-on to Windows, web and SaaS apps on any device, over
any network
 Secure file sync and sharing for any device
 Collaborative work platform with coworkers and clients
 A secure-by-design architecture including SSL VPN and
granular policy-based user authentication with tracking and
monitoring to support compliance and privacy.
Increased user mobility
Increased user satisfaction
Increase productivity*
Help retain top performers
Reduce capital costs
Helps to attract younger talent*
 Conduct baseline PoC to identify precise solutions to implement BYOD.
Citrix and VMware has been identified as a best solutions for ABC Inc
infrastructure.
 All tests done in PoC with CITRIX and VMware were successful.
 Use Citrix and VMware BYOD environment to publish or deliver Windows
XP, 7 virtual desktop and application to the selected end users devices:
 iOS device – iPhone, iPad
 Android device – Samsung Phone, Tablet
 Windows Phone – Nokia Lumia
9
Months
- Device & users selection
- Test report
- Provision desktop and
applications
Kick-Off
- Drawing up the RFP
- Publication
- Selection
- Assignment
Implementation
Dec. 2012 May,13 Jun,13
Project Management
RFP
Design &Analysis
- Optimized design
- Technical design
- BYOD Implementation plan
HW
Provisioning
Completion
Oct,13Feb,13
 Site Preparation, Product Delivery And Installation
 Equipment delivery
 Power preparation
 Network preparation
 H/W installation
 OS installation and configuration
 Host Integration (SAN integration)
 Install and configure hypervisor VMware ESX and Virtual Center
 Install and configure VMWare software and high availability
 Install and configure BYOD solution
 Provision virtual desktop and/or applications to the designated users
11
 Hardware Configuration (Total cost: $32k)
 2 physical server with 4X10-core (40) CPU and 196GB RAM
each, used for the host machines
 Software Configuration - Hypervisor (Total cost: $30k)
 VMware vSphere 5.o (8 CPU licenses. Each License covers 1
physical CPU) with 1 years warranty and support
 BYOD solution –Software, Licenses and support ($66k)
 BYOD solution software and licenses
 Storage (Total cost: $36k)
 3TB usable FC storage
13
 Identical physical servers are running at 20-35% utilization.
 With 30 servers consolidated on 3 ESX Server hosts, all the servers
will be operate at 60-80% utilization, resulting in a huge
improvement in server utilization as measured by average CPU and
memory usage.
 Uniform high availability across the entire virtualized IT
environment without the cost and complexity of failover solutions
tied to either operating systems or specific applications.
 The time is reduced for provisioning new servers to minutes. Before
virtualization, it took us 20-30 hours if we needed to prepare a new
system.
 Downtime and IT service disruptions will be minimize.
 E-mail
 HR Application
 ERP Systems
 File Servers [H & Z drive]
 Intranet Applications
Log On
Time
Last State
Change
Endpoint Name
Endpoint
Address
Endpoint
Hardware Id
Client
Version
Horizontal
Resolution
Vertical
Resolutio
n
9/9/12
11:48 AM
11/5/12
10:03 AM
WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768
11/5/12
7:42 AM
11/5/12
7:44 AM
xt45 172.71.237.15 421C1E03 320 480
11/6/12
8:50 AM
11/6/12
8:50 AM
WI_mitjsZpPOTw8J
oSBS
172.71.229.56 CE49DF52 768 1024
11/6/12
8:52 AM
11/6/12
8:53 AM
WI_m4ubYcezolIW
kWImB
172.71.103.49 363D7406 13.0.0.6685 1366 768
11/6/12
8:59 AM
11/6/12
9:00 AM
WI_tk6oktkdeMd19
jJeO
172.71.103.46 3FB64541 12.1.44.1 1280 800
User access report
Budget Head
Cost ($k)
Phase 1
Hardware
Server 32
Storage 36
Software
VMware ESX license 30
BYOD solutions and license 56
Professional Services
Implémentation service 10
Total 164
Costing & Budget
17
Most of the tests performed with CITRIX VDI in POC,
were successful.
We recommend deploy the solution in phased approach
and build the infrastructure gradually
The phase 1 implementation is planned to be done in
2013.
Meanwhile, we understood that there are many vendor
products available in the market, so we would be doing
the POC on VMware technology this year to determine
if there have been any development that more capable
in terms of reliability, and user experience compare to
CITRIX
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Information system
Information systemInformation system
Information system
hiddensoul
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technology
Amrit Banstola
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
Amit Singh
 

Was ist angesagt? (20)

Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Information system
Information systemInformation system
Information system
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technology
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
E-Commerce in India: Evolution, Growth and Challenges
E-Commerce in India: Evolution, Growth and ChallengesE-Commerce in India: Evolution, Growth and Challenges
E-Commerce in India: Evolution, Growth and Challenges
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Erp for manufacturing industry
Erp   for manufacturing industryErp   for manufacturing industry
Erp for manufacturing industry
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
MBA Trim2-Mis Notes
MBA Trim2-Mis NotesMBA Trim2-Mis Notes
MBA Trim2-Mis Notes
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Core Concepts in Information Systems
Core Concepts in Information SystemsCore Concepts in Information Systems
Core Concepts in Information Systems
 
Enterprise resource planning
Enterprise resource planning Enterprise resource planning
Enterprise resource planning
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
dimensions of information system
dimensions of information systemdimensions of information system
dimensions of information system
 
CRM with MIS
CRM with MISCRM with MIS
CRM with MIS
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
 
Information system in global business
Information system in global business  Information system in global business
Information system in global business
 
M.i.s I.T infrastructure
M.i.s I.T infrastructure M.i.s I.T infrastructure
M.i.s I.T infrastructure
 

Andere mochten auch

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Yole Developpement
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Yole Developpement
 

Andere mochten auch (20)

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology Proposal
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
 
Clothing for Biosensing
Clothing for BiosensingClothing for Biosensing
Clothing for Biosensing
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
 
Human cloning
Human cloningHuman cloning
Human cloning
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
 

Ähnlich wie Business Case Of Bring Your Own Device[ BYOD]

Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
Siraj Syed
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
Chuck Roden
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
aralves
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
guest632c73
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
Stephen L Rose
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
Chuck Roden
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
Chuck Roden
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Flexera
 

Ähnlich wie Business Case Of Bring Your Own Device[ BYOD] (20)

Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptx
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_Admin
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Maninder_singh
Maninder_singhManinder_singh
Maninder_singh
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Business Case Of Bring Your Own Device[ BYOD]

  • 1. Bring Your Own Device[ BYOD] Implementation Md Yousup Faruqu IT
  • 2. AGENDA Background & Bring Your Own Device (BYOD) Overview Implementation Roadmap And Approach Costing And Budget Analysis And Key Findings Objectives Of BYOD Recommendation
  • 3. BYOD describes an end user computing strategy supported by a set of policies and controls, which in conjunction with a technical solution provide a managed and secure framework for employees to access corporate data from their personal device whilst providing the enterprise with a level of control over both the device and the data it can access.
  • 4. AppleiPhone Android Mobile Windows Phone AppleiPad Android Tablet Blackberry Playbook Mobile Phone Tablet Windows Laptop AppleMac Hand Held Laptop Mobile Device Desktop Device BYOD The BYOD policy must detail which items are allowed and the controls that will be applied. When defining the scope of any BYOD implementation consideration must be given to which end user devices* will be allowed. Each device type has its own set of risks and management issues.
  • 5.  What devices will be subject to BYOD  What over arching method of resource access will be used for:  Hand held devices  Laptops  How will the solution and end users be supported  How will business units be charged for the service Strategy The business reasons for adopting BYOD, for a successful BYOD implementation Policy Policy right protects the business from the risks associated with BYOD  What devices makes and models will be allowed  How will Antivirus be handled  What actions does the company reserve the right to carry out on an employees personal device (e.g. remote wipe on loss)  How will leavers be handled  What access controls will be used (Certificate based authentication, Pin Number lengths)
  • 6.  Empower users to choose their own devices to improve productivity, collaboration and mobility  Protect sensitive information from loss and theft to meet privacy, compliance and risk management standards  Reduce costs and simplify management through self-service provisioning and automated management and monitoring  Simplify IT by deploying apps once for use on any device 6
  • 7.  On-demand delivery of data, apps and desktops to any device – personal or business  Transform corporate application as well as desktops into an on-demand service available on device.  A self-service app store providing unified access and single sign-on to Windows, web and SaaS apps on any device, over any network  Secure file sync and sharing for any device  Collaborative work platform with coworkers and clients  A secure-by-design architecture including SSL VPN and granular policy-based user authentication with tracking and monitoring to support compliance and privacy.
  • 8. Increased user mobility Increased user satisfaction Increase productivity* Help retain top performers Reduce capital costs Helps to attract younger talent*
  • 9.  Conduct baseline PoC to identify precise solutions to implement BYOD. Citrix and VMware has been identified as a best solutions for ABC Inc infrastructure.  All tests done in PoC with CITRIX and VMware were successful.  Use Citrix and VMware BYOD environment to publish or deliver Windows XP, 7 virtual desktop and application to the selected end users devices:  iOS device – iPhone, iPad  Android device – Samsung Phone, Tablet  Windows Phone – Nokia Lumia 9
  • 10. Months - Device & users selection - Test report - Provision desktop and applications Kick-Off - Drawing up the RFP - Publication - Selection - Assignment Implementation Dec. 2012 May,13 Jun,13 Project Management RFP Design &Analysis - Optimized design - Technical design - BYOD Implementation plan HW Provisioning Completion Oct,13Feb,13
  • 11.  Site Preparation, Product Delivery And Installation  Equipment delivery  Power preparation  Network preparation  H/W installation  OS installation and configuration  Host Integration (SAN integration)  Install and configure hypervisor VMware ESX and Virtual Center  Install and configure VMWare software and high availability  Install and configure BYOD solution  Provision virtual desktop and/or applications to the designated users 11
  • 12.  Hardware Configuration (Total cost: $32k)  2 physical server with 4X10-core (40) CPU and 196GB RAM each, used for the host machines  Software Configuration - Hypervisor (Total cost: $30k)  VMware vSphere 5.o (8 CPU licenses. Each License covers 1 physical CPU) with 1 years warranty and support  BYOD solution –Software, Licenses and support ($66k)  BYOD solution software and licenses  Storage (Total cost: $36k)  3TB usable FC storage
  • 13. 13  Identical physical servers are running at 20-35% utilization.  With 30 servers consolidated on 3 ESX Server hosts, all the servers will be operate at 60-80% utilization, resulting in a huge improvement in server utilization as measured by average CPU and memory usage.  Uniform high availability across the entire virtualized IT environment without the cost and complexity of failover solutions tied to either operating systems or specific applications.  The time is reduced for provisioning new servers to minutes. Before virtualization, it took us 20-30 hours if we needed to prepare a new system.  Downtime and IT service disruptions will be minimize.
  • 14.  E-mail  HR Application  ERP Systems  File Servers [H & Z drive]  Intranet Applications
  • 15. Log On Time Last State Change Endpoint Name Endpoint Address Endpoint Hardware Id Client Version Horizontal Resolution Vertical Resolutio n 9/9/12 11:48 AM 11/5/12 10:03 AM WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768 11/5/12 7:42 AM 11/5/12 7:44 AM xt45 172.71.237.15 421C1E03 320 480 11/6/12 8:50 AM 11/6/12 8:50 AM WI_mitjsZpPOTw8J oSBS 172.71.229.56 CE49DF52 768 1024 11/6/12 8:52 AM 11/6/12 8:53 AM WI_m4ubYcezolIW kWImB 172.71.103.49 363D7406 13.0.0.6685 1366 768 11/6/12 8:59 AM 11/6/12 9:00 AM WI_tk6oktkdeMd19 jJeO 172.71.103.46 3FB64541 12.1.44.1 1280 800 User access report
  • 16. Budget Head Cost ($k) Phase 1 Hardware Server 32 Storage 36 Software VMware ESX license 30 BYOD solutions and license 56 Professional Services Implémentation service 10 Total 164 Costing & Budget
  • 17. 17 Most of the tests performed with CITRIX VDI in POC, were successful. We recommend deploy the solution in phased approach and build the infrastructure gradually The phase 1 implementation is planned to be done in 2013. Meanwhile, we understood that there are many vendor products available in the market, so we would be doing the POC on VMware technology this year to determine if there have been any development that more capable in terms of reliability, and user experience compare to CITRIX