SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Bring Your Own Device
Quick Facts



About Us           Approach            Partnerships
• 20th Year        • Vendor Agnostic   •   Microsoft Gold
• Grand Rapids &   • Non-reseller      •   VMware Enterprise
  Royal Oak        • Professional      •   Cisco Premier
• 25 Staff           Services Only     •   Novell Platinum
                                       •   Citrix Silver
Expertise
Project Management     Infrastructure




Collaboration          Access & Identity Management
Agenda

• Why the move to personal devices?
• How and what technologies are involved?
• Advantages and disadvantages of
  personal devices
• Managing personal devices
• 4 different corporate policies
• What’s next
Sign of the Times

• 1995 – Employee Car



• 2005 – Employee Cell Phone



• 2015 – Employee Computer
Why The Move To Employee
           Owned Devices?

•   Cost savings
•   Convenience
•   Already in service
•   Cost savings
•   Increased employee satisfaction
•   Increased employee productivity (WAH)
•   Cost savings
Industry Analysis

• Gartner projects a 9-40% savings
  using employee PCs
• 1 in 10 use personal computers for
  primary work device today
• 50% use personal computers for
  work at some time
• 43% of companies have a written
  policy, with specific rules
What Technologies Are
     Typically Involved in BYOD?
•   Robust remote access systems
•   U3 boot devices
•   Corporate image on employee device
•   Remote session environments
•   “Mobile” access technologies
•   Virtual desktop environment
Robust Remote Access Control

•   Firewall(s)
•   Intrusion detection
•   Encrypted communications
•   Remote proxy servers
•   Two factor authentication
•   Load balanced / Fault
    tolerant internet
    connections
U3 Boot Device

• U3 boot devices
• Boot employee laptop from USB Flashdisk
• Run operating system and applications
  from flash drive
• Store data on U3 device
Corporate Image on
          Employee Owned Device
• Create corporate standard
  image
• Install directly to EOD
• Install in virtual session on
  EOD
• Time-Bomb the image or
  remove during offboarding
Citrix Remote Desktop Sessions

• Proven technology – 15+
  years
• Used successfully on
  thousands of applications
• Understood by most IT
  groups
• Strong support network
• Best if used with application
  virtualization
Mobile Access Technologies

• Cell phone

• Smartphone

• Netbook

• IPad / APad
Virtual Desktop Infrastructure

• Remote control of virtual desktop
• Robust internal data center infrastructure
• Variety or remote access devices
• Integrates into your existing desktop
  strategy
• Improves security
Virtual Desktop Benefits

• Longer life of endpoint devices
• Centralized administration
• Improved security
• All data stored in datacenter
• Speed of deployment
• Single image – hardware
  independence
• Better hardware utilization
• Higher availability
• Endpoint device is irrelevant!!
IT Management
Virtualization Expectations




                    2008 IDC Report
Physical vs. Virtual
Cost                                    Physical             Virtual
                                        Desktop              Desktop
Client hardware                         $400                 $300
Server hardware                         -                    $250
Virtual desktop solution                -                    $220
PC deployment costs                     $185                 $25
Operations: Support, software           $600                 $392
deployment, backup, security, virus
protection
End-user operations: Training, self-    $2215                $704
support
Annual downtime cost                    $90                  $30
TOTAL                                   $3490                $1921
 Gartner TCO Comparison of Corporate Owned PCs with Server-Based Computing
Virtual Desktop Components

• Virtualization platform
   – Highly available, resource load
     balancing
• Connection Broker
• Hosted desktop
• Application
  deployment
  process/solution
• Endpoint
   – Desktop, laptop,
     thin client, employee
     owned device
Possible Drawbacks

• Large initial investment
  –   Servers for virtualization infrastructure
  –   FC or iSCSI SAN for shared storage
  –   Network infrastructure
  –   Cost benefit analysis
• IT training / expertise
• Reliance on network connectivity
• End-user experience
Key Players

• VMware
  – View
  – Virtual Infrastructure / vSphere
• Citrix Systems
  – XenDesktop
  – XenApp (Presentation Server)
  – XenServer
• Microsoft
  – Remote Desktop Services (Terminal Services)
  – Hyper-V
  – Windows Server and workstation operating
    systems
Disadvantages of Employee
               Owned Devices
• Commingled data
• Security, higher risk for infection
• Theft or loss of company data
• Incompatibility… OpenOffice on a
  Mac?
• Employee equipment damages
  corporate assets
• Higher support costs without
  proper policies
BYOD Policies

      • Policy # 1 – We Take On All Comers
                         “We struggle with this one - most of our equipment
                         is donated, and some of it is employee owned.
                         I state that personal equipment is be allowed, but
                         it first has to be turned over to IT for a complete
                         reload and AV install, etc, and will be a monitored
                         computer as long as you wish for it to be used
TCTexas
                         here. When you depart or wish to have it removed,
                         IT will reload it with your software if you wish, or
                         simply erase “


http://community.spiceworks.com/topic/107246
BYOD Policies

      • Policy # 2 – Live & Let Live
                         “The equipment policy basically says that the
                         company is not responsible for damage to anything
                         not owned by the company, and that the user is
                         responsible for anything damaged by their
                         personal equipment, as determined by IT.
                         When they see that, most of them decide it's not
TheReal_Joe
                         worth the risk. Or they don't care, and sign it
                         anyway.



http://community.spiceworks.com/topic/107246
BYOD Policies

      • Policy # 3 – Father Knows Best

                        “If they really need something
                        specifically the company buys it for
                        them. If there is no business case for
                        the company to purchase it they
   Sosipaterl
                        don't get it.”




http://community.spiceworks.com/topic/107246
BYOD Policies

      • Policy # 4 – Acthung! We Are in Charge

                       “Simple, the employee can bring in
                       products they buy, but the second
                       they hook them up they belong to IT.
                       Problem solved. This goes double for
   Noitall             netbooks, ipads, etc.”




http://community.spiceworks.com/topic/10 7246
How Do I Get Ready?

• Employee purchase plan / policy
• Corporate insurance
• Select one or more technology
  options
• Written corporate support policy
• Confirm your software licensing
  rights
Case Study - Citrix

Here are the basics:

•   Workers apply to their managers, who decide whether they're a good
    choice for the program. About 10 percent of Citrix's work force
    participates.
•   The company gives workers $2,100 to buy a machine, based on the
    company’s calculations of its total cost of ownership of the devices.
•   Employees are required to install antivirus software that the company
    provides.
•   They are required to buy a service contract with an outside provider
    (Geek Squad, Dell, etc.) Citrix provides application support, but not
    device support.
•   They must connect through Citrix’s SSL VPN, Secure Access
    Gateway. It uses XenApp for application delivery and XenDesktop to
    create the corporate image on those machines.
Case Study - Citrix

•   Company saved 15-20% on TCO
•   > 50% spent more than stipend
•   < 25% kept corporate desktops
•   41% chose Mac OS-X
What is Next?

• IT Business Edge Article
  – http://www.itbusinessedge.com/cm/blogs/all/e
    mployee-owned-laptops-is-more-control-worth-
    added-cost/?cs=10394
• Gartner Article
  – http://www.gartner.com/it/page.jsp?id=696007
Thank You

Royal Oak                                  Grand Rapids
306 S. Washington Ave.                     15 Ionia SW
Suite 212                                  Suite 270
Royal Oak, MI 48067                        Grand Rapids, MI 49503
p: (248) 546-1800                          p: (616) 776-1600




                www.cdh.com
                  (c) C/D/H 2007. All rights reserved

Weitere ähnliche Inhalte

Was ist angesagt?

Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 

Was ist angesagt? (20)

Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
Microsoft 365 business presentation
Microsoft 365 business presentationMicrosoft 365 business presentation
Microsoft 365 business presentation
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Securing your home wi fi network
Securing your home wi fi networkSecuring your home wi fi network
Securing your home wi fi network
 
VDI Performance Assessment
VDI Performance AssessmentVDI Performance Assessment
VDI Performance Assessment
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Cloud security certifications landscape
Cloud security certifications landscapeCloud security certifications landscape
Cloud security certifications landscape
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 Enterprise
 

Andere mochten auch

"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
Clever Consulting
 
2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontro2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontro
Pierfranco Ravotto
 

Andere mochten auch (19)

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
BYOD
BYODBYOD
BYOD
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.
 
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYOD
 
BYOD parent presentation 2015
BYOD parent presentation 2015BYOD parent presentation 2015
BYOD parent presentation 2015
 
2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontro2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontro
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
BYOD
BYODBYOD
BYOD
 
BYOD
BYODBYOD
BYOD
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 

Ähnlich wie Bring your own device

Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Micro Focus
 
fmb_cloud_computing.pptx
fmb_cloud_computing.pptxfmb_cloud_computing.pptx
fmb_cloud_computing.pptx
MrArrow3
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
Flexera
 

Ähnlich wie Bring your own device (20)

Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
fmb_cloud_computing.pptx
fmb_cloud_computing.pptxfmb_cloud_computing.pptx
fmb_cloud_computing.pptx
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
E crm m sc - warwick uni - crm solutions
E crm m sc - warwick uni - crm solutionsE crm m sc - warwick uni - crm solutions
E crm m sc - warwick uni - crm solutions
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
Lecture 6 cloud
Lecture 6   cloudLecture 6   cloud
Lecture 6 cloud
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 

Mehr von C/D/H Technology Consultants

Mehr von C/D/H Technology Consultants (20)

6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
No Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 MigrationNo Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 Migration
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
Google for education vs office 365
Google for education vs office 365Google for education vs office 365
Google for education vs office 365
 
C/D/H 1990-2015
C/D/H 1990-2015C/D/H 1990-2015
C/D/H 1990-2015
 
SharePoint for Government
SharePoint for GovernmentSharePoint for Government
SharePoint for Government
 
Lean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft AzureLean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft Azure
 
SharePoint site admins leverage search
SharePoint site admins leverage searchSharePoint site admins leverage search
SharePoint site admins leverage search
 
Real world records management in SharePoint 2013
Real world records management in SharePoint 2013Real world records management in SharePoint 2013
Real world records management in SharePoint 2013
 
Real world records management in share point 2013
Real world records management in share point 2013Real world records management in share point 2013
Real world records management in share point 2013
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Microsoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentationMicrosoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentation
 
Office 365 branding webinar
Office 365 branding webinarOffice 365 branding webinar
Office 365 branding webinar
 
Have It Your Way! SharePoint Customizations
Have It Your Way! SharePoint CustomizationsHave It Your Way! SharePoint Customizations
Have It Your Way! SharePoint Customizations
 
C/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy StepsC/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy Steps
 
Real world rm in share point 2013
Real world rm in share point 2013Real world rm in share point 2013
Real world rm in share point 2013
 
Lync seminar preso all content
Lync seminar preso all contentLync seminar preso all content
Lync seminar preso all content
 
Office 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the CloudOffice 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the Cloud
 
Epm seminar presentation
Epm seminar presentationEpm seminar presentation
Epm seminar presentation
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Bring your own device

  • 1. Bring Your Own Device
  • 2. Quick Facts About Us Approach Partnerships • 20th Year • Vendor Agnostic • Microsoft Gold • Grand Rapids & • Non-reseller • VMware Enterprise Royal Oak • Professional • Cisco Premier • 25 Staff Services Only • Novell Platinum • Citrix Silver
  • 3. Expertise Project Management Infrastructure Collaboration Access & Identity Management
  • 4. Agenda • Why the move to personal devices? • How and what technologies are involved? • Advantages and disadvantages of personal devices • Managing personal devices • 4 different corporate policies • What’s next
  • 5. Sign of the Times • 1995 – Employee Car • 2005 – Employee Cell Phone • 2015 – Employee Computer
  • 6. Why The Move To Employee Owned Devices? • Cost savings • Convenience • Already in service • Cost savings • Increased employee satisfaction • Increased employee productivity (WAH) • Cost savings
  • 7. Industry Analysis • Gartner projects a 9-40% savings using employee PCs • 1 in 10 use personal computers for primary work device today • 50% use personal computers for work at some time • 43% of companies have a written policy, with specific rules
  • 8. What Technologies Are Typically Involved in BYOD? • Robust remote access systems • U3 boot devices • Corporate image on employee device • Remote session environments • “Mobile” access technologies • Virtual desktop environment
  • 9. Robust Remote Access Control • Firewall(s) • Intrusion detection • Encrypted communications • Remote proxy servers • Two factor authentication • Load balanced / Fault tolerant internet connections
  • 10. U3 Boot Device • U3 boot devices • Boot employee laptop from USB Flashdisk • Run operating system and applications from flash drive • Store data on U3 device
  • 11. Corporate Image on Employee Owned Device • Create corporate standard image • Install directly to EOD • Install in virtual session on EOD • Time-Bomb the image or remove during offboarding
  • 12. Citrix Remote Desktop Sessions • Proven technology – 15+ years • Used successfully on thousands of applications • Understood by most IT groups • Strong support network • Best if used with application virtualization
  • 13. Mobile Access Technologies • Cell phone • Smartphone • Netbook • IPad / APad
  • 14. Virtual Desktop Infrastructure • Remote control of virtual desktop • Robust internal data center infrastructure • Variety or remote access devices • Integrates into your existing desktop strategy • Improves security
  • 15. Virtual Desktop Benefits • Longer life of endpoint devices • Centralized administration • Improved security • All data stored in datacenter • Speed of deployment • Single image – hardware independence • Better hardware utilization • Higher availability • Endpoint device is irrelevant!!
  • 17. Physical vs. Virtual Cost Physical Virtual Desktop Desktop Client hardware $400 $300 Server hardware - $250 Virtual desktop solution - $220 PC deployment costs $185 $25 Operations: Support, software $600 $392 deployment, backup, security, virus protection End-user operations: Training, self- $2215 $704 support Annual downtime cost $90 $30 TOTAL $3490 $1921 Gartner TCO Comparison of Corporate Owned PCs with Server-Based Computing
  • 18. Virtual Desktop Components • Virtualization platform – Highly available, resource load balancing • Connection Broker • Hosted desktop • Application deployment process/solution • Endpoint – Desktop, laptop, thin client, employee owned device
  • 19. Possible Drawbacks • Large initial investment – Servers for virtualization infrastructure – FC or iSCSI SAN for shared storage – Network infrastructure – Cost benefit analysis • IT training / expertise • Reliance on network connectivity • End-user experience
  • 20. Key Players • VMware – View – Virtual Infrastructure / vSphere • Citrix Systems – XenDesktop – XenApp (Presentation Server) – XenServer • Microsoft – Remote Desktop Services (Terminal Services) – Hyper-V – Windows Server and workstation operating systems
  • 21. Disadvantages of Employee Owned Devices • Commingled data • Security, higher risk for infection • Theft or loss of company data • Incompatibility… OpenOffice on a Mac? • Employee equipment damages corporate assets • Higher support costs without proper policies
  • 22. BYOD Policies • Policy # 1 – We Take On All Comers “We struggle with this one - most of our equipment is donated, and some of it is employee owned. I state that personal equipment is be allowed, but it first has to be turned over to IT for a complete reload and AV install, etc, and will be a monitored computer as long as you wish for it to be used TCTexas here. When you depart or wish to have it removed, IT will reload it with your software if you wish, or simply erase “ http://community.spiceworks.com/topic/107246
  • 23. BYOD Policies • Policy # 2 – Live & Let Live “The equipment policy basically says that the company is not responsible for damage to anything not owned by the company, and that the user is responsible for anything damaged by their personal equipment, as determined by IT. When they see that, most of them decide it's not TheReal_Joe worth the risk. Or they don't care, and sign it anyway. http://community.spiceworks.com/topic/107246
  • 24. BYOD Policies • Policy # 3 – Father Knows Best “If they really need something specifically the company buys it for them. If there is no business case for the company to purchase it they Sosipaterl don't get it.” http://community.spiceworks.com/topic/107246
  • 25. BYOD Policies • Policy # 4 – Acthung! We Are in Charge “Simple, the employee can bring in products they buy, but the second they hook them up they belong to IT. Problem solved. This goes double for Noitall netbooks, ipads, etc.” http://community.spiceworks.com/topic/10 7246
  • 26. How Do I Get Ready? • Employee purchase plan / policy • Corporate insurance • Select one or more technology options • Written corporate support policy • Confirm your software licensing rights
  • 27. Case Study - Citrix Here are the basics: • Workers apply to their managers, who decide whether they're a good choice for the program. About 10 percent of Citrix's work force participates. • The company gives workers $2,100 to buy a machine, based on the company’s calculations of its total cost of ownership of the devices. • Employees are required to install antivirus software that the company provides. • They are required to buy a service contract with an outside provider (Geek Squad, Dell, etc.) Citrix provides application support, but not device support. • They must connect through Citrix’s SSL VPN, Secure Access Gateway. It uses XenApp for application delivery and XenDesktop to create the corporate image on those machines.
  • 28. Case Study - Citrix • Company saved 15-20% on TCO • > 50% spent more than stipend • < 25% kept corporate desktops • 41% chose Mac OS-X
  • 29. What is Next? • IT Business Edge Article – http://www.itbusinessedge.com/cm/blogs/all/e mployee-owned-laptops-is-more-control-worth- added-cost/?cs=10394 • Gartner Article – http://www.gartner.com/it/page.jsp?id=696007
  • 30. Thank You Royal Oak Grand Rapids 306 S. Washington Ave. 15 Ionia SW Suite 212 Suite 270 Royal Oak, MI 48067 Grand Rapids, MI 49503 p: (248) 546-1800 p: (616) 776-1600 www.cdh.com (c) C/D/H 2007. All rights reserved