SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Preparing an Effective BYOD or
Mobility Strategy
Martin Lindeman
Solution Architect
Agenda
1. Intro - What Are The Benefits?
2. Do You Need a Strategy?
3. Creating a BYOD Strategy
4. Questions
2
What is ‘Bring Your Own Device’?
3
 Bring Your Own Device enables end users to securely
use devices they choose to increase their productivity
and mobility
 These can be devices purchased by the employer, the
employee, contractors, suppliers
“BYOD means any device, with any
ownership, used anywhere”
BYOD Mobility Landscape
4
Smartphones and
Tablets
Two year mobile device growth rate is 102%
Platform
June
2010
June
2011
June
2012
iPhone 3,554 16,857 23,258
iPad 150 5,418 10,779
BlackBerry 14,802 14,233 9,724
Android 40 3,526 6,592
Others 7,005 1,406 1,010
Total 25,401 41,440 51,363
19% 45%
21%
13%
Win – Win
BYOD Delivers Benefits to Employees and the Enterprise
5
 Employees get greater control of their work
experience through choice of device
 75% of IT execs report that allowing employees to bring
consumer devices to work has increased employee
morale
1
 Employers get a more productive workforce and lower
costs
 72% of IT execs say that employees who bring consumer
devices into the workplace are more productive
1
 Annual benefits from BYOD to enterprises ranges from $300
to $1,300 per employee depending on job role
2
1. 2011 IDC Consumerization of IT Study
2. 2012 Cisco IBSG Horizons Study
Do You Need a Strategy?
This is What We are Facing
7
Reduce Security Risk
Improve End-User
Productivity Increase Operation Efficiencies
 Over 15 billion devices by
2015, with average worker
with 3 devices
 New workspace:
anywhere, anytime
 71% of Gen Y workforce
do not obey policies
 60% will download sensitive
data on a personal device
End – User Behaviours IT Trends
 Must control the multiple
devices and guests
 Security: Top concern for
BYOD
 Mobile malware quadrupled
(from 2010 to 2012)
 IT consumed with network
fragmentation
The BYOD Spectrum
8
Denied or
Restricted
Allowed Encouraged Mandated
Environment requires
tight control:
Corp Only Device
Mfg Environment
Trading Floor
Classified Gov Networks
Traditional Enterprise
Focus on basic
services, easy access,
almost anybody
Broader Device Types But
Internet Only
Edu Environment
Public Institutions
Simple Guest
Enable differentiated
services, on-boarding
with security but no
ownership
Multiple Device Types +
Access Methods, VDI
Healthcare
Early BYOD Enterprise
Adopters
Contractors
Corp native apps, new
services, full control
Multiple Device Types
Corp Issued, MDM
Innovative Enterprises
Retail on Demand
Mobile Sales Service
(Video, Collaboration, etc)
Creating a Desktop BYOD
Strategy
Five Steps to Create a BYOD Strategy
10
Step 1
Develop a
Business
Plan
Step 2
Segment the
Workforce
Step 3
Create a
Service
Strategy
Step 4
Define the
Policy
Step 5
Develop
User
Support
Model
Step 1: Developing a Business Case
Calculate an ROI for multiple scenarios
11
Operating Cost
Potential
Savings
Return on
Investment
Current TCO
Upfront
Investment
 Calculate the
Total Cost of
Ownership for
existing fleet
 Include OS,
Software,
Hardware,
Security, Asset
Management,
Support,
Storage, Lost
& Stolen
Devices
 Add the upfront
investment
required to
move to BYOD
 Include VDI,
licensing,
software &
content
virtualisation,
infrastructure,
resource costs
 Add the ongoing
costs of a BYOD
program
 Include all
incremental
costs to deliver
BYOD
 Include tax
implications of
any employee
allowance
 Subtract the
savings that can
be generated in
each TCO line
item through
BYOD
 Include savings
generated by
retiring old
services
 Calculate
potential ROI
then adjust the
elements of your
strategy to
model multiple
scenarios
 Model different
scope, timing,
employee
entitlements
Step 2: Workforce Segmentation
12
Work
Styles
Workstation
Anchored
Local
Collaborator
Remote WorkerHighly Mobile
Offsite External
 Select some key dimensions
to segment the workforce
(e.g. 'need for mobility‟ &
„need for support‟)
 Group users based on
common “work styles”
regardless of role and
department
 Identify common use cases
that apply to each set of
users
Step 3: Creating a Service Strategy
Map Workforce Segments to Planned Service Offerings
13
Corporate
Laptop
VDI
End Point
Mobile
Device
Non-Corp
Laptop
Workstation
Anchored
Local
Collaborator
Remote
Worker
Highly
Mobile
Offsite
External
Prioritise Use Cases for
Implementation
Step 4: Defining the Policy
BYOD Policy Design
14
 Designing the right policies is critical to controlling
costs - 86% of BYOD costs are non-device-
related
1
 IT should drive the policy design however buy-in
needed from HR, Finance, Tax, Legal, and
Corporate Security
 Policy must define minimum acceptable standards
for Hardware, Operating System, and Security
software
 A clear entitlement policy is necessary to ensure
the right tools and services are offered to the right
users for the right cost
 Rules of Use are necessary to set clear
expectations around user behaviours
15
Corporate Rules of Use
1) Allows Business to remotely
wipe the device
2) Requires an acceptable
password and 10 minute
timeout
3) Require users to immediately
report a lost or stolen
device.
 All users must accept rules
of use when signing up for
service
 Trade off between
employee trust and IT
control
 There is no IT jargon – the
rules are simple for end-
users to understand
Step 4: Defining the Policy
BYOD Rules of Use
16
Corporate Policies
 Service
Entitlement
 Rules of Use
 Device Purchase
Local Directives
• Geography
• Business
Functions
Approvals
 MD for Policy
Variations
 Manager for
Individual Liable
 Employee for Self
Support
Agreement
Step 4: Defining the Policy
BYOD Policy Implementation
17
 BYOD without a corresponding strategy
generates more work for IT – 80% of IT
respondents had increased support
workloads from consumerisation
1
 IT budgets are not scaling at the same rate
 A new support model is required:
 IT supports connectivity problems and
issues with the corporate applications
and the operating system
 Hardware support provided by device
manufacture or user
 Community support forums for
knowledge sharing and best practices
Step 5: Developing a User Support Model
Designing a Support Model
1. 2011 IDC Consumerization of IT Study
Conclusions
Key Takeaways
18
1. BYOD is happening - with or without IT
2. Position IT as an enabler - not a barrier
3. Leverage the BYOD trend and target high value use cases
4. Test the waters first before wide-scale deployment
5. Find your right balance between security and client experience
6. Leverage the latest tools out there: eg) MDM and Posture Assessment

Weitere ähnliche Inhalte

Was ist angesagt?

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 

Was ist angesagt? (20)

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Wp byod
Wp byodWp byod
Wp byod
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

Ähnlich wie Preparing an Effective BYOD or Mobility Strategy

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudKPIT
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick SnapshotLinson Kolanchery
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowKirill Bensonoff
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseRES
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
8 Steps to a Successful Mobile Device Program
8 Steps to a Successful Mobile Device Program 8 Steps to a Successful Mobile Device Program
8 Steps to a Successful Mobile Device Program Samsung Business USA
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices Vishwa Raj
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 

Ähnlich wie Preparing an Effective BYOD or Mobility Strategy (20)

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the Cloud
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To Know
 
BYOD
BYODBYOD
BYOD
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
8 Steps to a Successful Mobile Device Program
8 Steps to a Successful Mobile Device Program 8 Steps to a Successful Mobile Device Program
8 Steps to a Successful Mobile Device Program
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Microsoft's Approach to IoT
Microsoft's Approach to IoT Microsoft's Approach to IoT
Microsoft's Approach to IoT
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 

Mehr von Logicalis Australia

Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Australia
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to CompletionLogicalis Australia
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to CompletionLogicalis Australia
 
Three perspective on migrating to Cloud
Three perspective on migrating to CloudThree perspective on migrating to Cloud
Three perspective on migrating to CloudLogicalis Australia
 
Tomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business BriefingTomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business BriefingLogicalis Australia
 

Mehr von Logicalis Australia (14)

Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to Completion
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to Completion
 
Six Steps to Private Cloud
Six Steps to Private CloudSix Steps to Private Cloud
Six Steps to Private Cloud
 
Logicalis Cloud Briefing
Logicalis Cloud BriefingLogicalis Cloud Briefing
Logicalis Cloud Briefing
 
Capturing The New Normal
Capturing The New NormalCapturing The New Normal
Capturing The New Normal
 
Three perspective on migrating to Cloud
Three perspective on migrating to CloudThree perspective on migrating to Cloud
Three perspective on migrating to Cloud
 
Enable flexible working
Enable flexible workingEnable flexible working
Enable flexible working
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
IPv6: Why Should You Care?
IPv6: Why Should You Care?IPv6: Why Should You Care?
IPv6: Why Should You Care?
 
Cisco UCS Briefing
Cisco UCS BriefingCisco UCS Briefing
Cisco UCS Briefing
 
Tomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business BriefingTomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business Briefing
 
Enable Tomorrow's Workplace
Enable Tomorrow's WorkplaceEnable Tomorrow's Workplace
Enable Tomorrow's Workplace
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Preparing an Effective BYOD or Mobility Strategy

  • 1. Preparing an Effective BYOD or Mobility Strategy Martin Lindeman Solution Architect
  • 2. Agenda 1. Intro - What Are The Benefits? 2. Do You Need a Strategy? 3. Creating a BYOD Strategy 4. Questions 2
  • 3. What is ‘Bring Your Own Device’? 3  Bring Your Own Device enables end users to securely use devices they choose to increase their productivity and mobility  These can be devices purchased by the employer, the employee, contractors, suppliers “BYOD means any device, with any ownership, used anywhere”
  • 4. BYOD Mobility Landscape 4 Smartphones and Tablets Two year mobile device growth rate is 102% Platform June 2010 June 2011 June 2012 iPhone 3,554 16,857 23,258 iPad 150 5,418 10,779 BlackBerry 14,802 14,233 9,724 Android 40 3,526 6,592 Others 7,005 1,406 1,010 Total 25,401 41,440 51,363 19% 45% 21% 13%
  • 5. Win – Win BYOD Delivers Benefits to Employees and the Enterprise 5  Employees get greater control of their work experience through choice of device  75% of IT execs report that allowing employees to bring consumer devices to work has increased employee morale 1  Employers get a more productive workforce and lower costs  72% of IT execs say that employees who bring consumer devices into the workplace are more productive 1  Annual benefits from BYOD to enterprises ranges from $300 to $1,300 per employee depending on job role 2 1. 2011 IDC Consumerization of IT Study 2. 2012 Cisco IBSG Horizons Study
  • 6. Do You Need a Strategy?
  • 7. This is What We are Facing 7 Reduce Security Risk Improve End-User Productivity Increase Operation Efficiencies  Over 15 billion devices by 2015, with average worker with 3 devices  New workspace: anywhere, anytime  71% of Gen Y workforce do not obey policies  60% will download sensitive data on a personal device End – User Behaviours IT Trends  Must control the multiple devices and guests  Security: Top concern for BYOD  Mobile malware quadrupled (from 2010 to 2012)  IT consumed with network fragmentation
  • 8. The BYOD Spectrum 8 Denied or Restricted Allowed Encouraged Mandated Environment requires tight control: Corp Only Device Mfg Environment Trading Floor Classified Gov Networks Traditional Enterprise Focus on basic services, easy access, almost anybody Broader Device Types But Internet Only Edu Environment Public Institutions Simple Guest Enable differentiated services, on-boarding with security but no ownership Multiple Device Types + Access Methods, VDI Healthcare Early BYOD Enterprise Adopters Contractors Corp native apps, new services, full control Multiple Device Types Corp Issued, MDM Innovative Enterprises Retail on Demand Mobile Sales Service (Video, Collaboration, etc)
  • 9. Creating a Desktop BYOD Strategy
  • 10. Five Steps to Create a BYOD Strategy 10 Step 1 Develop a Business Plan Step 2 Segment the Workforce Step 3 Create a Service Strategy Step 4 Define the Policy Step 5 Develop User Support Model
  • 11. Step 1: Developing a Business Case Calculate an ROI for multiple scenarios 11 Operating Cost Potential Savings Return on Investment Current TCO Upfront Investment  Calculate the Total Cost of Ownership for existing fleet  Include OS, Software, Hardware, Security, Asset Management, Support, Storage, Lost & Stolen Devices  Add the upfront investment required to move to BYOD  Include VDI, licensing, software & content virtualisation, infrastructure, resource costs  Add the ongoing costs of a BYOD program  Include all incremental costs to deliver BYOD  Include tax implications of any employee allowance  Subtract the savings that can be generated in each TCO line item through BYOD  Include savings generated by retiring old services  Calculate potential ROI then adjust the elements of your strategy to model multiple scenarios  Model different scope, timing, employee entitlements
  • 12. Step 2: Workforce Segmentation 12 Work Styles Workstation Anchored Local Collaborator Remote WorkerHighly Mobile Offsite External  Select some key dimensions to segment the workforce (e.g. 'need for mobility‟ & „need for support‟)  Group users based on common “work styles” regardless of role and department  Identify common use cases that apply to each set of users
  • 13. Step 3: Creating a Service Strategy Map Workforce Segments to Planned Service Offerings 13 Corporate Laptop VDI End Point Mobile Device Non-Corp Laptop Workstation Anchored Local Collaborator Remote Worker Highly Mobile Offsite External Prioritise Use Cases for Implementation
  • 14. Step 4: Defining the Policy BYOD Policy Design 14  Designing the right policies is critical to controlling costs - 86% of BYOD costs are non-device- related 1  IT should drive the policy design however buy-in needed from HR, Finance, Tax, Legal, and Corporate Security  Policy must define minimum acceptable standards for Hardware, Operating System, and Security software  A clear entitlement policy is necessary to ensure the right tools and services are offered to the right users for the right cost  Rules of Use are necessary to set clear expectations around user behaviours
  • 15. 15 Corporate Rules of Use 1) Allows Business to remotely wipe the device 2) Requires an acceptable password and 10 minute timeout 3) Require users to immediately report a lost or stolen device.  All users must accept rules of use when signing up for service  Trade off between employee trust and IT control  There is no IT jargon – the rules are simple for end- users to understand Step 4: Defining the Policy BYOD Rules of Use
  • 16. 16 Corporate Policies  Service Entitlement  Rules of Use  Device Purchase Local Directives • Geography • Business Functions Approvals  MD for Policy Variations  Manager for Individual Liable  Employee for Self Support Agreement Step 4: Defining the Policy BYOD Policy Implementation
  • 17. 17  BYOD without a corresponding strategy generates more work for IT – 80% of IT respondents had increased support workloads from consumerisation 1  IT budgets are not scaling at the same rate  A new support model is required:  IT supports connectivity problems and issues with the corporate applications and the operating system  Hardware support provided by device manufacture or user  Community support forums for knowledge sharing and best practices Step 5: Developing a User Support Model Designing a Support Model 1. 2011 IDC Consumerization of IT Study
  • 18. Conclusions Key Takeaways 18 1. BYOD is happening - with or without IT 2. Position IT as an enabler - not a barrier 3. Leverage the BYOD trend and target high value use cases 4. Test the waters first before wide-scale deployment 5. Find your right balance between security and client experience 6. Leverage the latest tools out there: eg) MDM and Posture Assessment

Hinweis der Redaktion

  1. Customers are wanting to provide choice in end-point devices – moving away from SOE. This allows people to work in new waysA simple definition of BYOD - any device, with any ownership, used anywhere – mobility is key to thisTraditional boundaries of an organisation are being blurred – both physically (where people work) and who (contractors, part time workers)These new workflows bring new challenges
  2. Above is a snapshot of a large enterprise customer – typical of many large organisations(Above is a poll of devices on the customer’s enterprise network over two years)Note the almost exponential growth of iOS and Android devices
  3. There are many benefits to enabling BYOD or having a mobility policy, including productivity and employee retention.
  4. Employees are looking to work anywhere, on any device… The implications is that we now have corporate data on personal devices and a significantly higher number of potential attack vectors (or vulnerabilities/malware) into an organisation.
  5. There are a range of organisational responses – in some case “no” may be the BYOD policy (for example Defence or specific applications). A more liberal approach is more common, with some degree of guest access or limited access to BYO devices or the use of MDM and VDI to securely bring BYO devices into the corporate environment. At the other end of the spectrum organisations will provide a choice of end device (COPE policy) and actively support mobility (for example, in the retail and often professional services sectors).
  6. What steps do we recommend you consider – it is a high-level framework and1) develop a business case (or why are you doing it?)2) what are your current workflows3) look at the requirements for each of the categories in Step 24) what policies are required to enable 5) how do you support this new strategy?
  7. Review the “current state” of the existing desktop/phone fleet, including support and “hidden” costs. Understand the costs of implementing a BYOD environment with the appropriate level of security (technology and operational costs)Estimate the potential savings that can be realised – retiring old devices, self-support models, reduced CapEx on corporate devices
  8. How do staff need to – and want to – work? Identify common work styles or “use cases” that can apply to sets of users.
  9. What kind of connectivity and devices best support each type of worker? These need to be mapped out – typically these can be grouped into 4-6 roles or working styles.
  10. All departments are stakeholders in making this change, and a consultative approach is required in developing a policylegal implications / risksHRAn important aspect is “rules of use” – clear expectations must be set and all employees must understands these. Write them in plain English and ensure they are communicated at all levels of the organisation.
  11. Some basic “rules” are:Acceptance that the business can remotely wipe data if requiredMinimum password length/complexityReporting of any device loss/theft
  12. Set clear policies around what is acceptable: what are the employee entitlements and responsibilities
  13. A sensible user support model is critical – BYOD can increase the workload (without an increase in the IT support budget), but self-support models and creating a community of knowledge / corporate wiki have been proven to offset this additional complexity
  14. So,in summary: BYOD is happening or not – so you need to position IT as an enabler and develop an appropriate strategy for your organisation. Once you have a strategy, there are many tools that can help you effectively implement the right balance of security and mobility – Logicalis has done this for a number of organisations and can assist with all aspects of developi