SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
WHI T E PAP E R




                                     “Bring Your Own Computer” Program:
                                     6 Best Practices for Success

     Driven by the groundswell

      of demand for consumer

   technology like Apple Macs,

  “Bring Your Own Computer”

 (BYOC) programs are gaining

popularity with businesses. The

program provides a company’s

  employees with the flexibility

  to choose their device. Some

choose PCs. Many are choosing

  the Mac they already cherish

                 for personal use.



                                     SUMMARY
                                     Business users who love the Apple Mac are the “consumerizers” of technology
                                     in their firms. As loyal citizens of the company, they may use the one-size-fits-all
                                     approved desktop configured with Microsoft Windows. But each one dreams of
                                     ditching that device for a Mac or a better laptop.

                                     Driven by the groundswell of demand for consumer technology like Apple Macs,
                                     “Bring Your Own Computer” (BYOC) programs are gaining popularity with
                                     businesses. The program provides a company’s employees with the flexibility to
                                     choose their device. Some choose PCs. Many are choosing the Mac they already
                                     cherish for personal use.

                                     There are many valid reasons for choosing a Mac. Technologically, Macs are on
                                     par with, if not superior to, many Windows machines. Mac laptops also have a
                                     good battery life up to seven hours. Most importantly, Macs serve as a sleek
                                     accessory for the image-conscious executive who needs to project “latest
                                     and greatest” while wooing big clients.

                                     For these reasons, more organizations are beginning to o er BYOC programs.
                                     BYOC programs can be a huge benefit for both the employees and IT. Employees
                                     enjoy the flexibility of choosing the machine best suited to their needs, while
                                     companies benefit from happier executives and sta , and reduced hardware
                                     investment. In addition, if executed correctly BYOC can dramatically reduce IT
                                     administration and help desk costs.

                                     It is critical that su cient planning is done prior to implementation of these
                                     programs. On considering BYOC, your company will have questions about how
                                     to approach implementation. This guide describes the six best practices of
                                     BYOC for making this program a success in your organization.
             1
“Bring Your Own Computer” Program:
                                                                  6 Best Practices for Success




    1–CHOOSE APPROPRIATE DELIVERY MODEL
    When implementing BYOC, a key consideration is how to deliver identical services
    to multiple computing platforms. While there are many solutions in the market, a
    managed client based virtual machine is the most robust, flexible and cost e ective
    solution for BYOC. Since the image runs locally, it is available online or o ine, and
    requires little hardware or server infrastructure. The management wrapper further
    ensures the image can be centrally managed and updated.

    DELIVERY MODEL                   PROS                             CONS

    Port everything to the web       • Works with any device with     • Expensive and
    Convert all essential services     an Internet connection.          time-consuming
    to be web applications that                                         to convert.
    can be accessed from the                                          • Some applications cannot
    employee owned machine.                                             be converted to the web.
                                                                      • No offline access.

    Provide a remote desktop         • Can be accessed from           • Requires expensive
    Host employees’ corporate          many devices.                    back-end infrastructure.
    desktop in the cloud on a        • Can be centrally managed.      • Interactive applications do
    server using VDI (virtual                                           not work well in VDI or TS.
    desktop infrastructure)                                           • No offline access.
    or TS (Terminal Services).

    Provide virtualized              • Performance is good with       • May not work across both
    applications that run locally      local application execution.     Mac and PC.
    Distribute or stream             • Can be centrally managed.      • Virtual applications do
    virtualized applications to                                         not interoperate with
    employee owned device.                                              each other.
                                                                      • Some applications
                                                                        cannot be virtualized.
                                                                      • Weak security.


    Provide a managed                • Is centrally managed.          • None.
    corporate virtual machine        • Local execution provides
    to run locally                     great performance and
    Distribute corporate virtual       the ability to run online
    desktop directly to the            or o ine.
    employee owned machine           • OS virtualization provides
    using client virtualization.       security and platform
                                       independence.




2
“Bring Your Own Computer” Program:
                                                            6 Best Practices for Success




    2–CLEARLY DEFINE THE POLICIES FOR THE BYOC PROGRAM
    Articulation of policies will help guide success of a BYOC program. By specifying
    details in advance, your company can present a comprehensive, well-thought
    program that will be easy to understand and follow. Typically, a stipend model
    combined with a clearly defined minimum hardware support policy works the best.

    Here are typical policies to consider with BYOC:

    How will machines be acquired? Some programs direct users to buy machines
    from local retailers or through a corporate discount with an online retailer. A
    company can also fulfill BYOC by making the purchases through its own
    corporate acquisition process.

    Is there a stipend, and how much? While some companies require participants in
    BYOC to use their existing computer, others provide a stipend. The user would be
    free to add personal funds if they wanted to upgrade to a more powerful model.

    Which employees are eligible? Some BYOC programs are enterprise-wide; others
    specify eligibility, such as a minimum management level or pay grade.

    What are the minimum hardware specifications for a machine? The company
    must establish a baseline for running business applications at an acceptable level
    of performance. Once this baseline is established, the company should specify
    minimum system requirements (e.g. RAM, CPU and disk space).

    Any recommended or prohibited devices? The BYOC program will generate more
    enthusiasm by accepting as many types of devices as possible. This policy will be
    a ected by the program’s support policy and how the company implements
    program delivery (see “Delivery Model”).

    Who provides support? Policy should define if corporate IT provides hardware
    support, or if the employee must add a support package (like AppleCare) for
    their device. Policy should also specify the minimum level of the support package
    (such as response by “next business day”), and who will pay for the external
    support package.

    All policies should be clearly communicated to employees. Legal and tax
    implications are closely related to program policies.

    3–DISCUSS LEGAL ISSUES WITH CORPORATE COUNSEL
    Corporate counsel should consider factors in the BYOC program that would a ect
    a lawsuit or audit. A forensics analysis may require the company to gain control of
    particular computers in the possession of employees, contractors, or collaborators.
    For example:

    Who owns the hardware? If users own their devices, consider the use of a binding
    agreement that allows the company to meet potential obligations to auditors or
    the legal process. Consider solutions that provide tracking and containment of
    corporate data on the user device.

    Who owns data on the hardware? The agreement should specify which data are
    owned by the company versus user. For example, a partition such as a virtual
    machine would be owned by the company. Data and applications owned by
    users would go elsewhere on the hardware.

3
“Bring Your Own Computer” Program:
                                                                                               6 Best Practices for Success




                                       Statement on personal privacy. The company should clarify what it can and cannot
                                       see or access on the physical computer, and its commitment to privacy of personal
                                       use and data on the device. Users should be responsible for backing up their own
                                       data, as the company cannot be liable for its loss.


                                       4–CONSIDER TAX IMPLICATIONS TO
                                       BOTH THE USER AND THE COMPANY
                                       BYOC can a ect the company’s and employees’ tax responsibilities. The primary
                                       issue entails whether conveying all or even part of a physical device to an employee
7 Essentials for                       or contractor is a taxable event. Federal and/or state law may apply. For example:
Virtual Desktop Security               Does the recipient owe extra tax on the event? Users will be more enthusiastic
CHECK HOST SANITY                      about BYOC if they do not have to pay taxes on a new computer.
Check BYOC physical machine
for malware that can attack the        Does the company pay this tax for the recipient? If new taxes are due, users will
corporate VM. Each virtual desktop     be more enthusiastic about BYOC if the company pays those taxes.
is automatically scanned for malware
before device can be used.             If the recipient leaves the company and keeps the machine, does that constitute
VM ENCAPSULATION                       extra compensation? Policy should specify a user’s tax responsibility for separation
The VM is completely isolated from     from employment or contract.
and independent of the underlying
                                       Companies considering BYOC should consult their tax advisor to clarify these
physical computer.
                                       issues. Users also may be advised to consult their tax advisor.
VM ENCRYPTION
The VM supports strong encryption,
such as AES 128- or 256-bit.           5–NEGOTIATE SOFTWARE LICENSES
                                       BASED ON YOUR DELIVERY MODEL
ACTIVE DIRECTORY
INTEGRATION                            When using virtual desktops, the company may be required to pay for two software
VM supports AD credentials and         licenses unless the employee owns the device—one for the physical desktop, and
two-factor authentication, such as     one for the virtual machine. Licensing should be incorporated into multiyear
RSA SecurID and PKI.
                                       return-on-investment calculations for the BYOC program. For example:
GRANULAR SECURITY POLICIES
Address the entire organization or     What are the licensing considerations if the Virtual Machine runs on a server? If
target policies for di erent user      the user is running a Windows virtual environment on a server, VDA licenses are
groups.                                required in addition to the Microsoft OS license.
CENTRALIZED CONTROL OF
                                       What are the licensing considerations if the Virtual Machine runs on the endpoint?
SECURITY POLICIES
                                       If the user is running a Windows VM on top of an existing OS, only the only the
An administrator can revoke or kill
VMs running on any device.             Virtual Machine needs to be licensed by the corporation.
TAMPER RESISTANT CODE
Only authorized individuals can
                                       6–RE-ASSESS SECURITY AND NETWORK POLICIES
access, modify, or copy the VM         System security is the last major requirement for BYOC. Physical devices chosen by
image or metadata.
                                       end users are outside the reach of controls protecting the organization’s physical
                                       perimeter. So each device must be treated as “untrusted,” and subject to strict
                                       endpoint security measures. Regardless of the delivery model chosen, the BYOC
                                       machine should not be allowed to directly connect to the corporate network.
                                       One approach is to segment the network to create separate corporate and guest
                                       networks. The BYOC machines are allowed only on the guest network. Access to
                                       corporate resources can then be provided from within the secure virtual machine
                                       or through a VPN access point.




                   4
“Bring Your Own Computer” Program:
                                                                                             6 Best Practices for Success




                                     HOW MOKAFIVE IMPLEMENTS BYOC
                                     As you’ve seen, the key to a successful BYOC program is to enable flexibility on
                                     endpoint devices while protecting the corporate environment. MokaFive does this
                                     with desktop virtualization, but in a unique and di erent way from traditional
                                     server-based solutions. In essence, MokaFive moves the virtual machine o the
                                     server and onto each endpoint. Organizations get all the benefits of virtualization
                                     namely the ability to centrally manage but without the cost, complexity and the
                                     network needs of a server based virtual desktop solution.




C AS E    ST U DY

Major Silicon
Valley Law Firm
CHALLENGE
                                     A BETTER APPROACH
• Half of the lawyers wanted to
  use Macs, not PCs                  Simple to deploy, Simple to update
• Enable separate personal and
  corporate environments             With MokaFive, an IT administrator creates a “virtual golden image” of the enterprise
• Support mobile executives’         desktop, called LivePC, and uploads to their MokaFive server. LivePC golden images
  desktops across multiple           are delivered to MokaFive Player running on users’ devices. Updates applied to the
  platforms (Mac, PC, Linux)
                                     golden image are automatically distributed to all LivePCs. Users’ LivePCs are
SOLUTION                             bit-accurate copies of the golden image, so update success rates are significantly
• Deploy MokaFive directly on        higher. And no matter how many, how large, or how complex—updates get applied
  attorneys’ desktops, Mac or
                                     with a single reboot.
  PC hardware
• Single image across users in       Always secure
  the U.S. and China
• Users personalize desktops         MokaFive eliminates worry about infection from malware on users’ systems. The
  with applications                  enterprise golden image is virtualized and completely separated from the users’
BENEFITS                             hardware, applications, and data. More than 70 policy controls, such as encryption,
• Ease of management: single         personalization, and enterprise integration with features like AD and two-factor
  image for all mobile executives,   authentication servers, enable IT to easily implement enterprise security measures
  yet personalized by each user      and policies across all desktops.

                                     Users Keep Their Stu

                                     No longer will updates blow away users’ personal settings every time the enterprise
                                     desktop changes. Within the LivePC, user specific corporate applications, data, and
                                     settings are kept separate from the golden image and golden image updates. IT can
                                     maintain and update a single golden image yet provide customized experience for
                                     each user within their LivePC.




                   5
“Bring Your Own Computer” Program:
                                                                                                         6 Best Practices for Success




                                                One Total Package

                                                Unlike standalone client hypervisors, MokaFive incorporates a Type 2 client
                                                hypervisor (VMware Player, VMware Fusion, or Oracle VirtualBox) and wraps it
                                                with management capabilities. The Player runs on many platforms including Macs
                                                and PCs. The LivePC runs on top of MokaFive Player and is isolated well from the
                                                users’ machine. MokaFive will also o er a baremetal solution, which will allow
  “We’ve used MokaFive                          companies to use MokaFive management directly on corporate machines
      for more than two                         without having to manage and license a host OS.

           years. It lets us                    MokaFive is right for BYOC

     embrace consumer                           MokaFive provides the best of all worlds for a BYOC program. For the enterprise,
          technology and                        it enables total security and central control of all endpoints. The solution allows
                                                IT administrators to centrally create, deliver, secure and update a fully-contained
   personalization, while                       virtual desktop to every employee-owned computer. Robust endpoint security
        at the same time                        provided by MokaFive ensures that electronic corporate assets stay separate
     ensures a managed                          from personal applications and data. For the user, BYOC with MokaFive enables
                                                freedom to use and personalize whatever device they choose. These capabilities
    secure environment.
                                                provide the bedrock of a successful BYOC program.
        Bottom line: user
    satisfaction is higher                      LEARN MORE
           and my sta is                        By following these six best practices, companies will be prepared to avoid
         more e ective.”                        the potential speed bumps and road blocks of BYOC—and reap the benefits of
                                                more productivity, happier employees, and lower cost of IT operations. For more
                                Philip Hoare    information on creating a BYOC program or deploying virtual desktops, please
                          CIO, Wilson Sonsini
                           Goodrich & Rosati    email MokaFive at sales@mokafive.com or visit our website at www.mokafive.com.




MokaFive
475 Broadway Street, 2nd Floor
Redwood City, CA 94063
http://www.mokafive.com

MokaFive™, LivePC™, and the MokaFive
logo are trademarks of MokaFive, Inc. All
other product or company names may
be trademarks of their respective owners.

Revision: BYOCEWP1




                      6

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Kürzlich hochgeladen (20)

Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Empfohlen

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 

Empfohlen (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Bring Your Own Computer (BYOC) Program

  • 1. WHI T E PAP E R “Bring Your Own Computer” Program: 6 Best Practices for Success Driven by the groundswell of demand for consumer technology like Apple Macs, “Bring Your Own Computer” (BYOC) programs are gaining popularity with businesses. The program provides a company’s employees with the flexibility to choose their device. Some choose PCs. Many are choosing the Mac they already cherish for personal use. SUMMARY Business users who love the Apple Mac are the “consumerizers” of technology in their firms. As loyal citizens of the company, they may use the one-size-fits-all approved desktop configured with Microsoft Windows. But each one dreams of ditching that device for a Mac or a better laptop. Driven by the groundswell of demand for consumer technology like Apple Macs, “Bring Your Own Computer” (BYOC) programs are gaining popularity with businesses. The program provides a company’s employees with the flexibility to choose their device. Some choose PCs. Many are choosing the Mac they already cherish for personal use. There are many valid reasons for choosing a Mac. Technologically, Macs are on par with, if not superior to, many Windows machines. Mac laptops also have a good battery life up to seven hours. Most importantly, Macs serve as a sleek accessory for the image-conscious executive who needs to project “latest and greatest” while wooing big clients. For these reasons, more organizations are beginning to o er BYOC programs. BYOC programs can be a huge benefit for both the employees and IT. Employees enjoy the flexibility of choosing the machine best suited to their needs, while companies benefit from happier executives and sta , and reduced hardware investment. In addition, if executed correctly BYOC can dramatically reduce IT administration and help desk costs. It is critical that su cient planning is done prior to implementation of these programs. On considering BYOC, your company will have questions about how to approach implementation. This guide describes the six best practices of BYOC for making this program a success in your organization. 1
  • 2. “Bring Your Own Computer” Program: 6 Best Practices for Success 1–CHOOSE APPROPRIATE DELIVERY MODEL When implementing BYOC, a key consideration is how to deliver identical services to multiple computing platforms. While there are many solutions in the market, a managed client based virtual machine is the most robust, flexible and cost e ective solution for BYOC. Since the image runs locally, it is available online or o ine, and requires little hardware or server infrastructure. The management wrapper further ensures the image can be centrally managed and updated. DELIVERY MODEL PROS CONS Port everything to the web • Works with any device with • Expensive and Convert all essential services an Internet connection. time-consuming to be web applications that to convert. can be accessed from the • Some applications cannot employee owned machine. be converted to the web. • No offline access. Provide a remote desktop • Can be accessed from • Requires expensive Host employees’ corporate many devices. back-end infrastructure. desktop in the cloud on a • Can be centrally managed. • Interactive applications do server using VDI (virtual not work well in VDI or TS. desktop infrastructure) • No offline access. or TS (Terminal Services). Provide virtualized • Performance is good with • May not work across both applications that run locally local application execution. Mac and PC. Distribute or stream • Can be centrally managed. • Virtual applications do virtualized applications to not interoperate with employee owned device. each other. • Some applications cannot be virtualized. • Weak security. Provide a managed • Is centrally managed. • None. corporate virtual machine • Local execution provides to run locally great performance and Distribute corporate virtual the ability to run online desktop directly to the or o ine. employee owned machine • OS virtualization provides using client virtualization. security and platform independence. 2
  • 3. “Bring Your Own Computer” Program: 6 Best Practices for Success 2–CLEARLY DEFINE THE POLICIES FOR THE BYOC PROGRAM Articulation of policies will help guide success of a BYOC program. By specifying details in advance, your company can present a comprehensive, well-thought program that will be easy to understand and follow. Typically, a stipend model combined with a clearly defined minimum hardware support policy works the best. Here are typical policies to consider with BYOC: How will machines be acquired? Some programs direct users to buy machines from local retailers or through a corporate discount with an online retailer. A company can also fulfill BYOC by making the purchases through its own corporate acquisition process. Is there a stipend, and how much? While some companies require participants in BYOC to use their existing computer, others provide a stipend. The user would be free to add personal funds if they wanted to upgrade to a more powerful model. Which employees are eligible? Some BYOC programs are enterprise-wide; others specify eligibility, such as a minimum management level or pay grade. What are the minimum hardware specifications for a machine? The company must establish a baseline for running business applications at an acceptable level of performance. Once this baseline is established, the company should specify minimum system requirements (e.g. RAM, CPU and disk space). Any recommended or prohibited devices? The BYOC program will generate more enthusiasm by accepting as many types of devices as possible. This policy will be a ected by the program’s support policy and how the company implements program delivery (see “Delivery Model”). Who provides support? Policy should define if corporate IT provides hardware support, or if the employee must add a support package (like AppleCare) for their device. Policy should also specify the minimum level of the support package (such as response by “next business day”), and who will pay for the external support package. All policies should be clearly communicated to employees. Legal and tax implications are closely related to program policies. 3–DISCUSS LEGAL ISSUES WITH CORPORATE COUNSEL Corporate counsel should consider factors in the BYOC program that would a ect a lawsuit or audit. A forensics analysis may require the company to gain control of particular computers in the possession of employees, contractors, or collaborators. For example: Who owns the hardware? If users own their devices, consider the use of a binding agreement that allows the company to meet potential obligations to auditors or the legal process. Consider solutions that provide tracking and containment of corporate data on the user device. Who owns data on the hardware? The agreement should specify which data are owned by the company versus user. For example, a partition such as a virtual machine would be owned by the company. Data and applications owned by users would go elsewhere on the hardware. 3
  • 4. “Bring Your Own Computer” Program: 6 Best Practices for Success Statement on personal privacy. The company should clarify what it can and cannot see or access on the physical computer, and its commitment to privacy of personal use and data on the device. Users should be responsible for backing up their own data, as the company cannot be liable for its loss. 4–CONSIDER TAX IMPLICATIONS TO BOTH THE USER AND THE COMPANY BYOC can a ect the company’s and employees’ tax responsibilities. The primary issue entails whether conveying all or even part of a physical device to an employee 7 Essentials for or contractor is a taxable event. Federal and/or state law may apply. For example: Virtual Desktop Security Does the recipient owe extra tax on the event? Users will be more enthusiastic CHECK HOST SANITY about BYOC if they do not have to pay taxes on a new computer. Check BYOC physical machine for malware that can attack the Does the company pay this tax for the recipient? If new taxes are due, users will corporate VM. Each virtual desktop be more enthusiastic about BYOC if the company pays those taxes. is automatically scanned for malware before device can be used. If the recipient leaves the company and keeps the machine, does that constitute VM ENCAPSULATION extra compensation? Policy should specify a user’s tax responsibility for separation The VM is completely isolated from from employment or contract. and independent of the underlying Companies considering BYOC should consult their tax advisor to clarify these physical computer. issues. Users also may be advised to consult their tax advisor. VM ENCRYPTION The VM supports strong encryption, such as AES 128- or 256-bit. 5–NEGOTIATE SOFTWARE LICENSES BASED ON YOUR DELIVERY MODEL ACTIVE DIRECTORY INTEGRATION When using virtual desktops, the company may be required to pay for two software VM supports AD credentials and licenses unless the employee owns the device—one for the physical desktop, and two-factor authentication, such as one for the virtual machine. Licensing should be incorporated into multiyear RSA SecurID and PKI. return-on-investment calculations for the BYOC program. For example: GRANULAR SECURITY POLICIES Address the entire organization or What are the licensing considerations if the Virtual Machine runs on a server? If target policies for di erent user the user is running a Windows virtual environment on a server, VDA licenses are groups. required in addition to the Microsoft OS license. CENTRALIZED CONTROL OF What are the licensing considerations if the Virtual Machine runs on the endpoint? SECURITY POLICIES If the user is running a Windows VM on top of an existing OS, only the only the An administrator can revoke or kill VMs running on any device. Virtual Machine needs to be licensed by the corporation. TAMPER RESISTANT CODE Only authorized individuals can 6–RE-ASSESS SECURITY AND NETWORK POLICIES access, modify, or copy the VM System security is the last major requirement for BYOC. Physical devices chosen by image or metadata. end users are outside the reach of controls protecting the organization’s physical perimeter. So each device must be treated as “untrusted,” and subject to strict endpoint security measures. Regardless of the delivery model chosen, the BYOC machine should not be allowed to directly connect to the corporate network. One approach is to segment the network to create separate corporate and guest networks. The BYOC machines are allowed only on the guest network. Access to corporate resources can then be provided from within the secure virtual machine or through a VPN access point. 4
  • 5. “Bring Your Own Computer” Program: 6 Best Practices for Success HOW MOKAFIVE IMPLEMENTS BYOC As you’ve seen, the key to a successful BYOC program is to enable flexibility on endpoint devices while protecting the corporate environment. MokaFive does this with desktop virtualization, but in a unique and di erent way from traditional server-based solutions. In essence, MokaFive moves the virtual machine o the server and onto each endpoint. Organizations get all the benefits of virtualization namely the ability to centrally manage but without the cost, complexity and the network needs of a server based virtual desktop solution. C AS E ST U DY Major Silicon Valley Law Firm CHALLENGE A BETTER APPROACH • Half of the lawyers wanted to use Macs, not PCs Simple to deploy, Simple to update • Enable separate personal and corporate environments With MokaFive, an IT administrator creates a “virtual golden image” of the enterprise • Support mobile executives’ desktop, called LivePC, and uploads to their MokaFive server. LivePC golden images desktops across multiple are delivered to MokaFive Player running on users’ devices. Updates applied to the platforms (Mac, PC, Linux) golden image are automatically distributed to all LivePCs. Users’ LivePCs are SOLUTION bit-accurate copies of the golden image, so update success rates are significantly • Deploy MokaFive directly on higher. And no matter how many, how large, or how complex—updates get applied attorneys’ desktops, Mac or with a single reboot. PC hardware • Single image across users in Always secure the U.S. and China • Users personalize desktops MokaFive eliminates worry about infection from malware on users’ systems. The with applications enterprise golden image is virtualized and completely separated from the users’ BENEFITS hardware, applications, and data. More than 70 policy controls, such as encryption, • Ease of management: single personalization, and enterprise integration with features like AD and two-factor image for all mobile executives, authentication servers, enable IT to easily implement enterprise security measures yet personalized by each user and policies across all desktops. Users Keep Their Stu No longer will updates blow away users’ personal settings every time the enterprise desktop changes. Within the LivePC, user specific corporate applications, data, and settings are kept separate from the golden image and golden image updates. IT can maintain and update a single golden image yet provide customized experience for each user within their LivePC. 5
  • 6. “Bring Your Own Computer” Program: 6 Best Practices for Success One Total Package Unlike standalone client hypervisors, MokaFive incorporates a Type 2 client hypervisor (VMware Player, VMware Fusion, or Oracle VirtualBox) and wraps it with management capabilities. The Player runs on many platforms including Macs and PCs. The LivePC runs on top of MokaFive Player and is isolated well from the users’ machine. MokaFive will also o er a baremetal solution, which will allow “We’ve used MokaFive companies to use MokaFive management directly on corporate machines for more than two without having to manage and license a host OS. years. It lets us MokaFive is right for BYOC embrace consumer MokaFive provides the best of all worlds for a BYOC program. For the enterprise, technology and it enables total security and central control of all endpoints. The solution allows IT administrators to centrally create, deliver, secure and update a fully-contained personalization, while virtual desktop to every employee-owned computer. Robust endpoint security at the same time provided by MokaFive ensures that electronic corporate assets stay separate ensures a managed from personal applications and data. For the user, BYOC with MokaFive enables freedom to use and personalize whatever device they choose. These capabilities secure environment. provide the bedrock of a successful BYOC program. Bottom line: user satisfaction is higher LEARN MORE and my sta is By following these six best practices, companies will be prepared to avoid more e ective.” the potential speed bumps and road blocks of BYOC—and reap the benefits of more productivity, happier employees, and lower cost of IT operations. For more Philip Hoare information on creating a BYOC program or deploying virtual desktops, please CIO, Wilson Sonsini Goodrich & Rosati email MokaFive at sales@mokafive.com or visit our website at www.mokafive.com. MokaFive 475 Broadway Street, 2nd Floor Redwood City, CA 94063 http://www.mokafive.com MokaFive™, LivePC™, and the MokaFive logo are trademarks of MokaFive, Inc. All other product or company names may be trademarks of their respective owners. Revision: BYOCEWP1 6