SlideShare ist ein Scribd-Unternehmen logo
1 von 12
BYOD: Device Management
Introduction 
What is BYOD? 
Bring your own device (BYOD) is an alternative strategy allowing 
employees, business partners and other users to utilize a personally 
selected and purchased client device to execute enterprise applications 
and access data. 
First entered in 2009, as organizations started recognizing an increasing 
tendency among its employees to bring their own devices to work and 
connect them to the corporate network. 
Formal BYOD programs are a relatively new but fast-growing phenomenon. 
The rapid proliferation of employees mobile devices is changing the 
traditional IT environment in enterprises.
Dextop, 18% 
Laptop, 33% 
Smartphone, 
Ultraportable, 
Netbook, 7% 
26% 
Tablet, 11% 
5% 
Sales 
Dextop 
Laptop 
Netbook 
One in four devices used for work are 
either smartphones or tablets
There is no stopping BYOD 
The BYOD market will increase to 
$181 billion by 2017. 
(Marketsandmarkets) 
95% of organisation permit 
employee-owned devices.(CISCI 
IBSG) 
71% require technology that 
enables their staff to work 
anywhere at any time.(Microsoft) 
70% of employees use personal 
devices for business use. 
(Forrester)
WHY BYOD ? 
FLEXIBILITY 
No hassle with one device to combine work and personal activities. 
EFFICIENCY 
Can get more work done with their own device. 
COST REDUCTION 
Annual benefits from BYOD range from $300-$1300 per employee. 
PRODUCTIVITY 
53% have raised work productivity through innovative practices enabled by 
their devices. 
EMPLOYEE SATISFACTION 
Employees feel more comfortable while working on personal devices, which 
improves their job satisfaction levels.
9 out of 10 
Employees 
don’t use 
password 
security on 
their 
devices 
51% 
Have had 
loss due to 
insecure 
devices 
81% 
Admit 
accessing 
their 
employer’s 
network 
without 
their 
employer’s 
knowledge 
or 
permission 
46% 
Who use a 
personal 
device for 
work have 
let 
someone 
else use it 
66% 
Who use a 
personal 
device for 
work say 
that their 
organizati 
on doesn’t 
have 
BYOD 
policy 
BRING YOUR OWN DISASTER
Multi-layered security technologies 
File 
Storage 
Network 
Pretty Good Privacy 
Information Rights 
Management 
Full Disk Encryption 
Database Encryption 
Data Loss Prevention 
Firewall 
Virtual Private 
Network
Network-centric Solutions 
Firewall 
Protects the (eroded) perimeter 
DLP(Data Loss Prevention) 
Monitoring 
Good to understand where data is going 
Problem is wealth of information it produces 
VPN(Virtual Private Network) 
Protects data in transit only
MDM-Mobile Device Management 
Software that secures, monitors, manages and supports 
mobile devices. 
Over-the-air distribution of applications, data and 
configuration settings. 
Supports company-owned and employee-owned devices. 
Addresses the limitations of Microsoft ActiveSync. 
Comprehensive visibility and control over iPhones, iPads, 
Androids and other popular devices with a scalable mobile 
device management software solution.
CONCLUSION 
Employee attitudes to work-life balance and single device usage 
drive high levels of BYOD in high-growth markets 
Instead of denying access citing the security concerns, it would be 
best in business interest to embrace this business policy which 
allows people to be more productive in longer run. 
IT departments must find the right way to manage this behaviour.
BYOD
BYOD

Weitere ähnliche Inhalte

Was ist angesagt?

Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 

Was ist angesagt? (20)

Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
 
Erp presentation
Erp presentationErp presentation
Erp presentation
 
Erp ppt
Erp pptErp ppt
Erp ppt
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
iot seminar topic
iot seminar topic iot seminar topic
iot seminar topic
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Digital Trust
Digital TrustDigital Trust
Digital Trust
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems Presentation
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 

Andere mochten auch

Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Microsoft Technet France
 

Andere mochten auch (20)

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Segurança da Informação em BYOD
Segurança da Informação em BYODSegurança da Informação em BYOD
Segurança da Informação em BYOD
 
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
 
Il pnsd a scuola
Il pnsd a scuolaIl pnsd a scuola
Il pnsd a scuola
 
09 età di_pericle
09 età di_pericle09 età di_pericle
09 età di_pericle
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
Pesquisa sobre BYOD
Pesquisa sobre BYODPesquisa sobre BYOD
Pesquisa sobre BYOD
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Byod
ByodByod
Byod
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyr
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
 
BYOD
BYOD BYOD
BYOD
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolastici
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYOD
 

Ähnlich wie BYOD

how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Marta Kusinska
 
Security that works
Security that worksSecurity that works
Security that works
James1280
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
IBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 

Ähnlich wie BYOD (20)

Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
 
Security that works
Security that worksSecurity that works
Security that works
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device Management
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

BYOD

  • 2. Introduction What is BYOD? Bring your own device (BYOD) is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. First entered in 2009, as organizations started recognizing an increasing tendency among its employees to bring their own devices to work and connect them to the corporate network. Formal BYOD programs are a relatively new but fast-growing phenomenon. The rapid proliferation of employees mobile devices is changing the traditional IT environment in enterprises.
  • 3. Dextop, 18% Laptop, 33% Smartphone, Ultraportable, Netbook, 7% 26% Tablet, 11% 5% Sales Dextop Laptop Netbook One in four devices used for work are either smartphones or tablets
  • 4. There is no stopping BYOD The BYOD market will increase to $181 billion by 2017. (Marketsandmarkets) 95% of organisation permit employee-owned devices.(CISCI IBSG) 71% require technology that enables their staff to work anywhere at any time.(Microsoft) 70% of employees use personal devices for business use. (Forrester)
  • 5. WHY BYOD ? FLEXIBILITY No hassle with one device to combine work and personal activities. EFFICIENCY Can get more work done with their own device. COST REDUCTION Annual benefits from BYOD range from $300-$1300 per employee. PRODUCTIVITY 53% have raised work productivity through innovative practices enabled by their devices. EMPLOYEE SATISFACTION Employees feel more comfortable while working on personal devices, which improves their job satisfaction levels.
  • 6. 9 out of 10 Employees don’t use password security on their devices 51% Have had loss due to insecure devices 81% Admit accessing their employer’s network without their employer’s knowledge or permission 46% Who use a personal device for work have let someone else use it 66% Who use a personal device for work say that their organizati on doesn’t have BYOD policy BRING YOUR OWN DISASTER
  • 7. Multi-layered security technologies File Storage Network Pretty Good Privacy Information Rights Management Full Disk Encryption Database Encryption Data Loss Prevention Firewall Virtual Private Network
  • 8. Network-centric Solutions Firewall Protects the (eroded) perimeter DLP(Data Loss Prevention) Monitoring Good to understand where data is going Problem is wealth of information it produces VPN(Virtual Private Network) Protects data in transit only
  • 9. MDM-Mobile Device Management Software that secures, monitors, manages and supports mobile devices. Over-the-air distribution of applications, data and configuration settings. Supports company-owned and employee-owned devices. Addresses the limitations of Microsoft ActiveSync. Comprehensive visibility and control over iPhones, iPads, Androids and other popular devices with a scalable mobile device management software solution.
  • 10. CONCLUSION Employee attitudes to work-life balance and single device usage drive high levels of BYOD in high-growth markets Instead of denying access citing the security concerns, it would be best in business interest to embrace this business policy which allows people to be more productive in longer run. IT departments must find the right way to manage this behaviour.