SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Come construire una
strategia vincente di
        BYOD

                Gary McConnell
             Clever Consulting Srl.
BYOD – What is it?
• Bring Your Own Device
  – personally-owned mobile devices for business
    applications
  – Goals
     • drive employee satisfaction and productivity through the use
       of new technologies, while reducing their mobile expenses
  – consumerization of IT
     • consumer preference, not corporate initiative,
  – technologies not built with enterprise requirements
     • IT teams uncomfortable about security and supportability.
Approaches
• Top of the pyramid
   –   Upper management & VIP users
• Broadscale
   –   Extend to workforce


• Companies providing choice
   –   Company paid Blackberry
   –   Personal funded iOS or Android


• Monica Basso, Research VP at Gartner, Inc., predicted that by
  2014 “90% of organizations will support corporate
  applications on personal devices.”

• IT teams need to prepare for a mixed-ownership mobile
  device environment.
Implications
• But BYOD is more than just shifting ownership
  of the device to the employee.
• complex and hidden implications
• a strategy needs to be defined in advance of
  implementation
BYOD strategy components
•   Sustainability
•   Device choice
•   Trust model
•   Liability
•   User experience and privacy
•   App design and governance
•   Economics
•   Internal marketing
Sustainablity
• Common Problem - BYOD policies not
  sustainable over the long term.
• BYOD policies must meet the needs of both IT
  and employees:
  – Secure corporate data
  – Minimize cost to implement and enforce
  – Preserve user experience
  – Stay up-to-date with user preference and
    technology innovation
Device Choice
• Building a policy :
   – Analyzing employee preference
   – Acceptance baseline - security and supportability
      • Basics - asset management, encryption, password policy,
        remote lock/wipe, and email/Wi-Fi/VPN configuration
   – Understanding the operating system, hardware, and
     regional variances around that baseline
   – Developing a certification plan
   – Clear communication to users
   – Ensuring the IT team has the bandwidth to stay up-to-
     date
Trust Model
• Trust is the foundation for enterprise security
• The trust level of a mobile device is dynamic
  – Example – CFO with financial data
• BYOD - another layer
• Privacy policies will vary
• User expectations will differ.
Trust Model
• Building a BYOD trust model:
  – Identify and assess risk for common security
    posture issues on personal devices
  – Define remediation options (notification, access
    control, quarantine, selective wipe)
     • differ in severity from BYOD to corporate devices
  – Set tiered policies
  – Establish the identity of user and device
  – Take a critical eye to the sustainability of the
    security policy being instituted
Liability
• Assess risk of employee actions & liability
• Considerations:
    – Defining the elements of baseline protection for enterprise data on BYOD
      devices
    – Assessing liability for personal web and app usage
    – Assessing liability for usage onsite vs. offsite, and within work hours vs.
      outside work hours
    – Evaluating whether the nature of BYOD reimbursement (partial stipend vs. full
      payment of service costs) affects liability
    – Quantifying the monitoring, enforcement and audit costs of the BYOD
      compliance policy
    – Assessing the risk and resulting liability of accessing and damaging personal
      data (for example, doing a full instead of selective wipe by mistake)

• Each organization should seek their own legal advice on how to frame and
  assess liability variances between BYOD and traditional mobile programs.
User Experience and Privacy
• Employee satisfaction primary goal for IT
• Security & user experience - conflicting interests
• The core tenet of successful BYOD deployments
  is preservation of user experience
• Avoid
   –   non-native enterprise email apps,
   –   poor battery life,
   –   complex authentication,
   –   lockdown of useful features
   –   lack of privacy.
User Experience and Privacy
• Social Contract
   – Agreement between employer and employee
   – Identifying the activities and data IT will monitor
        • security vs. privacy tradeoffs to make
   – Clarifying the actions IT
        • Transparency will create trust.
   –   Defining the BYOD privacy policy
   –   Critically assessing security policies and restrictions for sustainability
   –   Deploying core services (email, mission critical apps) to the employee
   –   Preserving the native experience
   –   Communicating compliance issues clearly to the employee
        • BYOD users will expect proactive notifications to give them a chance to self-
          remediate.

   – user experience is the real test for policy sustainability
App Design and Governance
• Don’t assume BYOD is a device ownership decision
• Trust level of BYOD device different from traditional
  device
   – impact on app design and distribution
• Employees expect internal apps on all approved BYOD
  devices and not a subset
• Deeper investment in app development and testing,
  what apps are supported on what devices and why.
• Confusion for the user will drive calls to the helpdesk.
App Design and Governance
• Considerations
  – Designing mobile apps to match the trust level of
    personal devices
  – Defining app catalog availability based on device
    ownership
  – Committing to the resource investment
  – Updating acceptable use policies
  – Defining enforcement levels for app violations
Economics
• Short-Term, eliminate cost of device purhase and move from full service
  payment to predicable stipend.
• Long term – may well be different,
• BYOD strategies are young so difficult to definitely assess economic impact
  – key dimensions to consider
    –   Device Savings
    –   Overage charges BYOD drives personal responsibility
    –   Service Plans
    –   Helpdesk
    –   Compliance and audit

• ROI of BYOD programs -combination of the above weighed against the
  value of employee satisfaction and productivity.
• The hidden economics of BYOD center on the cost of complexity and the
  value of more responsible employee usage.
Internal Marketing
• Marketing opportunity for IT’s value
  – Communicating why the company is moving to BYOD
  – Understanding BYOD - HR initiative as much as an IT
    initiative
  – Defining IT’s “brand”:
  – Supporting the brand message with appropriate
    action
• BYOD unique opportunity to impact perceptions
  and culture across the company
Conclusion

• BYOD seems simple
• Its not…
Strategic Advisory Sevices
gary.mcconnell@clever-consulting.com
           +349 5055451

Weitere ähnliche Inhalte

Was ist angesagt?

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
 

Was ist angesagt? (20)

IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
BYOD
BYODBYOD
BYOD
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 

Ähnlich wie Come costruire una strategia vincente di BYOD, Bring Your Own Device | CleverMobile Webinar

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
mkeane
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
Sal Abramo
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
Enterprise Mobile
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
Axway Appcelerator
 

Ähnlich wie Come costruire una strategia vincente di BYOD, Bring Your Own Device | CleverMobile Webinar (20)

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD
BYODBYOD
BYOD
 
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Enterprise mobile strategy framework - 1st part
Enterprise mobile strategy framework  - 1st partEnterprise mobile strategy framework  - 1st part
Enterprise mobile strategy framework - 1st part
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
 
Mobile Strategy Guide
Mobile Strategy GuideMobile Strategy Guide
Mobile Strategy Guide
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
 
Enterprise Mobile Strategy Framework - I
Enterprise Mobile Strategy Framework - IEnterprise Mobile Strategy Framework - I
Enterprise Mobile Strategy Framework - I
 

Mehr von Clever Consulting

Black berry è ora di migrare
Black berry è ora di migrareBlack berry è ora di migrare
Black berry è ora di migrare
Clever Consulting
 
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Clever Consulting
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
Clever Consulting
 

Mehr von Clever Consulting (20)

TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014
 
Black berry è ora di migrare
Black berry è ora di migrareBlack berry è ora di migrare
Black berry è ora di migrare
 
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
 
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
 
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012
 
Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012
 
Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012
 
Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012
 
Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012
 
Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012
 
Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012
 
Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012
 
Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011
 
Clever Consulting Newsletter > Novembre 2011
Clever Consulting Newsletter >  Novembre 2011Clever Consulting Newsletter >  Novembre 2011
Clever Consulting Newsletter > Novembre 2011
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
 
Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011
 

Kürzlich hochgeladen

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Kürzlich hochgeladen (20)

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 

Come costruire una strategia vincente di BYOD, Bring Your Own Device | CleverMobile Webinar

  • 1. Come construire una strategia vincente di BYOD Gary McConnell Clever Consulting Srl.
  • 2. BYOD – What is it? • Bring Your Own Device – personally-owned mobile devices for business applications – Goals • drive employee satisfaction and productivity through the use of new technologies, while reducing their mobile expenses – consumerization of IT • consumer preference, not corporate initiative, – technologies not built with enterprise requirements • IT teams uncomfortable about security and supportability.
  • 3. Approaches • Top of the pyramid – Upper management & VIP users • Broadscale – Extend to workforce • Companies providing choice – Company paid Blackberry – Personal funded iOS or Android • Monica Basso, Research VP at Gartner, Inc., predicted that by 2014 “90% of organizations will support corporate applications on personal devices.” • IT teams need to prepare for a mixed-ownership mobile device environment.
  • 4. Implications • But BYOD is more than just shifting ownership of the device to the employee. • complex and hidden implications • a strategy needs to be defined in advance of implementation
  • 5. BYOD strategy components • Sustainability • Device choice • Trust model • Liability • User experience and privacy • App design and governance • Economics • Internal marketing
  • 6. Sustainablity • Common Problem - BYOD policies not sustainable over the long term. • BYOD policies must meet the needs of both IT and employees: – Secure corporate data – Minimize cost to implement and enforce – Preserve user experience – Stay up-to-date with user preference and technology innovation
  • 7. Device Choice • Building a policy : – Analyzing employee preference – Acceptance baseline - security and supportability • Basics - asset management, encryption, password policy, remote lock/wipe, and email/Wi-Fi/VPN configuration – Understanding the operating system, hardware, and regional variances around that baseline – Developing a certification plan – Clear communication to users – Ensuring the IT team has the bandwidth to stay up-to- date
  • 8.
  • 9. Trust Model • Trust is the foundation for enterprise security • The trust level of a mobile device is dynamic – Example – CFO with financial data • BYOD - another layer • Privacy policies will vary • User expectations will differ.
  • 10. Trust Model • Building a BYOD trust model: – Identify and assess risk for common security posture issues on personal devices – Define remediation options (notification, access control, quarantine, selective wipe) • differ in severity from BYOD to corporate devices – Set tiered policies – Establish the identity of user and device – Take a critical eye to the sustainability of the security policy being instituted
  • 11. Liability • Assess risk of employee actions & liability • Considerations: – Defining the elements of baseline protection for enterprise data on BYOD devices – Assessing liability for personal web and app usage – Assessing liability for usage onsite vs. offsite, and within work hours vs. outside work hours – Evaluating whether the nature of BYOD reimbursement (partial stipend vs. full payment of service costs) affects liability – Quantifying the monitoring, enforcement and audit costs of the BYOD compliance policy – Assessing the risk and resulting liability of accessing and damaging personal data (for example, doing a full instead of selective wipe by mistake) • Each organization should seek their own legal advice on how to frame and assess liability variances between BYOD and traditional mobile programs.
  • 12. User Experience and Privacy • Employee satisfaction primary goal for IT • Security & user experience - conflicting interests • The core tenet of successful BYOD deployments is preservation of user experience • Avoid – non-native enterprise email apps, – poor battery life, – complex authentication, – lockdown of useful features – lack of privacy.
  • 13. User Experience and Privacy • Social Contract – Agreement between employer and employee – Identifying the activities and data IT will monitor • security vs. privacy tradeoffs to make – Clarifying the actions IT • Transparency will create trust. – Defining the BYOD privacy policy – Critically assessing security policies and restrictions for sustainability – Deploying core services (email, mission critical apps) to the employee – Preserving the native experience – Communicating compliance issues clearly to the employee • BYOD users will expect proactive notifications to give them a chance to self- remediate. – user experience is the real test for policy sustainability
  • 14. App Design and Governance • Don’t assume BYOD is a device ownership decision • Trust level of BYOD device different from traditional device – impact on app design and distribution • Employees expect internal apps on all approved BYOD devices and not a subset • Deeper investment in app development and testing, what apps are supported on what devices and why. • Confusion for the user will drive calls to the helpdesk.
  • 15. App Design and Governance • Considerations – Designing mobile apps to match the trust level of personal devices – Defining app catalog availability based on device ownership – Committing to the resource investment – Updating acceptable use policies – Defining enforcement levels for app violations
  • 16. Economics • Short-Term, eliminate cost of device purhase and move from full service payment to predicable stipend. • Long term – may well be different, • BYOD strategies are young so difficult to definitely assess economic impact – key dimensions to consider – Device Savings – Overage charges BYOD drives personal responsibility – Service Plans – Helpdesk – Compliance and audit • ROI of BYOD programs -combination of the above weighed against the value of employee satisfaction and productivity. • The hidden economics of BYOD center on the cost of complexity and the value of more responsible employee usage.
  • 17. Internal Marketing • Marketing opportunity for IT’s value – Communicating why the company is moving to BYOD – Understanding BYOD - HR initiative as much as an IT initiative – Defining IT’s “brand”: – Supporting the brand message with appropriate action • BYOD unique opportunity to impact perceptions and culture across the company
  • 18. Conclusion • BYOD seems simple • Its not…

Hinweis der Redaktion

  1. We see organizations focusing most of their time and resources on the first two requirements. But the latter two are much more important for sustainability in the long term. If the BYOD implementation damages user experience or quickly becomes dated, employees will either find a way to circumvent policy or end their participation in the program. In both instances, the needs of the company are not met – either security is compromised or business value is lost. User experience is the litmus test for policy sustainability. If it breaks, so does the program.
  2. The catalyst for BYOD is that employees have personal preferences for devices other than those the enterprise has traditionally provided them. The most common example is an employee who has a BlackBerry for work, but an iPhone at home, and would prefer to carry one device instead of two. However, in a world where consumer preferences shift annually and the mobile landscape itself evolves constantly, defining how much choice you wish to allow employees is difficult. Building a policy around device choice requires:Analyzing employee preference and understanding what devices they have already bought: A BYOD program that doesn’t support their current and intended purchases will have limited appeal.Defining an acceptance baseline of what security and supportability features a BYOD device should support: The goal is to include all of the employees’ desired mobile platforms in the program, without creating security gaps or support headaches. The acceptance baseline generally includes asset management, encryption, password policy, remote lock/wipe, and email/Wi-Fi/VPN configuration. Without these basics, the mobile platform is not viable for the enterprise. The advanced list generally focuses on app-related functionality and advanced security, like certificate-based authentication. The device platforms that match the advanced list get access to a higher level of enterprise functionality in the BYOD program.Understanding the operating system, hardware, and regional variances around that baseline: On Android especially, similar devices may actually support very different capabilities based on the manufacturer and the geographic region. The brand name of a device can also vary by wireless operator, adding confusion.Developing a certification plan to ensure that future devices can be evaluated efficiently for inclusion: Most organizations invest in upfront certification when launching their BYOD program. However, new devices are introduced into the market every 3-6 months so the certification process must be ongoing.Establishing clear communication to users about which devices are allowed or not, and why: Going BYOD without this clarity results in users purchasing unsupported devices or becoming frustrated that the service levels they expected from IT are not available to them.Ensuring the IT team has the bandwidth to stay up-to-date: The allowed device list is strongly influenced by user demand and so may change multiple times a year. Someone in IT must become the expert on device and operating system evolution; otherwise, the BYOD program quickly falls out of date. This is especially important when the program moves beyond iOS and BlackBerry to operating systems with more variants
  3. Trust is the foundation for enterprise security: Which users do I trust with which data under what circumstances? Every major organization has gone through data classification to establish this underpinning for its security policies. However, even without BYOD, trust models for mobile add a new level of complexity because the device itself can easily fall in and out of compliance. The trust level of a mobile device is dynamic, and depends on its security posture at a given point in time. For example, a company’s CFO is trusted with financial data on her tablet, but not if she inadvertently downloads an over-privileged consumer app or disables encryption. Because mobile devices are not locked down as tightly as traditional laptops and desktops, they fall out of compliance more frequently.BYOD adds another layer to the trust model, because the trust level for employee-owned devices may be different than for corporate-owned devices. Privacy policies will vary, and user expectations will differ. For example, users may accept not being able to use social networking apps on corporate devices, but that type of policy is a non-starter for personal devices.
  4. Building a BYOD trust model requires:Identifying and assessing risk for common security posture issues on personal devices: Employees use personal devices differently than corporate devices. For example, they download more apps. So with BYOD, devices may fall out of compliance with corporate policy more frequently, or for different reasons. Defining remediation options (notification, access control, quarantine, selective wipe): These options may differ in severity from BYOD to corporate devices. For example, on a corporate device with a moderate risk compliance issue, the remediation might be an immediate full wipe. But on a personal device, it may be a less severe action initially, like blocking enterprise access, followed by a selective wipe of enterprise data.Setting tiered policy: “Ownership” is now a key dimension along which to set policy. As a result, personal and corporate devices will each have different sets of policies for security, privacy, and app distribution.Establishing the identity of user and device: As device choice becomes fluid, confirming identity of user and device, usually through certificates, becomes more important.Taking a critical eye to the sustainability of the security policy being instituted: What is the impact on user experience? Will users accept that tradeoff over the long term? If the trust level of the personal device is so low that security requires extensive usage restrictions, the employee’s personal mobile experience will be damaged, and neither the policy nor the BYOD program will be sustainable.
  5. All enterprises have long-standing approaches to assessing the risk of employee actions and the corresponding liability. These actions range from unsecured use of company data to accessing inappropriate applications or websites. BYOD introduces a new wrinkle: The device on which these actions may take place is not the property of the company. So the question is “Does moving device ownership from company to employee increase or decrease corporate liability?”Some considerations around BYOD liability include:Defining the elements of baseline protection for enterprise data on BYOD devices: All companies must protect corporate data on the mobile device. But different protections may be required on different devices. For example, more protection against over-privileged consumer apps might be required on Android vs. iOS.Assessing liability for personal web and app usage: The employee’s expectation is that they can use their personal device however they wish. Is inappropriate use still a liability for the company, even if it doesn’t affect enterprise data?Assessing liability for usage onsite vs. offsite, and within work hours vs. outside work hours: Should usage be monitored when at work, but not when away from work? The boundaries of work time and personal time blur for many knowledge workers, so this is a difficult analysis with hard-to-enforce outcomes. Evaluating whether the nature of BYOD reimbursement (partial stipend vs. full payment of service costs) affects liability: Many organizations have assumed that the level of payment doesn’t impact the level of liability, but this is an area with regional variances.Quantifying the monitoring, enforcement and audit costs of the BYOD compliance policy: If liability is lower, the corresponding compliance costs will also be lower, and potentially a significant contributor to cost savings.Assessing the risk and resulting liability of accessing and damaging personal data (for example, doing a full instead of selective wipe by mistake): Most organizations will cover themselves legally in their user agreement, but at minimum, this creates employee frustration. We have seen many large organizations decide that their liability on personal devices is limited to protecting corporate data, and that they are not liable for personal web, app, or other activity on those devices. In other words, their corporate liability decreases if they move to BYOD. However, we have also seen other organizations decide that their corporate liability remains unchanged. Each organization should seek their own legal advice on how to frame and assess liability variances between BYOD and traditional mobile programs.
  6. User Experience and PrivacyBYOD itself reflects a realization that employee satisfaction is a primary goal for IT. But many times, security and user experience have been viewed as conflicting interests; therefore, the usability of traditional enterprise applications has substantially lagged behind that of consumer applications, which are designed with user experience as the top priority. The core tenet of successful BYOD deployments is preservation of user experience. These programs will not be sustainable if user experience is compromised when employees start using their personal devices for corporate email and apps. User experience can be compromised along many dimensions: non-native enterprise email apps, poor battery life, complex authentication, lockdown of useful features, or lack of privacy.
  7. A social contract must be established between the company and the employee, clearly defining the BYOD relationship. This social contract is the agreement between employer and employee around the roles of each:Identifying the activities and data IT will monitor: On personal devices, IT will generally monitor less user data and activity, such as location. There will be an ongoing set of security vs. privacy tradeoffs to make. For example, IT might still need to monitor app inventory on the personal device in order to protect against rogue apps that might otherwise compromise enterprise data.Clarifying the actions IT will take and under what circumstances: The employee must understand the link between action and remediation, for example, the circumstances under which IT will wipe a device and the content that will be wiped. Transparency will create trust. Defining the BYOD privacy policy: Granular controls across IT actions like activity monitoring, location tracking, and application visibility should be consolidated into a privacy policy and then applied to each mobile device. These policies will differ not just by device ownership, but also by organizational function, seniority, and region. Exceptions to the privacy policy should be minimized, but employees will still need to understand the circumstances of those exceptions, such as legal mandate. Critically assessing security policies and restrictions for sustainability: If the user experience is compromised by the security policy, the BYOD program will be at risk. Common restrictions that impact experience are lockdown policies for apps, browsers, or media features like camera.Deploying core services (email, mission critical apps) to the employee: The more compelling these services, the more willing the user is to accept some level of corporate control over the personal device.Preserving the native experience: Employees want to use their preferred native apps for core functions like email, calendar, contacts, and communications. Forcing these activities to different apps in the name of security will fracture the user experience and may not be sustainable.Communicating compliance issues clearly to the employee: How will the employee know when his device or actions are out of compliance? What are the consequences? A closed-loop, automated notification process ensures that the employee, who will likely never fully read the user agreement, knows immediately when there is a compliance issue and what actions the company is about to take. BYOD users will expect proactive notifications to give them a chance to self-remediate.As mentioned earlier, user experience is the litmus test for policy sustainability. In many organizations, BYOD programs are implemented with the intent of increasing employee satisfaction, but end up compromising user experience. Without a clear social contract that extends beyond a written agreement to daily activities and actions, an effective BYOD relationship cannot be established between employer and employee.
  8. The trust model and device choice considerations described in prior sections of this paper both have a fundamental impact on the apps strategy for BYOD. At first, organizations assume BYOD is simply a device ownership decision with minimal impact on apps. But apps involve enterprise data, and if the trust level of a BYOD device is different than that of a traditional device, it will affect app design and distribution. Also, employees will expect internal apps to be supported on all the approved BYOD devices, not only a subset. That implies either a deeper investment in app development and testing by the company, or clear communication back to employees on what apps are supported on what devices, and why. Confusion for the user will drive calls to the helpdesk.
  9. Some considerations around app design and governance include:Designing mobile apps to match the trust level of personal devices: App development teams will have to decide whether they design apps differently for personal vs. corporate devices. These differences generally center on how the app handles local data and are driven by the trust level of the target devices. A shared strategy is more cost effective but takes forward planning.Defining app catalog availability based on device ownership: Certain internal applications may not be appropriate on personal devices for security reasons. For example, all devices might have access to the mobile case management app, but only the corporate devices to the mobile financial projections app.Committing to the resource investment: There can be incremental investment to support core enterprise apps on personal devices – for example, apps may now need to support more operating systems and device types. So the app dev team must either support the broad set, or clearly communicate to the employee base how and why support is limited.Updating acceptable use policies: Employees will demand freedom to use a broad range of personal apps on their BYOD device. In their minds, the fact that the device is also being used for corporate apps doesn’t justify restrictions on their personal apps. Therefore, any such restrictions that are necessary for corporate security purposes need to be clearly described to the employee, e.g., “App X is known to access and transmit personal contact lists to unknown third parties.”Defining enforcement levels for app violations (notification, access control, quarantine, or selective wipe): Once again, clear communication is as important as the actual policy and outcome.
  10. The short-term economic analysis of BYOD generally revolves around eliminating the cost of device purchases and moving from full service payment to a predictable stipend. But the long-term economics may very well come from unexpected sources. BYOD strategies have not been in place long enough at most organizations to definitively assess their economic impact, but here are some key dimensions to consider:Device hardware: Not needing to purchase hardware is appealing. However, many large enterprises have traditionally bought highly subsidized BlackBerry smartphones, so the actual savings can be less than expected.Overage charges: When employees have personal visibility into their usage, especially excess usage, their behavior tends to become more responsible. They use the device more sparingly when roaming, and they are less likely to lose it. BYOD drives personal responsibility.Service plans: Some organizations continue paying for full service, while others move to a fixed monthly stipend for the user, many times based on seniority level and function within the organization. However, negotiating leverage with the wireless operator can be lost if the billing model does not provide any consolidation.Helpdesk: Traditional wisdom has been that BYOD will increase helpdesk costs because of the fragmentation of adding device choice. Implementing new helpdesk policies around full support and “best effort” do create additional complexity. However, we have seen a countervailing force as well, which is that employees who own their devices are willing to invest time in troubleshooting instead of calling the helpdesk. They are increasingly knowledgeable about technology and, more importantly, don’t want IT to touch their personal device. With the right self-service tools, thehelpdesk may become a last resort instead of a first resort for BYOD users.Compliance and audit: The Liability section of this paper asks the question “Does moving device ownership from company to employee increase or decrease the company’s liability?” The answer to this will impact actual compliance costs dramatically. If the organization views itself as no longer liable for actions other than enterprise data protection, there may be substantial savings.The ROI of BYOD programs is a combination of the above weighed against the value of employee satisfaction and productivity. The hidden economics of BYOD center on the cost of complexity and the value of more responsible employee usage.
  11. BYOD and enterprise mobility itself offer an opportunity to improve the company’s internal perception of IT’s role and value. This is a great opportunity for internal marketing that many organizations don’t realize until well after the BYOD program is instituted. The components include:Communicating why the company is moving to BYOD. Is the desired perception “… to shift the cost burden to the employee” or “… to let employees use their favorite devices at work”?Understanding BYOD is an HR initiative as much as an IT initiative: What is the desired impact on company culture, communication, and recruiting?Defining IT’s “brand”: Is IT a user advocate, an innovator, a source of best practices for mobile? IT can prove itself an end-user champion and ahead of the curve on technology through a BYOD program.Supporting the brand message with appropriate action: BYOD puts the burden on IT to provide a positive end-to-end experience to users, who need to easily understand the program, choose and provision the device, troubleshoot problems, and potentially migrate to new devices each year.BYOD gives IT a unique opportunity to impact perceptions and culture across the company. Thinking through the internal marketing strategy up front will influence communications and decisions in a way that can improve IT’s standing with its internal customers.
  12. BYOD seems simple, but it’s not. Shifting the ownership of mobile devices has many complex implications for how a company does business. In this paper, we’ve discussed several considerations for building a program to address these issues. The initial success of the BYOD program will depend on early preparation, while its long-term sustainability will depend on the ongoing quality of the employee’s end-to-end experience. The goal of this paper is to provide an initial framework for a successful program. BYOD holds tremendous promise across multiple dimensions. While many organizations look at BYOD as a possible way to reduce costs, the real value of a well-designed BYOD program is increasing employee satisfaction and speeding up the rate of technology adoption in the enterprise.