SlideShare ist ein Scribd-Unternehmen logo
1 von 36
BYOD 1
Goutama Bachtiar
BYOD: Bring Your Own Device or Danger?
April 16, 2013
T: @goudotmobi
W: www.linkedin.com/in/goutama
INTRODUCTION
Introduction
BYOD 3
• A seasoned Advisor, Consultant, Corporate Trainer, Content Producer,
Writer and Courseware Developer.
• 14 years of professional working experiences that includes 12 years of IT
Training and Education Management, 9 years’ Technology Consulting and
Project Management and 8 years in IT Audit field.
• Today he is wearing numerous hats: Advisor at Corporate Angel Investor
‘Global Innovations and Technology Platform’, ISACA Subject Matter Expert,
Head of Information Technology at Roligio Group, PMI Program Evaluator,
Guest Lecturer at University of Texas at Brownsville, Prasetiya Mulya, Bina
Nusantara, Swiss German University as well as Contributor and Columnist
in leading media: Asia Technology Site e27.co and TechWireAsia, Forbes
Indonesia, DetikINET and InfoKomputer among others.
Presenter Profile
18 March 2022 1
BYOD 4
• Various strategic positions he has helmed are Vice Chairman and Acting
Chairman, Executive Board Member, Co-Founder, Country Channel
Manager, Project Lead and Group Leader.
• As of now, he has delivered, hosted and involved hundreds of training,
lectures, conferences, workshops, competitions, seminar, expos across
Indonesia and outside the country
• Today he also has written triple digit articles concerning ICT, management,
business and finance in a variety of local and foreign, in leading media and
companies.
• Wearing his authorship hat, he has written two books and 17 courseware,
majority in English. IT Audit, project management, computerized accounting,
statistics app, Document Management Systems, e-learning, to name a few.
Presenter Profile (cont’d)
18 March 2022
“BYOD is one of those things that keeps IT managers awake at
night”
The Age May 3 2012 (credit to Bruce Dixon)
BYOD 6
The Story Behind
• Bottom-up initiative whereby employees bring
their mobile devices to the office and use it for
work-related activities.
• Mobile devices: notebook, netbook, Tablet, cell
phone (feature, smart phone), GPS.
• Un-programmed, unplanned at the early stage
• Company CANNOT require employee to have or
bring devices to office
18 March 2022 Your Logo
BYOD 7
At those early days
• Initiated by US companies mostly in Information
Technology industry
• Agreed by the company then accommodated in
its policies and procedures.
• Un-programmed, unplanned at the early stage
• Now not only device, but app and services as
well
18 March 2022 Your Logo
BYOD 8
At those early days (cont’d)
• Like or dislike, employees are already using their own
devices at work frequently (92% smart phones for work
every week, 62% at least every day and 30% at least
once per week)
18 March 2022 Your Logo
BYOD 9
Your own footer Your Logo
Milestones
• Initiated by US companies mostly in
Information Technology industry
• Agreed by the company then
accommodated in its policies and
procedures.
• Unprogrammed, unplanned at the early
stage
18 March 2022 Your Logo
BYOD 10
Your own footer Your Logo
Key Drivers
• Human needs and wants
• Consumerisation of IT (lower price of gadget
and data plan)
• Economic crisis (in US, Europe)
• Cost saving initiatives in IT spaces
• Working environment as competitive
advantage
18 March 2022 Your Logo
BYOD 11
Latest Survey Revealed
• Expands to more than 88% of enterprises in US
and Europe by the end of 2013 (citing Good
latest report)
• 55% of BYOD programs are global
• Employees cover all costs in 50% of BYOD
environments
• Only 5% of companies won’t support BYOD this
year
18 March 2022 Your Logo
BYOD 12
Latest Survey Revealed (cont’d)
• 33% companies strictly mandate devices used
for work purposes and don’t allow any type of
employee-provided device
• In 8% firms, employees to provide everything
(sourcing CompTIA’s 2nd Annual Trends)
18 March 2022 Your Logo
BYOD 13
Latest Survey Revealed (cont’d)
• 50% employees report that their colleague has lost
a device with important data (citing Varonis)
• 22% said the lost device had security implications
for the organization
• 86% employees are “device obsessed”, using their
personal devices to work day and night
• 44% of respondents say they use their personal
device to work during meals!
18 March 2022 Your Logo
BYOD 14
Latest Survey Revealed (cont’d)
• 81% Filipino respondents owning two/more devices,
and 85% bringing it to work (citing VMWare)
• 80% believer to work more efficient
• 74% believes they will less-stressed at work
• Lack of corporate support (only 32% receive it)
• 60% will do self-repair
• 52% will do extra miles (search engines etc) to
integrate the technology into the workplace
18 March 2022
BYOD 15
In the U.S. and European countries
• Total BYOD and Enterprise Mobility market to
reach $181 Billion by 2017 (citing MarketsandMarkets)
• A compound annual growth rate of 15.17%
• 60% smart phones, 47% tablets and laptops
• 59 percent CIOs plan to increase mobile
spending in the coming year
• A BOOM is on the horizon (?)
18 March 2022
BYOD 16
What’s in in for the company?
• Lower Total Cost of Ownership (TCO) in IT
infrastructure acquisition
• More conducive working environment
• Increase employee productivity. Really?
Ask the audience!
18 March 2022
BYOD 17
What’s in it for the employee?
• Utilizing their own gadgets, more
sophisticated most probably. Flexibility.
• More convenient while working
• Any other freedom
• Higher level of productivity (70% as Forrester
Consulting says)
18 March 2022
BYOD 18
Things to think about
• Management intention particularly CIO or IT
Executive(s)
• IT Policy including but not limited to devices, IT
Security and Information Security
• IT Procedures
• ‘Buy-in’ within the device
• Device data plan, support, and maintenance
• Information privacy, confidentiality and audit
18 March 2022
BYOD 19
Things to think about (cont’d)
• Network support and infrastructure
• Hardware installation and testing
18 March 2022 Your Logo
BYOD 20
Employee’s Consequences
• Bring devices at your own risk –employee
is responsible for keeping it safe and
secure
• “Do not leave your device in the office,
even if the company allows it”
• “You are responsible for the appropriate
use of your personal computing device”
18 March 2022
BYOD 21
Employee’s Consequences (cont’d)
• In the U.S
– 110 working Americans with 50 million smart phones
– While only 3% said they received a stipend
– 6% said their employers paid for their smart phones
outright (citing Cisco Systems)
– 11% reported receiving some kind of small
reimbursement
18 March 2022 Your Logo
BYOD 22
Employer’s Trade-off
• Companies provide device to employees to
standardize and consolidate IT support (39%)
• It is more cost effective to provide devices rather
than a stipend (31%)
• More than half of enterprises allowing BYOD
experienced a data breach (citing Decisive Analytics)
• Only 12% of employer shut down upon the breach
18 March 2022
BYOD 23
• 9 of 10 working Americans use personal smart
phones for work purposes
• 40% do not use passwords to protect them
(source: Cisco partner)
• 51% connect to unsecured wireless networks
• 48% do not disable Bluetooth discoverable
mode
Security, Security, Security!
18 March 2022
BYOD 24
As an employee, I am responsible for…
For keeping my personal devices secure
when I bring them to office
1
2
3
4
5
For keeping my digital accounts secure
For what I do on when using technology at office
For what I say and do online
For making good choices about when and
where I use personal devices
18 March 2022
BYOD 25
As an employer, I am responsible for…
1. Accommodate mobile application management
(MAM) into mobile device management (MDM)
2. Provide integration as it is critical for consistent
user experience. 66% employees use two/more
devices at work (according to Forrester)
3. Pursue a range of solutions: virtual desktops
(49%), custom mobile apps for business
systems (29%) and moving business apps to
cloud accessible through browser (28%)
18 March 2022
BYOD 26
• How will software licensing be managed?
– Employee vs Office licensing
– How are costs impacted by various
ownerships models?
– What about the upgrades?
The questions are…
18 March 2022
BYOD 27
• Responsibility for maintenance of
employee devices
– Principal, Vendor or Employee?
– Lifecycles
– How much resources will company allocate?
– Think over on data loss and recovery
The questions are…(cont’d)
18 March 2022
BYOD 28
• Responsibility for maintenance of
employee devices
– Principal, Vendor or Employee?
– Lifecycles
– How much resources will company allocate?
– Think over on data loss and recovery
The questions are…(cont’d)
18 March 2022
BYOD 29
• To what extent will extended warranty and
insurance (if any) be mandated or optional?
• How will Service Level Agreement (SLA)’s &
KPI (Key Performance Indicator)’s be
managed?
• Ownership and responsibility for loaners and
losses?
The questions are…(cont’d)
18 March 2022
BYOD 30
• How the policy of what is on employee’s
devices be determined?
– Anti virus, office automation, any other apps
– Bluetooth, Wi-Fi, Flash Disk
– Particular sites, upload, download
– Games, social media
– Office space, personal space
The questions are…(cont’d)
18 March 2022
BYOD 31
• Ownership on managing compatibilities,
storage, viruses and security?
– Employer or Employee?
• Responsibility for employee devices?
– Tracking expenses and costs?
The questions are…(cont’d)
18 March 2022
BYOD 32
• How do company identify criteria to define
employee personal devices requirements?
– Who defines the functions specifications?
– What justifies anything less than a personal
devices?
– What role does price play?
The questions are…(cont’d)
18 March 2022
BYOD 33
• How far do your HelpDesk services stretch?
– How to manage costs?
– How to resolve issues and disputes between
employee-owned and installed software and
employer-owned and installed software?
– How to manage problem priorities?
The questions are…(cont’d)
18 March 2022
BYOD 34
Do employer have the
expertise, resources and
budget to effectively manage
a variety of technologies
across a variety of
platforms?
The questions are…(cont’d)
18 March 2022
BYOD 35
• More and more principals and vendors
provides the services and solutions
• Data access rights restriction or security
software installation to secure company
network
The future is now
18 March 2022
Thank You!
Your Logo

Weitere ähnliche Inhalte

Was ist angesagt?

Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's PlaygroundJohn ILIADIS
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Assespro Nacional
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili SaghafiConference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili SaghafiProfessor Lili Saghafi
 
Fujitsu CIO technology trends survey 2012
Fujitsu CIO technology trends survey  2012Fujitsu CIO technology trends survey  2012
Fujitsu CIO technology trends survey 2012Fujitsu Global
 
LEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperLEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperKristineMejia2
 
Business Intelligence Research Project
Business Intelligence  Research Project Business Intelligence  Research Project
Business Intelligence Research Project MartinaErowoOjonah
 
Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8Quadrant Communications
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Considering a BYOD Infrastructure
Considering a BYOD InfrastructureConsidering a BYOD Infrastructure
Considering a BYOD InfrastructureMelissa Andrews
 
ARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationDavid Bellocchi
 
Get doing GDPR right now! IRMS May 2018
Get doing GDPR right now!  IRMS May 2018Get doing GDPR right now!  IRMS May 2018
Get doing GDPR right now! IRMS May 2018Metataxis
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 

Was ist angesagt? (18)

Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's Playground
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili SaghafiConference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Fujitsu CIO technology trends survey 2012
Fujitsu CIO technology trends survey  2012Fujitsu CIO technology trends survey  2012
Fujitsu CIO technology trends survey 2012
 
LEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperLEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem Whitepaper
 
Business Intelligence Research Project
Business Intelligence  Research Project Business Intelligence  Research Project
Business Intelligence Research Project
 
Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8Getronics enjoys higher productivity and increased mobility with Windows 8
Getronics enjoys higher productivity and increased mobility with Windows 8
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Considering a BYOD Infrastructure
Considering a BYOD InfrastructureConsidering a BYOD Infrastructure
Considering a BYOD Infrastructure
 
ARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classification
 
Get doing GDPR right now! IRMS May 2018
Get doing GDPR right now!  IRMS May 2018Get doing GDPR right now!  IRMS May 2018
Get doing GDPR right now! IRMS May 2018
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 

Andere mochten auch

Social Media Communication Techniques
Social Media Communication TechniquesSocial Media Communication Techniques
Social Media Communication TechniquesGoutama Bachtiar
 
Leveraging HRIS to Bring Organization into The Next Level
Leveraging HRIS to Bring Organization into The Next LevelLeveraging HRIS to Bring Organization into The Next Level
Leveraging HRIS to Bring Organization into The Next LevelGoutama Bachtiar
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudGoutama Bachtiar
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet BankingGoutama Bachtiar
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryGoutama Bachtiar
 

Andere mochten auch (10)

Social Media Communication Techniques
Social Media Communication TechniquesSocial Media Communication Techniques
Social Media Communication Techniques
 
Internet Marketing
Internet MarketingInternet Marketing
Internet Marketing
 
Leveraging HRIS to Bring Organization into The Next Level
Leveraging HRIS to Bring Organization into The Next LevelLeveraging HRIS to Bring Organization into The Next Level
Leveraging HRIS to Bring Organization into The Next Level
 
Manajemen Risiko level-1
Manajemen Risiko level-1Manajemen Risiko level-1
Manajemen Risiko level-1
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet Banking
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
Coaching for bank mutiara
Coaching for bank mutiaraCoaching for bank mutiara
Coaching for bank mutiara
 
General banking-tingkat-i-officer
General banking-tingkat-i-officerGeneral banking-tingkat-i-officer
General banking-tingkat-i-officer
 

Ähnlich wie BYOD: Bring Your Own Device or Danger?

BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODIan Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODGlobal Business Events
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesFrontRange
 
Next Generation of the Previously Unthinkable
Next Generation of the Previously UnthinkableNext Generation of the Previously Unthinkable
Next Generation of the Previously Unthinkableqmatheson
 
DataEd Slides: Approaching Data Management Technologies
DataEd Slides:  Approaching Data Management TechnologiesDataEd Slides:  Approaching Data Management Technologies
DataEd Slides: Approaching Data Management TechnologiesDATAVERSITY
 
Best Practices for Embedding Analytics by GoodData Product Leader
Best Practices for Embedding Analytics by GoodData Product LeaderBest Practices for Embedding Analytics by GoodData Product Leader
Best Practices for Embedding Analytics by GoodData Product LeaderProduct School
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...Tinuiti
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationCisco Services
 
Improving Data Literacy Around Data Architecture
Improving Data Literacy Around Data ArchitectureImproving Data Literacy Around Data Architecture
Improving Data Literacy Around Data ArchitectureDATAVERSITY
 
2022 Insight Intelligent Technology™ Report
2022 Insight Intelligent Technology™ Report 2022 Insight Intelligent Technology™ Report
2022 Insight Intelligent Technology™ Report Insight
 
Agile Chennai 2021 - Keynote | AI in Agility by Mukesh Jain
Agile Chennai 2021 - Keynote | AI in Agility by Mukesh JainAgile Chennai 2021 - Keynote | AI in Agility by Mukesh Jain
Agile Chennai 2021 - Keynote | AI in Agility by Mukesh JainAgileNetwork
 
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...The Digital Insurer
 

Ähnlich wie BYOD: Bring Your Own Device or Danger? (20)

ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODIan Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
 
AI Trends.pdf
AI Trends.pdfAI Trends.pdf
AI Trends.pdf
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
 
Next Generation of the Previously Unthinkable
Next Generation of the Previously UnthinkableNext Generation of the Previously Unthinkable
Next Generation of the Previously Unthinkable
 
DataEd Slides: Approaching Data Management Technologies
DataEd Slides:  Approaching Data Management TechnologiesDataEd Slides:  Approaching Data Management Technologies
DataEd Slides: Approaching Data Management Technologies
 
Best Practices for Embedding Analytics by GoodData Product Leader
Best Practices for Embedding Analytics by GoodData Product LeaderBest Practices for Embedding Analytics by GoodData Product Leader
Best Practices for Embedding Analytics by GoodData Product Leader
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...
(Another) Wild Year in Data Privacy: What Went Down in 2022 & What to Expect ...
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 
Improving Data Literacy Around Data Architecture
Improving Data Literacy Around Data ArchitectureImproving Data Literacy Around Data Architecture
Improving Data Literacy Around Data Architecture
 
2022 Insight Intelligent Technology™ Report
2022 Insight Intelligent Technology™ Report 2022 Insight Intelligent Technology™ Report
2022 Insight Intelligent Technology™ Report
 
Byod
ByodByod
Byod
 
Agile Chennai 2021 - Keynote | AI in Agility by Mukesh Jain
Agile Chennai 2021 - Keynote | AI in Agility by Mukesh JainAgile Chennai 2021 - Keynote | AI in Agility by Mukesh Jain
Agile Chennai 2021 - Keynote | AI in Agility by Mukesh Jain
 
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
 

Mehr von Goutama Bachtiar

Crypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainCrypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainGoutama Bachtiar
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Goutama Bachtiar
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryGoutama Bachtiar
 
Leveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumLeveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumGoutama Bachtiar
 
Library of Information Technology Icons
Library of Information Technology IconsLibrary of Information Technology Icons
Library of Information Technology IconsGoutama Bachtiar
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyGoutama Bachtiar
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationGoutama Bachtiar
 
The State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and ChallengesThe State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and ChallengesGoutama Bachtiar
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
Implementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioImplementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioGoutama Bachtiar
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsGoutama Bachtiar
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureGoutama Bachtiar
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyGoutama Bachtiar
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesGoutama Bachtiar
 
Crafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsCrafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsGoutama Bachtiar
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormGoutama Bachtiar
 

Mehr von Goutama Bachtiar (20)

Crypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainCrypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and Blockchain
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking Industry
 
Delving into Fintech
Delving into FintechDelving into Fintech
Delving into Fintech
 
Leveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumLeveraging Agile Project Management with Scrum
Leveraging Agile Project Management with Scrum
 
Library of Information Technology Icons
Library of Information Technology IconsLibrary of Information Technology Icons
Library of Information Technology Icons
 
PMBOK 6th vs 5th Edition
PMBOK 6th vs 5th EditionPMBOK 6th vs 5th Edition
PMBOK 6th vs 5th Edition
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New Economy
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
The State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and ChallengesThe State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and Challenges
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
Implementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioImplementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft Visio
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor Relationships
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT Architecture
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Crafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsCrafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to Investors
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
 

Kürzlich hochgeladen

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

BYOD: Bring Your Own Device or Danger?

  • 1. BYOD 1 Goutama Bachtiar BYOD: Bring Your Own Device or Danger? April 16, 2013 T: @goudotmobi W: www.linkedin.com/in/goutama
  • 3. BYOD 3 • A seasoned Advisor, Consultant, Corporate Trainer, Content Producer, Writer and Courseware Developer. • 14 years of professional working experiences that includes 12 years of IT Training and Education Management, 9 years’ Technology Consulting and Project Management and 8 years in IT Audit field. • Today he is wearing numerous hats: Advisor at Corporate Angel Investor ‘Global Innovations and Technology Platform’, ISACA Subject Matter Expert, Head of Information Technology at Roligio Group, PMI Program Evaluator, Guest Lecturer at University of Texas at Brownsville, Prasetiya Mulya, Bina Nusantara, Swiss German University as well as Contributor and Columnist in leading media: Asia Technology Site e27.co and TechWireAsia, Forbes Indonesia, DetikINET and InfoKomputer among others. Presenter Profile 18 March 2022 1
  • 4. BYOD 4 • Various strategic positions he has helmed are Vice Chairman and Acting Chairman, Executive Board Member, Co-Founder, Country Channel Manager, Project Lead and Group Leader. • As of now, he has delivered, hosted and involved hundreds of training, lectures, conferences, workshops, competitions, seminar, expos across Indonesia and outside the country • Today he also has written triple digit articles concerning ICT, management, business and finance in a variety of local and foreign, in leading media and companies. • Wearing his authorship hat, he has written two books and 17 courseware, majority in English. IT Audit, project management, computerized accounting, statistics app, Document Management Systems, e-learning, to name a few. Presenter Profile (cont’d) 18 March 2022
  • 5. “BYOD is one of those things that keeps IT managers awake at night” The Age May 3 2012 (credit to Bruce Dixon)
  • 6. BYOD 6 The Story Behind • Bottom-up initiative whereby employees bring their mobile devices to the office and use it for work-related activities. • Mobile devices: notebook, netbook, Tablet, cell phone (feature, smart phone), GPS. • Un-programmed, unplanned at the early stage • Company CANNOT require employee to have or bring devices to office 18 March 2022 Your Logo
  • 7. BYOD 7 At those early days • Initiated by US companies mostly in Information Technology industry • Agreed by the company then accommodated in its policies and procedures. • Un-programmed, unplanned at the early stage • Now not only device, but app and services as well 18 March 2022 Your Logo
  • 8. BYOD 8 At those early days (cont’d) • Like or dislike, employees are already using their own devices at work frequently (92% smart phones for work every week, 62% at least every day and 30% at least once per week) 18 March 2022 Your Logo
  • 9. BYOD 9 Your own footer Your Logo Milestones • Initiated by US companies mostly in Information Technology industry • Agreed by the company then accommodated in its policies and procedures. • Unprogrammed, unplanned at the early stage 18 March 2022 Your Logo
  • 10. BYOD 10 Your own footer Your Logo Key Drivers • Human needs and wants • Consumerisation of IT (lower price of gadget and data plan) • Economic crisis (in US, Europe) • Cost saving initiatives in IT spaces • Working environment as competitive advantage 18 March 2022 Your Logo
  • 11. BYOD 11 Latest Survey Revealed • Expands to more than 88% of enterprises in US and Europe by the end of 2013 (citing Good latest report) • 55% of BYOD programs are global • Employees cover all costs in 50% of BYOD environments • Only 5% of companies won’t support BYOD this year 18 March 2022 Your Logo
  • 12. BYOD 12 Latest Survey Revealed (cont’d) • 33% companies strictly mandate devices used for work purposes and don’t allow any type of employee-provided device • In 8% firms, employees to provide everything (sourcing CompTIA’s 2nd Annual Trends) 18 March 2022 Your Logo
  • 13. BYOD 13 Latest Survey Revealed (cont’d) • 50% employees report that their colleague has lost a device with important data (citing Varonis) • 22% said the lost device had security implications for the organization • 86% employees are “device obsessed”, using their personal devices to work day and night • 44% of respondents say they use their personal device to work during meals! 18 March 2022 Your Logo
  • 14. BYOD 14 Latest Survey Revealed (cont’d) • 81% Filipino respondents owning two/more devices, and 85% bringing it to work (citing VMWare) • 80% believer to work more efficient • 74% believes they will less-stressed at work • Lack of corporate support (only 32% receive it) • 60% will do self-repair • 52% will do extra miles (search engines etc) to integrate the technology into the workplace 18 March 2022
  • 15. BYOD 15 In the U.S. and European countries • Total BYOD and Enterprise Mobility market to reach $181 Billion by 2017 (citing MarketsandMarkets) • A compound annual growth rate of 15.17% • 60% smart phones, 47% tablets and laptops • 59 percent CIOs plan to increase mobile spending in the coming year • A BOOM is on the horizon (?) 18 March 2022
  • 16. BYOD 16 What’s in in for the company? • Lower Total Cost of Ownership (TCO) in IT infrastructure acquisition • More conducive working environment • Increase employee productivity. Really? Ask the audience! 18 March 2022
  • 17. BYOD 17 What’s in it for the employee? • Utilizing their own gadgets, more sophisticated most probably. Flexibility. • More convenient while working • Any other freedom • Higher level of productivity (70% as Forrester Consulting says) 18 March 2022
  • 18. BYOD 18 Things to think about • Management intention particularly CIO or IT Executive(s) • IT Policy including but not limited to devices, IT Security and Information Security • IT Procedures • ‘Buy-in’ within the device • Device data plan, support, and maintenance • Information privacy, confidentiality and audit 18 March 2022
  • 19. BYOD 19 Things to think about (cont’d) • Network support and infrastructure • Hardware installation and testing 18 March 2022 Your Logo
  • 20. BYOD 20 Employee’s Consequences • Bring devices at your own risk –employee is responsible for keeping it safe and secure • “Do not leave your device in the office, even if the company allows it” • “You are responsible for the appropriate use of your personal computing device” 18 March 2022
  • 21. BYOD 21 Employee’s Consequences (cont’d) • In the U.S – 110 working Americans with 50 million smart phones – While only 3% said they received a stipend – 6% said their employers paid for their smart phones outright (citing Cisco Systems) – 11% reported receiving some kind of small reimbursement 18 March 2022 Your Logo
  • 22. BYOD 22 Employer’s Trade-off • Companies provide device to employees to standardize and consolidate IT support (39%) • It is more cost effective to provide devices rather than a stipend (31%) • More than half of enterprises allowing BYOD experienced a data breach (citing Decisive Analytics) • Only 12% of employer shut down upon the breach 18 March 2022
  • 23. BYOD 23 • 9 of 10 working Americans use personal smart phones for work purposes • 40% do not use passwords to protect them (source: Cisco partner) • 51% connect to unsecured wireless networks • 48% do not disable Bluetooth discoverable mode Security, Security, Security! 18 March 2022
  • 24. BYOD 24 As an employee, I am responsible for… For keeping my personal devices secure when I bring them to office 1 2 3 4 5 For keeping my digital accounts secure For what I do on when using technology at office For what I say and do online For making good choices about when and where I use personal devices 18 March 2022
  • 25. BYOD 25 As an employer, I am responsible for… 1. Accommodate mobile application management (MAM) into mobile device management (MDM) 2. Provide integration as it is critical for consistent user experience. 66% employees use two/more devices at work (according to Forrester) 3. Pursue a range of solutions: virtual desktops (49%), custom mobile apps for business systems (29%) and moving business apps to cloud accessible through browser (28%) 18 March 2022
  • 26. BYOD 26 • How will software licensing be managed? – Employee vs Office licensing – How are costs impacted by various ownerships models? – What about the upgrades? The questions are… 18 March 2022
  • 27. BYOD 27 • Responsibility for maintenance of employee devices – Principal, Vendor or Employee? – Lifecycles – How much resources will company allocate? – Think over on data loss and recovery The questions are…(cont’d) 18 March 2022
  • 28. BYOD 28 • Responsibility for maintenance of employee devices – Principal, Vendor or Employee? – Lifecycles – How much resources will company allocate? – Think over on data loss and recovery The questions are…(cont’d) 18 March 2022
  • 29. BYOD 29 • To what extent will extended warranty and insurance (if any) be mandated or optional? • How will Service Level Agreement (SLA)’s & KPI (Key Performance Indicator)’s be managed? • Ownership and responsibility for loaners and losses? The questions are…(cont’d) 18 March 2022
  • 30. BYOD 30 • How the policy of what is on employee’s devices be determined? – Anti virus, office automation, any other apps – Bluetooth, Wi-Fi, Flash Disk – Particular sites, upload, download – Games, social media – Office space, personal space The questions are…(cont’d) 18 March 2022
  • 31. BYOD 31 • Ownership on managing compatibilities, storage, viruses and security? – Employer or Employee? • Responsibility for employee devices? – Tracking expenses and costs? The questions are…(cont’d) 18 March 2022
  • 32. BYOD 32 • How do company identify criteria to define employee personal devices requirements? – Who defines the functions specifications? – What justifies anything less than a personal devices? – What role does price play? The questions are…(cont’d) 18 March 2022
  • 33. BYOD 33 • How far do your HelpDesk services stretch? – How to manage costs? – How to resolve issues and disputes between employee-owned and installed software and employer-owned and installed software? – How to manage problem priorities? The questions are…(cont’d) 18 March 2022
  • 34. BYOD 34 Do employer have the expertise, resources and budget to effectively manage a variety of technologies across a variety of platforms? The questions are…(cont’d) 18 March 2022
  • 35. BYOD 35 • More and more principals and vendors provides the services and solutions • Data access rights restriction or security software installation to secure company network The future is now 18 March 2022

Hinweis der Redaktion

  1. Presented for Rotaract Semanggi
  2. Credit to Bruce Dixon
  3. To address the needs of enterprises, VMware recently unveiled the VMware Horizon Suite, a platform for workforce mobility, which consists of VMware Horizon Workspace, VMware Horizon View and VMware Horizon Mirage that connect end-users to their data, applications and desktops on any device without sacrificing IT security and control.