If you haven’t been following the debate on BYOD – Bring Your Own Device – you soon will! This presentation defines the opportunity for the Channel and gives a sneak peak to trends that will shape the industry for years to come.
4. Just the Facts
85% of workers bring work home
87% of workers travel
84% use a smartphone for work
BYOD is not coming
…it is here!
Only 22% of companies have a
formal mobility policy
Where are we now? Source:
5. Just the Facts
60%
While of IT leaders say they support
BYOD, most of them define it as email/calendar
First, we need to be careful
how we define BYOD
“Enterprise mobility is still in its infancy”
Where are we now? Source:
6. Questions to ask your customer
Are you offering more than email and calendaring?
Are you enabling corporate access via a mobile VPN?
If so, what does that experience look like?
Does it feel seamless or clunky?
Do you have a plan for accessing legacy application data on a
mobile device?
Do you really think desktop virtualization on an iPad is the
experience your users want?
Are you offering BYOD on any platform or just on “iDevices”
7. Just the Facts
Downloading unauthorized apps serious
48%
concern by of respondents
Source:
What is BYOA –
And Why Do I Care?
600,000+ APPS
500,000+ APPS
Where are we now?60,000+ APPS
70,000+ APPS
8. Healthcare is the fastest growing industry
85% of doctors own a smartphone, 56% use it in clinical practice
Pharmaceuticals, Manufacturing and Retail are also HOT
Where are the opportunities?
Field Mobility Organizations are laggards
Source:
9. OPPORTUNITY 1
Risk Assessment Consulting
Ask the tradeoff question, what can you do that protects
your customer and that they are comfortable with vs.
what is good for their employee?
3 Key Focus Areas:
1. Information protection: Determine information that is and is not deemed
“cleared” for consumption on mobile devices either due to its sensitivity or due
to the compliance burdens associated with handling it.
2. User sensitivity: Creating a profile of at-risk users and the security required for
their access to critical information.
3. System risk: Take advantage of features such as on-device encryption, the use
of VPNs and multi-factor authentication provides a line of safety between users,
their devices and the back-end. Tiered information access.
Source:
10. OPPORTUNITY 2
Create a Mobility Policy
Questions to consider:
How are you going to protect the data?
How are employees going to log in?
What devices are you going to allow on the network?
What employee security mandates are you going to impose?
Are you going to allow Personal Identifiable Information (PII) or
Protected Health Information (PHI) on the devices?
What are data compliance/privacy requirements for your
customers industry? (ie. HIPAA, GLBA, PCI, SOC, etc.)
Source:
11. OPPORTUNITY 3
Mobile Device Management
Over a hundred choices
…and counting
12. OPPORTUNITY 4
Infrastructure and Support
1. WLAN Coverage/Performance
2. Employee Support/Helpdesk
3. Device Provisioning
4. Line of Business Consulting
5. Device Hot Spare programs
6. Audio/Video Upgrades
7. Mobile Printing/Document Management
8. Building/Electrical Upgrades
17. Prediction #2
Ubiquitous
connectivity
changes the business
landscape forever
“Device wireless access with overtake wired computer access in US by 2015”
19. Prediction #4
BYOA
will be the new reality
“Downloading unauthorized apps serious concern by 48 percent of respondents”
20. Prediction #5
Managing security, compliance,
data portability, fragmentation
and device support drives:
channel opportunity
Global Industry Analysts projects that by 2017,
enterprise mobility will be a $174 billion market