SlideShare ist ein Scribd-Unternehmen logo
1 von 16
BYOD
Bring Your Own Device
Biman Pathirage
06 – 04 – 2016
Geveo Weekly Presentation
Contents
 Introduction
 Popularity of BYOD over time
 Benefits of BYOD – to the employers
 Benefits of BYOD – to the employees
 Risks of BYOD
 How to secure the BYOD environment
 Adoption of BYOD across the world
 Conclusion
Introduction
 BYOD defined as a concept that provides device-independence to
employees in IT organizations. That means, they can use their own
devices in the offices, to do the office work.
 The first use of BYOD was initiated back in 2009 and it has been
growing in popularity ever since.
Introduction
 Mainly SMBs(Small and Medium Businesses), are unable to keep up
with the technology changes in the current tech world when it comes
to physical devices.
 This concept is adapted mostly by SMBs which use a lot of mobile
devices in their work.
Introduction
 Newer technologies – More ahead you are in the race
 But why can’t the companies just provide such latest hardware to the
employees and retain full control over the devices?
“Trying to stand in the path of consumerised mobility is likely to be a
damaging and futile exercise. The best thing that an SMB or
enterprise can do is be aware of the benefits and understand the
risks.”
Popularity Increases…
Benefits of BYOD – to the employers
 Reduces Technology Costs - BYOD programs generally shift costs to
the individual user so companies save a lot of money on up-front device
expenses. The employee will have to pay for his own data and device
maintenance.
 50% of the companies who have implemented BYOD already, require employees to cover
their device expenses, and the employees have agreed.
 Takes Advantage of Newer Devices - Individual users generally
upgrade to the latest hardware more frequently than most organizations,
which means they’ll have access to faster, sleeker, and more capable
devices.
 Improved Productivity – By using their own devices, the employees
are happier at work and in turn increase their productivity.
Benefits of BYOD – to the employees
 Employee Satisfaction - When the employees are able to use the
devices they already know and love, and achieve higher success rates
because of it, they will be happier working for your company.
 Studies have shown that this happiness overpowers the reluctance to pay for their own
devices and services.
 Location Independence – Most employees can work from their
homes if they are using their own devices. They don’t always have to
come to the office to do a quick change to their work.
Risks of BYOD
 Data security – There is no credibility as to with whom the
employee is sharing his organizations’ work, and the amount of
security implemented in the employees device.
 Lost or stolen devices – When devices that are registered in a
BYOD network are lost or stolen, sensitive corporate data can fall into
the hands of an outsider. So this is another threat to the existence of
the BYOD model as well.
 Nearly 4 million handsets have been lost in the past year in America alone, and 45%
of them reported to have been left at public places.
 Fired employees - Typically, retrieving data from the private device
of a fired employee can be a big issue, and this information can easily
be leaked to a rival organization.
How to secure the BYOD environment
 First and foremost, organizations should not implement a BYOD policy
unless they are fully prepared to handle it. It depends on the products
of the organization.
 Use a comprehensive MDM (mobile device management suite) - A
powerful mobile device management solution provides a centralized
dashboard to manage and monitor all the devices connected to a
particular business effectively.
How to secure the BYOD environment
 BYOD policy should include aspects such as how and when corporate
data should be deleted from a device, what type of data can be
accessed through a personal device and what type of encryption
should be done to protect the data inside.
 Implement an effective employee exit strategy.
 Require device registration
 Create a company cloud
 Educate the employees and audit the company network frequently
Adoption of BYOD across the world
BRIC economy countries have shown a major interest in BYOD
Conclusion
 Overall, BYOD is a win-win situation for employees as well as
businesses.
 This is a growing trend in the world at the present, providing a lot of
benefits as well as risks – mostly data risk.
 Before adapting to this technology, all businesses would require to do
some analysis as to whether this really suits their company policies.
 The fact that even some big tech companies such as Intel are using
this concept leads to the conclusion that this is doable, and beneficial
if implemented with proper policies and standards.
Conclusion
“With a sound and security-focused BYOD
policy in place, businesses can mitigate the
risks of BYOD while taking full advantage of
its benefits”
Sources of data
 BYOD: (Bring Your Own Device) Is Your Organization Ready?- Ann Cavoukian, Ph.D.
 http://blog.parallels.com/2014/12/10/what-is-byod/
 http://www.inc.com/comcast/byod-byoa-a-growing-applicable-trend.html
 http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce
 http://www.techradar.com/news/computing/what-is-byod-and-why-is-it-
important--1175088
 http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_ow
n_device_.html
 https://www.miradore.com/byod-agile-personal-infrastructure/
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymondspencerharry
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016AGILLY
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role LogMeIn
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 

Was ist angesagt? (19)

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
Byod
ByodByod
Byod
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

Ähnlich wie BYOD

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi namboori
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices Vishwa Raj
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldKévin CÉCILE
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comPhD Assistance
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Gen Re
 

Ähnlich wie BYOD (20)

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

BYOD

  • 1. BYOD Bring Your Own Device Biman Pathirage 06 – 04 – 2016 Geveo Weekly Presentation
  • 2. Contents  Introduction  Popularity of BYOD over time  Benefits of BYOD – to the employers  Benefits of BYOD – to the employees  Risks of BYOD  How to secure the BYOD environment  Adoption of BYOD across the world  Conclusion
  • 3. Introduction  BYOD defined as a concept that provides device-independence to employees in IT organizations. That means, they can use their own devices in the offices, to do the office work.  The first use of BYOD was initiated back in 2009 and it has been growing in popularity ever since.
  • 4. Introduction  Mainly SMBs(Small and Medium Businesses), are unable to keep up with the technology changes in the current tech world when it comes to physical devices.  This concept is adapted mostly by SMBs which use a lot of mobile devices in their work.
  • 5. Introduction  Newer technologies – More ahead you are in the race  But why can’t the companies just provide such latest hardware to the employees and retain full control over the devices? “Trying to stand in the path of consumerised mobility is likely to be a damaging and futile exercise. The best thing that an SMB or enterprise can do is be aware of the benefits and understand the risks.”
  • 7. Benefits of BYOD – to the employers  Reduces Technology Costs - BYOD programs generally shift costs to the individual user so companies save a lot of money on up-front device expenses. The employee will have to pay for his own data and device maintenance.  50% of the companies who have implemented BYOD already, require employees to cover their device expenses, and the employees have agreed.  Takes Advantage of Newer Devices - Individual users generally upgrade to the latest hardware more frequently than most organizations, which means they’ll have access to faster, sleeker, and more capable devices.  Improved Productivity – By using their own devices, the employees are happier at work and in turn increase their productivity.
  • 8. Benefits of BYOD – to the employees  Employee Satisfaction - When the employees are able to use the devices they already know and love, and achieve higher success rates because of it, they will be happier working for your company.  Studies have shown that this happiness overpowers the reluctance to pay for their own devices and services.  Location Independence – Most employees can work from their homes if they are using their own devices. They don’t always have to come to the office to do a quick change to their work.
  • 9. Risks of BYOD  Data security – There is no credibility as to with whom the employee is sharing his organizations’ work, and the amount of security implemented in the employees device.  Lost or stolen devices – When devices that are registered in a BYOD network are lost or stolen, sensitive corporate data can fall into the hands of an outsider. So this is another threat to the existence of the BYOD model as well.  Nearly 4 million handsets have been lost in the past year in America alone, and 45% of them reported to have been left at public places.  Fired employees - Typically, retrieving data from the private device of a fired employee can be a big issue, and this information can easily be leaked to a rival organization.
  • 10. How to secure the BYOD environment  First and foremost, organizations should not implement a BYOD policy unless they are fully prepared to handle it. It depends on the products of the organization.  Use a comprehensive MDM (mobile device management suite) - A powerful mobile device management solution provides a centralized dashboard to manage and monitor all the devices connected to a particular business effectively.
  • 11. How to secure the BYOD environment  BYOD policy should include aspects such as how and when corporate data should be deleted from a device, what type of data can be accessed through a personal device and what type of encryption should be done to protect the data inside.  Implement an effective employee exit strategy.  Require device registration  Create a company cloud  Educate the employees and audit the company network frequently
  • 12. Adoption of BYOD across the world BRIC economy countries have shown a major interest in BYOD
  • 13. Conclusion  Overall, BYOD is a win-win situation for employees as well as businesses.  This is a growing trend in the world at the present, providing a lot of benefits as well as risks – mostly data risk.  Before adapting to this technology, all businesses would require to do some analysis as to whether this really suits their company policies.  The fact that even some big tech companies such as Intel are using this concept leads to the conclusion that this is doable, and beneficial if implemented with proper policies and standards.
  • 14. Conclusion “With a sound and security-focused BYOD policy in place, businesses can mitigate the risks of BYOD while taking full advantage of its benefits”
  • 15. Sources of data  BYOD: (Bring Your Own Device) Is Your Organization Ready?- Ann Cavoukian, Ph.D.  http://blog.parallels.com/2014/12/10/what-is-byod/  http://www.inc.com/comcast/byod-byoa-a-growing-applicable-trend.html  http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce  http://www.techradar.com/news/computing/what-is-byod-and-why-is-it- important--1175088  http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_ow n_device_.html  https://www.miradore.com/byod-agile-personal-infrastructure/

Hinweis der Redaktion

  1. 1. This is one of the latest trends in the IT industry around the globe.
  2. 2. Specially IT related businesses, who use mobile devices such as smartphones, tablets and even laptops
  3. In most of the cases, the employees might own latest and more advanced devices like tablets, Ultrabooks or laptops while their employers provide them with desktop computers which are at least 2 or 3 years outdated. So this would be a good opportunity to compete with the rival companies Well, most pro analysts have arrived at the conclusion below So as professional analysts agree, BYOD is a concept to be embraced rather than be thrown away, if a company wants to stay in the competition
  4. As you can clearly see, the popularity of BYOD over the first half of decade have been increasing dramatically and is expected to be at a big 85% by the end of 2020
  5. Businesses can transfer operational expenses to the user while optimizing revenues. It is predicted that an organization can save up to $100 per month per user through this policy As I have already pointed out in the previous slides, getting up to date is more faster in employees than employers in the current industry
  6. 1. The main problem is that if employees like to use their own devices. But, Studies have shown that this happiness overpowers the reluctance to pay for their own devices and services. So they’d be better off using the devices that they love rather than using a totally strange device issued by the company 2. Sometimes, for a small bug fix or a VoIP meeting with a customer, must the employee come to the office? What if he can do this from where he is right now? So this too leads to the employee preference of BYOD as well So those were some of the benefits of BYOD for both the organizations and the employees. Now let’s take a look at the risks of using BYOD policy
  7. Unsurprisingly the main concern with BYOD model is the security. 1. As most of the people now use smartphones and tablets to surf the internet, these devices have become the primary target for hackers as well. So security of data is the biggest and the most grave threat to the BYOD model 3. An employee might not be honest enough to remove all the sensitive information in his device and its against the law for the employers to clean the devices of their employees as well
  8. For an example if the organization is developing applications for the military, they should never implement BYOD models. Likewise, if the organizations’ information is too sensitive, they should think twice before adapting this method. So it’s evident that this model does not work for all the businesses in operation 2. When a device is lost or stolen, the password can be changed remotely, data and settings can be remotely wiped off, and the device can be reset to factory settings. The device can be controlled even through an SMS. MDM solutions allow you to remotely monitor apps installed on any device, and easily remove malicious applications. The location of each device too can be tracked and a complete location history created.
  9. 2. Access tokens, e-mail access, data and other office related information should be removed completely from an employees device when he resigns. So there should be clear rules for this so that both the parties understand what's at stake before getting in to the BYOD policy 3. Register the MAC address of devices to keep track of them and if required, ban them from the network 4. It enables the company information to be safely accessed from outside of the LAN 5. Do full frequent audits on your network so you are completely aware of every device on site and can pinpoint to the devices when they are new and cause any problem
  10. Now let’s take a look at the adoption of BYOD model across the leading countries of the world. As the economy of 2020 is predicted to be dominated by the BRIC countries, it’s evident that BYOD adoption is going to be more successful than not when we consider the last four columns of this table although there are a lot of drawbacks and complications yet to be solved, because except Russia, all Brazil, India and China are showing much interest in adopting this model to their businesses
  11. By analyzing the benefits to both the employer and employee that I have mentioned previously, we can say that it is a win-win situation for both the parties and it can also be adopted to go together with the agile manifesto, which is being followed by most of the companies in the present As every good thing comes at a cost, this model too has its drawbacks. But if the companies find out successful remedies to those problems, this can be the next major change in the business and technology world. It’s important to do a cost benefit analysis and assess whether this is the right model for your business before adapting it.