SlideShare a Scribd company logo
1 of 9
Going
Mobile
Keeping Employees Happy and Hardworking … Everywhere
(While Maintaining Information
Security)
Get the Best Work from Your
Employees: Enable Mobility
• Empower your workforce to be as sharp and
productive as possible
• Flexibility is king
• 3 out of 5 employees claim they don’t need to
be in the office to be productive (Mashable)
• Work is no longer a place
• Enable mobile workers
By 2015, 1.3 billion workers will have gone mobile—that’s 37.2% of the
total global workforce (IDC). Is your organization ready to meet the needs
of the modern, mobile workforce?
Benefits of a Flexible Work
Environment & Mobile Workforce
• Elevated productivity (able to work anytime, anywhere)
• Sharper focus
• Higher quality work
• Increased social collaboration (teams, departments)
• Improved employee satisfaction
• Lower turnover
Transitioning to a Flexible,
Mobile Work Environment
Keep these components top of mind:
Devices • Provide laptops or tablets to employees
• Weigh potential return (improved productivity)
against initial investment
• Allow/support BYOD
• Let employees bring and use personal mobile
devices for work
• More risk/less control
Mobile Solutions
Security
Policies
Options
Support
Transitioning to a Flexible,
Mobile Work Environment
Keep these components top of mind:
Devices • Enable mobile devices
• Provide technology/solutions needed for
devices to be used effectively
• Mobile print
• On site high speed Wi-Fi
• Off site access to internal servers/files
Mobile Solutions
Security
Policies
Options
Support
Transitioning to a Flexible,
Mobile Work Environment
Keep these components top of mind:
Devices • Accessing files on multiple devices from
multiple locations = big security risk
• 45% respondents had data loss in last 12
months; 11% had to disclose the losses publicly*
• Understand risks of mobile; protect
against security threats
• Hacking, fraud, human error
• Partner with established info security vendor
Mobile Solutions
Security
Policies
Options
Support
*InformationWeek's 2013 Mobile Security Survey
Transitioning to a Flexible,
Mobile Work Environment
Keep these components top of mind:
Devices • Balance flexibility with clear regulations
and expectations
• Keep mobile employees accountable for work
• Next year, 20% BYOD programs will fail due to
mobile device management measures that are
too restrictive (Gartner)
Mobile Solutions
Security
Policies
Options
Support
Transitioning to a Flexible,
Mobile Work Environment
Keep these components top of mind:
Devices • Not all employees will want to work the
same way with the same mobile
technology
• Discuss preferences with individuals and
try to accommodate
Mobile Solutions
Security
Policies
Options
Support
Transitioning to a Flexible,
Mobile Work Environment
Keep these components top of mind:
Devices • Provide assistance and training to help
employees transition smoothly
• Ensure maximum productivity (return)
Mobile Solutions
Security
Policies
Options
Support

More Related Content

What's hot

20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentationTim Willoughby
 
20170614 Tim Willoughby - data conference
20170614   Tim Willoughby - data conference20170614   Tim Willoughby - data conference
20170614 Tim Willoughby - data conferenceTim Willoughby
 
Unlock the value of your data by smashing data silos
Unlock the value of your data by smashing data silosUnlock the value of your data by smashing data silos
Unlock the value of your data by smashing data silosEntrinsik
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby
 
Retiring Facility Workers: Keep Critical Info from Walking Out the Door
Retiring Facility Workers: Keep Critical Info from Walking Out the DoorRetiring Facility Workers: Keep Critical Info from Walking Out the Door
Retiring Facility Workers: Keep Critical Info from Walking Out the Doorfarandi
 
Using technology to improve and protect your business
Using technology to improve and protect your businessUsing technology to improve and protect your business
Using technology to improve and protect your businessJason Parsons
 
NextStep Boston 2018 - Monoliths or Microservices, Francisco Menezes
NextStep Boston 2018 - Monoliths or Microservices, Francisco MenezesNextStep Boston 2018 - Monoliths or Microservices, Francisco Menezes
NextStep Boston 2018 - Monoliths or Microservices, Francisco MenezesOutSystems
 
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015Extreme Networks
 
DCIM & Monitoring Solutions for the Next Generation Data Center with Jen
DCIM & Monitoring Solutions for the Next Generation Data Center with JenDCIM & Monitoring Solutions for the Next Generation Data Center with Jen
DCIM & Monitoring Solutions for the Next Generation Data Center with Jen42U Data Center Solutions
 
Information Engineering PPT
Information Engineering PPTInformation Engineering PPT
Information Engineering PPTMaria Elloso
 
Business Intelligence Engineering - Voices 2015
Business Intelligence Engineering - Voices 2015Business Intelligence Engineering - Voices 2015
Business Intelligence Engineering - Voices 2015Deanna Kosaraju
 
Spectrum-Virtualise-infographic-March-2014
Spectrum-Virtualise-infographic-March-2014Spectrum-Virtualise-infographic-March-2014
Spectrum-Virtualise-infographic-March-2014Kim Kozlik
 

What's hot (16)

20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentation
 
20170614 Tim Willoughby - data conference
20170614   Tim Willoughby - data conference20170614   Tim Willoughby - data conference
20170614 Tim Willoughby - data conference
 
Unlock the value of your data by smashing data silos
Unlock the value of your data by smashing data silosUnlock the value of your data by smashing data silos
Unlock the value of your data by smashing data silos
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
 
HealthSPA Turku-Pirkko Kortekangas Hospital District of Southwest Finland, Au...
HealthSPA Turku-Pirkko Kortekangas Hospital District of Southwest Finland, Au...HealthSPA Turku-Pirkko Kortekangas Hospital District of Southwest Finland, Au...
HealthSPA Turku-Pirkko Kortekangas Hospital District of Southwest Finland, Au...
 
Many products-no-security
Many products-no-securityMany products-no-security
Many products-no-security
 
Retiring Facility Workers: Keep Critical Info from Walking Out the Door
Retiring Facility Workers: Keep Critical Info from Walking Out the DoorRetiring Facility Workers: Keep Critical Info from Walking Out the Door
Retiring Facility Workers: Keep Critical Info from Walking Out the Door
 
Using technology to improve and protect your business
Using technology to improve and protect your businessUsing technology to improve and protect your business
Using technology to improve and protect your business
 
NextStep Boston 2018 - Monoliths or Microservices, Francisco Menezes
NextStep Boston 2018 - Monoliths or Microservices, Francisco MenezesNextStep Boston 2018 - Monoliths or Microservices, Francisco Menezes
NextStep Boston 2018 - Monoliths or Microservices, Francisco Menezes
 
cloud abstract
cloud abstractcloud abstract
cloud abstract
 
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
Gartner’s Top 10 Strategic Technologies Impacting Education in 2015
 
DCIM & Monitoring Solutions for the Next Generation Data Center with Jen
DCIM & Monitoring Solutions for the Next Generation Data Center with JenDCIM & Monitoring Solutions for the Next Generation Data Center with Jen
DCIM & Monitoring Solutions for the Next Generation Data Center with Jen
 
Information Engineering PPT
Information Engineering PPTInformation Engineering PPT
Information Engineering PPT
 
Business Intelligence Engineering - Voices 2015
Business Intelligence Engineering - Voices 2015Business Intelligence Engineering - Voices 2015
Business Intelligence Engineering - Voices 2015
 
Spectrum-Virtualise-infographic-March-2014
Spectrum-Virtualise-infographic-March-2014Spectrum-Virtualise-infographic-March-2014
Spectrum-Virtualise-infographic-March-2014
 
Joe DiCristofano Resume
Joe DiCristofano ResumeJoe DiCristofano Resume
Joe DiCristofano Resume
 

Similar to Going Mobile: Keeping Employees Happy and Hardworking ... Everywhere

Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentationsolarisyourep
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
Enabling The Mobile Workforce
Enabling The Mobile WorkforceEnabling The Mobile Workforce
Enabling The Mobile WorkforceEnola Labs
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 

Similar to Going Mobile: Keeping Employees Happy and Hardworking ... Everywhere (20)

Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
Enabling The Mobile Workforce
Enabling The Mobile WorkforceEnabling The Mobile Workforce
Enabling The Mobile Workforce
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 

Recently uploaded

internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamraAllTops
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxAaron Stannard
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownSandaliGurusinghe2
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdfArtiSrivastava23
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNitya salvi
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field ArtilleryKennethSwanberg
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siligurimeghakumariji156
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxssuserf63bd7
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxssuserf63bd7
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalWilliam (Bill) H. Bender, FCSI
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdfAlejandromexEspino
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.aruny7087
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentNimot Muili
 

Recently uploaded (14)

internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docx
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 

Going Mobile: Keeping Employees Happy and Hardworking ... Everywhere

  • 1. Going Mobile Keeping Employees Happy and Hardworking … Everywhere (While Maintaining Information Security)
  • 2. Get the Best Work from Your Employees: Enable Mobility • Empower your workforce to be as sharp and productive as possible • Flexibility is king • 3 out of 5 employees claim they don’t need to be in the office to be productive (Mashable) • Work is no longer a place • Enable mobile workers By 2015, 1.3 billion workers will have gone mobile—that’s 37.2% of the total global workforce (IDC). Is your organization ready to meet the needs of the modern, mobile workforce?
  • 3. Benefits of a Flexible Work Environment & Mobile Workforce • Elevated productivity (able to work anytime, anywhere) • Sharper focus • Higher quality work • Increased social collaboration (teams, departments) • Improved employee satisfaction • Lower turnover
  • 4. Transitioning to a Flexible, Mobile Work Environment Keep these components top of mind: Devices • Provide laptops or tablets to employees • Weigh potential return (improved productivity) against initial investment • Allow/support BYOD • Let employees bring and use personal mobile devices for work • More risk/less control Mobile Solutions Security Policies Options Support
  • 5. Transitioning to a Flexible, Mobile Work Environment Keep these components top of mind: Devices • Enable mobile devices • Provide technology/solutions needed for devices to be used effectively • Mobile print • On site high speed Wi-Fi • Off site access to internal servers/files Mobile Solutions Security Policies Options Support
  • 6. Transitioning to a Flexible, Mobile Work Environment Keep these components top of mind: Devices • Accessing files on multiple devices from multiple locations = big security risk • 45% respondents had data loss in last 12 months; 11% had to disclose the losses publicly* • Understand risks of mobile; protect against security threats • Hacking, fraud, human error • Partner with established info security vendor Mobile Solutions Security Policies Options Support *InformationWeek's 2013 Mobile Security Survey
  • 7. Transitioning to a Flexible, Mobile Work Environment Keep these components top of mind: Devices • Balance flexibility with clear regulations and expectations • Keep mobile employees accountable for work • Next year, 20% BYOD programs will fail due to mobile device management measures that are too restrictive (Gartner) Mobile Solutions Security Policies Options Support
  • 8. Transitioning to a Flexible, Mobile Work Environment Keep these components top of mind: Devices • Not all employees will want to work the same way with the same mobile technology • Discuss preferences with individuals and try to accommodate Mobile Solutions Security Policies Options Support
  • 9. Transitioning to a Flexible, Mobile Work Environment Keep these components top of mind: Devices • Provide assistance and training to help employees transition smoothly • Ensure maximum productivity (return) Mobile Solutions Security Policies Options Support