SlideShare une entreprise Scribd logo
1  sur  47
BYOD Business Briefing
May 2012
Our BYOD Panel
       Stan Sotiropoulos is Data Centre              Ross Miller set up the IT department at
       Practice Manager at Logicalis, and is         GPT Group in his previous role, where
       responsible for developing the Logicalis      he led a complete transformation of
       Virtual Workspace solution. Stan has          GPT’s IT environment to support an
       worked within the IT industry for more        activity-based workplace. After a long
       than twenty years and has extensive           career at a senior level in Finance and
       experience in delivering IT infrastructure    IT in Lend Lease and GPT, Ross is now
       solutions to organisations, from end user     MD at NOI Strategies, a global services
       computing, enterprise storage,                company, where he assists companies
       enterprise management and consulting          embarking on programs to deliver the
       and support services.                         workplace of the future.



       Stuart Driver is Director, WW Regional        Dudley Kneller, Partner at Madgwicks,
       IT Operations at Citrix Systems. A            specialises in technology, intellectual
       member of the Citrix APAC geo                 property, telecommunications and
       executive management team, Stuart is          outsourcing transactions
       responsible for the IT operations of the      in Australia and overseas. Dudley
       regional data centres at Citrix (located in   advises on all aspects of information
       Sydney, Bangalore, London and Silicon         technology, intellectual property and
       Valley) which support the business            telecommunications transactions and
       outside of Citrix corporate HQ in             advice work. He also advises clients on
       Florida.. Having worked in various IT         their regulatory obligations including
       roles over the past 13 years at Citrix in     privacy, spam, data security and
       EMEA and Asia Pacific, Stuart was also        document retention.
       responsible for designing and deploying
       Citrix’s BYOC program.


1
Logicalis
Virtual
Workplace
Trends and Expectations
                              CIO
                              • Employee productivity
                              • Global competitiveness
                              • Strategic value through TCO



                              IT: Server Manager
    The Evolving              • Control, manageability, and security
     Workplace                • Reduction in new deployments and data center sprawl
     Landscape:               • Initial purchase and lifecycle costs


     Heterogeneous
      end-point devices
                              IT: Desktop Manager
                              • Control, manageability, and security
     Mobile workers          • Deployment speed and versatility with reduced costs
                              • Near-native experience
     Geographically
      dispersed resources
                              End User
     Windows 7 migration
                              • Geographically dispersed users expect LAN performance
     Data leakage and loss   • Anywhere, Anytime, Any Device
      prevention              • Alignment to Existing Desktop Experience



3
Market Assessment - Secure mobility is a key CIO Challenge
 Desktop virtualisation a key part of IT strategy
      45% of respondents to Logicalis survey indicate plans within 12
       months or part of IT strategy
      44% of respondents to Fujitsu CIO survey indicate “mobile working
       solutions” are of High or Top interest
      Desktop virtualisation a “Top 5” technology – 20% users implementing
       next 12mths / 40% next 24mths [IDC]
 91% of organisations to have implemented some form of desktop
    virtualisation by the end of 2013 [Citrix]
 62% of Australian organisations planning to procure tablets next
    12mths (compared to an APAC average of 31%) [IDC]
      Countries like China, Germany, the US, India, Australia and NZ have
         the most aggressive client virtualisation deployment plans [Forrester]
 Adoption of BYOD models by major Australian companies like
    Suncorp and Qantas
4
Traditional PC Challenges
           Difficult to Manage
           • Standardising on physical desktop is becoming increasingly
             complicated

           Mobility
           • Users want access to everything, everywhere


           High TCO
           • Low CapEx is offset by high OpEx
           • Costly to deploy new software, patches

           Difficult to Secure
           • Lost or Stolen equipment
           • Users fail to backup

           Inefficient use of Resources
           • Underutilised hardware resources and cannot be shared
           • Green IT

5
Business Case for Virtual Desktop
           Hardware Costs
           • Extended the life of desktops or deploy thin clients

           Compliance and Data Security
           • All data contained and stored in the Data Centre

           IT Productivity
           • Centrally managed reducing operational administration

           Growth
           • Instantaneous deploying of new desktops

           Resilience
           • Virtual Desktops provides fault tolerance and improves DR

           Mobility, BYOD and Branch Office Enablement
           • Anytime, Anywhere access via a choice of end point devices

6
Virtual Workspace Architecture




7
Citrix BYOC
Supporting Slides
Stuart Driver
Director, WW Regional IT
Operations
What our users   In the past…
  demand

                       #@!*
                        $
Why offer a BYOC program



               • Employee chooses the
                 laptop & OS
               • Same experience as a
                 managed device
               • Reduce dependency on IT
               • Self Service via our BYOC
                 website
               • Control the service, not the
                 hardware
Creating a BYOC program




  Survey     Stipend   Corporate   Security   Program
   Your                 Policies               Rules
 Employees
Start with an internal survey                 1   2   3   4   5




       Employees were enthused
       Employees were enthused
           Their choice was outside what IT
          Their choice was outside what IT
           offered
          offered
           Willing to take on the added
          Willing to take on the added
           responsibility
          responsibility
           Believed they would be more
          Believed they would be more
           productive
          productive
           and also happier
          and also happier
Identify existing cost, then the Stipend           1   2     3   4   5




 Review your existing                             Procure
  cost
                                                   Image
   • Identify your existing    Three Year Cost:
                                                  Secure
     costs                     $2,500 ~ $2,600
                                                  Deploy
   • Define the cost savings
                                                  Monitor
     target
   • Offer a stipend that      $2,100 Stipend     Maintain

     motivates employees                          Back-up

   • Align the duration of                         Retire
     the program
   • Define proration policy
     if someone leaves
Review the program with HR and
 Legal                                                 1   2   3   4   5




• Do your existing policies apply?
 • Our focus was to keep the rules
   the same for all
 • Policies are in effect for managed
   and BYOC devices


                              We Found That All Existing Policies Did
                               In Fact, Apply to BYOC Participants
From the datacenter to the endpoint                             1    2   3   4   5




          Citrix                  NetScaler Access
         Receiver                     Gateway                    XenApp
                                      SSL VPN                      ™



                                      Network
                                                                            Data
                                                                           Center

                                     Perimeter Firewall
                            Intrusion Detection and Prevention            User Data
Antivirus
                                         (IDS / IPS)                Single Sign On
Two-factor Authentication
                                       Web Filtering               Active Directory
                                    Threat Management             App Virtualization
                                                                           Desktop
Develop the rules, then present the
concept                                          1   2   3   4   5




  1. Manager’s approval     6. Antivirus required on
  2. $2,100 stipend for a       all
     laptop and 3 year          BYOC laptops
     maintenance            7. Remote connection
  3. If you leave the           through the Receiver
     company before 3           / Access Gateway
     years, we will pro-    8. All apps delivered
     rate the stipend           (online and offline)
  4. Return your managed        from the datacenter
     laptop to your         9. Provision your apps
     manager to create a        through Receiver™
     loaner program         10. All existing corporate
  5. BYOC hardware              policies apply
     issues are addressed
     by the vendor
BYOC Website
Self Service Website

•   Program description and rules
•   Enrollment
•   Getting Started
•   Extras


                    Simple Website
                    To Assist Users
Program Rules Page

1.    Manager's approval
2.    Receive $2,100 stipend
3.    Laptop and 3 year maintenance
4.    Return your managed laptop
5.    Manager retains returned laptop
6.    Vendor addresses hardware
      issues
7.    Antivirus required
8.    Connect via the Receiver™/
      Access Gateway
 9.   Apps provided online and offline
10.   All corporate polices apply
Enrollment Page

• Review Policy
• Check Agreement Box
• Click Submit




               Review + Submit
Getting Started Page

• Discount on purchases
• Download the Citrix Receiver and Antivirus
• Section for Windows and Mac



                    Discounts



                 Windows + Mac




                           Citrix Confidential - Do Not Distribute
User Experience
Download The Receiver
Download the
Receiver from your
website
Download The Receiver
• Receiver installs
  multiple     plug-ins:
 •   SSL VPN
 •   Apps & Desktop OS
 •   Accelerator
 •   Self-service Plug-in
Launch Receiver

• Self-Service Application Store
• Select the Apps yourself
• IT manages the store



                     Various
                   Applications
User Provisions Their Apps



       Create Your Folders




          Drag + Drop
          Applications
Launch Apps
From
• Start menu
• Desktop
• Task bar
BYO Consumer Devices
Consumer devices

• Consumer technology is useful in the enterprise
• Simple, intuitive and inexpensive
• Users want to bring their device to work
• Beyond BYOC… to BYO-3
                                                    42%


                                             34%

                                                          16%
                                                                 6%
    Alert me                            2%
               Empower me

                                        1       2        3       4          5+
                               How many computing devices do you use on
                                            a daily basis
                                  Worldwide Survey of Corporate Employees
                                       February 2011, Citrix Systems
Same infrastructure supports consumer
devices


               NetScaler Access
                   Gateway
                   SSL VPN

                   Network
                                                Data
                                               Center

                Perimeter Firewall
                  Web Filtering                User Data
               Threat Management         Single Sign On
             Intrusion Detection and    Active Directory
              Prevention (IDS / IPS)   App Virtualization
                                                Desktop
Activity Based Workplace
Supporting Slides
STRATEGY | TECHNOLOGY | SERVICES




           Case Study – the New GPT Work Environment
                                                  17 February, 2012




Slide 34                       Operational Excellence for Commercial Real Estate
What is does the future of Work Space
Look Like?
Activity Based Working is One Solution
     • Work anywhere, anytime, anyplace
     • Work the way that suits you best
     • Judged on outcomes not on being there
     • Many varied spaces to collaborate
     • Technology enables the workplace
     • No Allocated Desks, choose a desk every day to work at
     • Clean desk policy
     • Paperless (or significantly reduced paper usage)




Slide 35                                                  Operational Excellence for Commercial Real Estate
Why Would You Do It?

     • Overall reduction in space gives a great economic outcome
     • Why pay expensive rent to store paper
     • Enables companies to achieve great sustainability outcomes
     • Builds collaboration and breaks down silos
     • Empowers the workforce by making them accountable for their
       own outputs
     • Leverages latest technologies to improve efficiencies




Slide 36                                                Operational Excellence for Commercial Real Estate
Technologies Delivered
     • Desktop Upgrade including Windows 7 and Office 2010
           – Key challenge to remediate all apps to run on Windows 7
     • Installed Cisco Wireless Technology to deliver Video
       grade wireless to all Staff
     • Relocated Data Room to support 6 green star intiative
     • Unified Communications coupled with OCS
           – Vast majority staff on softphone
     • Remote Access to work anywhere anytime
           – Using Juniper VPN with 2 factor authentication and Virtual
             Desktop


Slide 37                                             Operational Excellence for Commercial Real Estate
Technologies Delivered

     • Integrated security single card to access lockers and
       printing
     • Swipe to Print
     • Room Booking System integrated with Outlook
     • Audio and Video conferencing, integrated controllers
       with lighting
     • Wireless Presenter and Electronic Whiteboards
     • Sharepoint Doc Management
     • Universal Docking Stations



Slide 38                                   Operational Excellence for Commercial Real Estate
BUT… It’s not about Technology
     Successfully delivering a fundamental workspace change
     means addressing:
     • Culture
     • Process
     • Space




Slide 39                                 Operational Excellence for Commercial Real Estate
The Change Management Process

     • Dedicated team of organisational and IT Change People
     • Start Early
     • Set Programs to engage the business
           – e.g. Biggest Loser, Passports

     • CEO and Leadership Team Support critical
     • Engage the doubters early and constantly




Slide 40                                          Operational Excellence for Commercial Real Estate
Outcomes

     • Activity based Workplace
     • 350 desks for 322 staff reduced to only 277 desks
     • Paper use less than a third
     • Paper Storage was more than 900 lineal metres now 300 lineal
       metres
     • No major outages or technology failures
     • 6 Green Star




Slide 41                                          Operational Excellence for Commercial Real Estate
More information on
Logicalis and our Partners
Logicalis Overview
 Logicalis brings differentiated solutions to address business issues in
      the ICT infrastructure space utilising multi-vendor technologies



      Focused ICT infrastructure
       provider
      Integrated “architectural
       approach” to addressing
       business issues
      Differentiated by our support
       and managed service
       offerings


43
Logicalis Capabilities Overview
                                 Certifications
                                        Citrix Gold Partner
                                        VMware Enterprise Partner
                                        Cisco Gold and “MSCP” Partner
                                        EMC Velocity “Premier” Partner
                                        NetApp Gold Partner
                                        Microsoft Partner (Server,
                                         Virtualisation, UC)
                                        Vblock (First accredited
                                         Australian partner)

                                 Cisco Technology Specialisations
                                        Advanced Routing and Switching
                                        Advanced Security
                                        Advanced Unified
                                         Communications
                                        Advanced Wireless LAN
                                        Cisco UCS and Cisco ISE

                                 FlexPod solutions with single
                                  number support (FlexOne)


44
Citrix Overview
Citrix Systems, Inc. (NASDAQ:CTXS)                Corporate Snapshot
transforms how businesses and IT work and
people collaborate in the cloud era. With            US$2.21B in 2011
market-leading cloud, collaboration,
networking and virtualization technologies,
                                                     260,000 Customers and 10,000 Partners in 100
Citrix powers mobile workstyles and                   countries
cloud services, making complex enterprise IT
                                                     6,900 Employees in 35 countries
simpler and more accessible for 260,000
organizations. Citrix products touch 75 percent      100% of the Fortune 100 and Fortune Global 100
of Internet users each day and it partners with       use Citrix to deliver IT as an on-demand service
more than 10,000 companies in 100 countries.
Annual revenue in 2011 was US$2.21 billion.          75% of Internet users
The workplace of the 21st century is                 Year Founded: 1989
undergoing a remarkable transformation,
driven in part by innovation in consumer
                                                     Employees' Choice - 50 Best Places to Work
technology. People are increasingly bringing          (Glassdoor, 2012)
the smartphones, tablets and other devices
                                                     Top 50 Most Innovative Companies (Forbes,
they use ubiquitously in their personal lives
into the workplace and expecting the same kind        2011)
of rich, self-service experience they have at        Top 10 Places to Work in Silicon Valley
home. This "consumerization" is driving rapid
change in business and IT, dissolving the lines       (Workplace Dynamics, 2011_
between work and play, the office, home or           Top 25 Best Tech Companies to Work For
anywhere in between. Today's "workplace" is
no longer a building you go to; it's wherever
                                                      (Business Insider, 2011)
you find inspiration.

45
About NOI Strategies
NOI is a global services company       Expert Consulting.
that provides expert consulting,
                                       Established in 2002, NOI consists of the top experts in
technology, and outsourcing            commercial real estate business process and
services to the world’s leading        technologies.
commercial real estate owners,
operators, and investors. Our          Technology Leadership.
consultants have deep experience       NOI maintains strong working knowledge and partnerships
transforming real estate processes     with all of the major software solution providers in our
and applying technology to             industry.
improve operations:
                                       Operational Support Services.
NOI has significant expertise in       Customized to your operation, our exclusive blend of
delivering state of the art activity   domestic and offshore resources will help your company
based work environments. From          reduce non-core FTE, increase its depth of capability, and
advice on technology to                minimize technology overhead.
organisational change NOI can
                                       Global Enterprise Capability.
assist companies embarking on
programs to deliver the workplace      We provide services to global tier-one real estate
of the future                          companies.



46

Contenu connexe

Tendances

Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointWalter Liu
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Citrix
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13kentdsorensen
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
Barco CineCare Web
Barco CineCare WebBarco CineCare Web
Barco CineCare WebBarco
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theorySecureITExperts
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationSylCotter
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 

Tendances (18)

Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Barco CineCare Web
Barco CineCare WebBarco CineCare Web
Barco CineCare Web
 
Migrating to cloud
Migrating to cloudMigrating to cloud
Migrating to cloud
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theory
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 

En vedette

BYOD: Bring Your Own Device
BYOD: Bring Your Own DeviceBYOD: Bring Your Own Device
BYOD: Bring Your Own Deviceccaviness
 
BYOD Strategy and Exams
BYOD Strategy and ExamsBYOD Strategy and Exams
BYOD Strategy and ExamsMark S. Steed
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global PerspectiveCisco Services
 
Ten rules for Bring Your Own Device (BYOD)
Ten rules for Bring Your Own Device (BYOD)Ten rules for Bring Your Own Device (BYOD)
Ten rules for Bring Your Own Device (BYOD)ibmmobile
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 

En vedette (10)

BYOD: Bring Your Own Device
BYOD: Bring Your Own DeviceBYOD: Bring Your Own Device
BYOD: Bring Your Own Device
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
BYOD Strategy and Exams
BYOD Strategy and ExamsBYOD Strategy and Exams
BYOD Strategy and Exams
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
 
Ten rules for Bring Your Own Device (BYOD)
Ten rules for Bring Your Own Device (BYOD)Ten rules for Bring Your Own Device (BYOD)
Ten rules for Bring Your Own Device (BYOD)
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 

Similaire à Logicalis BYOD Briefing

Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Peter Bookman
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterSunbird DCIM
 
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillNetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillJeff Kiesel
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 
Benefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureBenefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
 
Cloud computing simplified
Cloud computing simplifiedCloud computing simplified
Cloud computing simplifiedjohndorian555
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologyCisco Canada
 
Bringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User DesktopsBringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User DesktopsDizzion, Inc.
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Dizzion Control Center: Bringing Transparency, Productivity & Insights to VDI
Dizzion Control Center: Bringing Transparency, Productivity & Insights to VDIDizzion Control Center: Bringing Transparency, Productivity & Insights to VDI
Dizzion Control Center: Bringing Transparency, Productivity & Insights to VDIDizzion, Inc.
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
Future of Making Things
Future of Making ThingsFuture of Making Things
Future of Making ThingsJC Davis
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyInternap
 

Similaire à Logicalis BYOD Briefing (20)

Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
 
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillNetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
Benefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureBenefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises Infrastructure
 
Cloud computing simplified
Cloud computing simplifiedCloud computing simplified
Cloud computing simplified
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
 
Bringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User DesktopsBringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User Desktops
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Dizzion Control Center: Bringing Transparency, Productivity & Insights to VDI
Dizzion Control Center: Bringing Transparency, Productivity & Insights to VDIDizzion Control Center: Bringing Transparency, Productivity & Insights to VDI
Dizzion Control Center: Bringing Transparency, Productivity & Insights to VDI
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
Future of Making Things
Future of Making ThingsFuture of Making Things
Future of Making Things
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 

Plus de Logicalis Australia

Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Australia
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to CompletionLogicalis Australia
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to CompletionLogicalis Australia
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Three perspective on migrating to Cloud
Three perspective on migrating to CloudThree perspective on migrating to Cloud
Three perspective on migrating to CloudLogicalis Australia
 
Tomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business BriefingTomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business BriefingLogicalis Australia
 

Plus de Logicalis Australia (14)

Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to Completion
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to Completion
 
Six Steps to Private Cloud
Six Steps to Private CloudSix Steps to Private Cloud
Six Steps to Private Cloud
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Logicalis Cloud Briefing
Logicalis Cloud BriefingLogicalis Cloud Briefing
Logicalis Cloud Briefing
 
Capturing The New Normal
Capturing The New NormalCapturing The New Normal
Capturing The New Normal
 
Three perspective on migrating to Cloud
Three perspective on migrating to CloudThree perspective on migrating to Cloud
Three perspective on migrating to Cloud
 
Enable flexible working
Enable flexible workingEnable flexible working
Enable flexible working
 
IPv6: Why Should You Care?
IPv6: Why Should You Care?IPv6: Why Should You Care?
IPv6: Why Should You Care?
 
Cisco UCS Briefing
Cisco UCS BriefingCisco UCS Briefing
Cisco UCS Briefing
 
Tomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business BriefingTomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business Briefing
 
Enable Tomorrow's Workplace
Enable Tomorrow's WorkplaceEnable Tomorrow's Workplace
Enable Tomorrow's Workplace
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Logicalis BYOD Briefing

  • 2. Our BYOD Panel Stan Sotiropoulos is Data Centre Ross Miller set up the IT department at Practice Manager at Logicalis, and is GPT Group in his previous role, where responsible for developing the Logicalis he led a complete transformation of Virtual Workspace solution. Stan has GPT’s IT environment to support an worked within the IT industry for more activity-based workplace. After a long than twenty years and has extensive career at a senior level in Finance and experience in delivering IT infrastructure IT in Lend Lease and GPT, Ross is now solutions to organisations, from end user MD at NOI Strategies, a global services computing, enterprise storage, company, where he assists companies enterprise management and consulting embarking on programs to deliver the and support services. workplace of the future. Stuart Driver is Director, WW Regional Dudley Kneller, Partner at Madgwicks, IT Operations at Citrix Systems. A specialises in technology, intellectual member of the Citrix APAC geo property, telecommunications and executive management team, Stuart is outsourcing transactions responsible for the IT operations of the in Australia and overseas. Dudley regional data centres at Citrix (located in advises on all aspects of information Sydney, Bangalore, London and Silicon technology, intellectual property and Valley) which support the business telecommunications transactions and outside of Citrix corporate HQ in advice work. He also advises clients on Florida.. Having worked in various IT their regulatory obligations including roles over the past 13 years at Citrix in privacy, spam, data security and EMEA and Asia Pacific, Stuart was also document retention. responsible for designing and deploying Citrix’s BYOC program. 1
  • 4. Trends and Expectations CIO • Employee productivity • Global competitiveness • Strategic value through TCO IT: Server Manager The Evolving • Control, manageability, and security Workplace • Reduction in new deployments and data center sprawl Landscape: • Initial purchase and lifecycle costs  Heterogeneous end-point devices IT: Desktop Manager • Control, manageability, and security  Mobile workers • Deployment speed and versatility with reduced costs • Near-native experience  Geographically dispersed resources End User  Windows 7 migration • Geographically dispersed users expect LAN performance  Data leakage and loss • Anywhere, Anytime, Any Device prevention • Alignment to Existing Desktop Experience 3
  • 5. Market Assessment - Secure mobility is a key CIO Challenge  Desktop virtualisation a key part of IT strategy  45% of respondents to Logicalis survey indicate plans within 12 months or part of IT strategy  44% of respondents to Fujitsu CIO survey indicate “mobile working solutions” are of High or Top interest  Desktop virtualisation a “Top 5” technology – 20% users implementing next 12mths / 40% next 24mths [IDC]  91% of organisations to have implemented some form of desktop virtualisation by the end of 2013 [Citrix]  62% of Australian organisations planning to procure tablets next 12mths (compared to an APAC average of 31%) [IDC]  Countries like China, Germany, the US, India, Australia and NZ have the most aggressive client virtualisation deployment plans [Forrester]  Adoption of BYOD models by major Australian companies like Suncorp and Qantas 4
  • 6. Traditional PC Challenges Difficult to Manage • Standardising on physical desktop is becoming increasingly complicated Mobility • Users want access to everything, everywhere High TCO • Low CapEx is offset by high OpEx • Costly to deploy new software, patches Difficult to Secure • Lost or Stolen equipment • Users fail to backup Inefficient use of Resources • Underutilised hardware resources and cannot be shared • Green IT 5
  • 7. Business Case for Virtual Desktop Hardware Costs • Extended the life of desktops or deploy thin clients Compliance and Data Security • All data contained and stored in the Data Centre IT Productivity • Centrally managed reducing operational administration Growth • Instantaneous deploying of new desktops Resilience • Virtual Desktops provides fault tolerance and improves DR Mobility, BYOD and Branch Office Enablement • Anytime, Anywhere access via a choice of end point devices 6
  • 10. Stuart Driver Director, WW Regional IT Operations
  • 11. What our users In the past… demand #@!* $
  • 12. Why offer a BYOC program • Employee chooses the laptop & OS • Same experience as a managed device • Reduce dependency on IT • Self Service via our BYOC website • Control the service, not the hardware
  • 13. Creating a BYOC program Survey Stipend Corporate Security Program Your Policies Rules Employees
  • 14. Start with an internal survey 1 2 3 4 5 Employees were enthused Employees were enthused Their choice was outside what IT Their choice was outside what IT offered offered Willing to take on the added Willing to take on the added responsibility responsibility Believed they would be more Believed they would be more productive productive and also happier and also happier
  • 15. Identify existing cost, then the Stipend 1 2 3 4 5 Review your existing Procure cost Image • Identify your existing Three Year Cost: Secure costs $2,500 ~ $2,600 Deploy • Define the cost savings Monitor target • Offer a stipend that $2,100 Stipend Maintain motivates employees Back-up • Align the duration of Retire the program • Define proration policy if someone leaves
  • 16. Review the program with HR and Legal 1 2 3 4 5 • Do your existing policies apply? • Our focus was to keep the rules the same for all • Policies are in effect for managed and BYOC devices We Found That All Existing Policies Did In Fact, Apply to BYOC Participants
  • 17. From the datacenter to the endpoint 1 2 3 4 5 Citrix NetScaler Access Receiver Gateway XenApp SSL VPN ™ Network Data Center Perimeter Firewall Intrusion Detection and Prevention User Data Antivirus (IDS / IPS) Single Sign On Two-factor Authentication Web Filtering Active Directory Threat Management App Virtualization Desktop
  • 18. Develop the rules, then present the concept 1 2 3 4 5 1. Manager’s approval 6. Antivirus required on 2. $2,100 stipend for a all laptop and 3 year BYOC laptops maintenance 7. Remote connection 3. If you leave the through the Receiver company before 3 / Access Gateway years, we will pro- 8. All apps delivered rate the stipend (online and offline) 4. Return your managed from the datacenter laptop to your 9. Provision your apps manager to create a through Receiver™ loaner program 10. All existing corporate 5. BYOC hardware policies apply issues are addressed by the vendor
  • 20. Self Service Website • Program description and rules • Enrollment • Getting Started • Extras Simple Website To Assist Users
  • 21. Program Rules Page 1. Manager's approval 2. Receive $2,100 stipend 3. Laptop and 3 year maintenance 4. Return your managed laptop 5. Manager retains returned laptop 6. Vendor addresses hardware issues 7. Antivirus required 8. Connect via the Receiver™/ Access Gateway 9. Apps provided online and offline 10. All corporate polices apply
  • 22. Enrollment Page • Review Policy • Check Agreement Box • Click Submit Review + Submit
  • 23. Getting Started Page • Discount on purchases • Download the Citrix Receiver and Antivirus • Section for Windows and Mac Discounts Windows + Mac Citrix Confidential - Do Not Distribute
  • 25. Download The Receiver Download the Receiver from your website
  • 26. Download The Receiver • Receiver installs multiple plug-ins: • SSL VPN • Apps & Desktop OS • Accelerator • Self-service Plug-in
  • 27. Launch Receiver • Self-Service Application Store • Select the Apps yourself • IT manages the store Various Applications
  • 28. User Provisions Their Apps Create Your Folders Drag + Drop Applications
  • 29. Launch Apps From • Start menu • Desktop • Task bar
  • 31. Consumer devices • Consumer technology is useful in the enterprise • Simple, intuitive and inexpensive • Users want to bring their device to work • Beyond BYOC… to BYO-3 42% 34% 16% 6% Alert me 2% Empower me 1 2 3 4 5+ How many computing devices do you use on a daily basis Worldwide Survey of Corporate Employees February 2011, Citrix Systems
  • 32. Same infrastructure supports consumer devices NetScaler Access Gateway SSL VPN Network Data Center Perimeter Firewall Web Filtering User Data Threat Management Single Sign On Intrusion Detection and Active Directory Prevention (IDS / IPS) App Virtualization Desktop
  • 33.
  • 35. STRATEGY | TECHNOLOGY | SERVICES Case Study – the New GPT Work Environment 17 February, 2012 Slide 34 Operational Excellence for Commercial Real Estate
  • 36. What is does the future of Work Space Look Like? Activity Based Working is One Solution • Work anywhere, anytime, anyplace • Work the way that suits you best • Judged on outcomes not on being there • Many varied spaces to collaborate • Technology enables the workplace • No Allocated Desks, choose a desk every day to work at • Clean desk policy • Paperless (or significantly reduced paper usage) Slide 35 Operational Excellence for Commercial Real Estate
  • 37. Why Would You Do It? • Overall reduction in space gives a great economic outcome • Why pay expensive rent to store paper • Enables companies to achieve great sustainability outcomes • Builds collaboration and breaks down silos • Empowers the workforce by making them accountable for their own outputs • Leverages latest technologies to improve efficiencies Slide 36 Operational Excellence for Commercial Real Estate
  • 38. Technologies Delivered • Desktop Upgrade including Windows 7 and Office 2010 – Key challenge to remediate all apps to run on Windows 7 • Installed Cisco Wireless Technology to deliver Video grade wireless to all Staff • Relocated Data Room to support 6 green star intiative • Unified Communications coupled with OCS – Vast majority staff on softphone • Remote Access to work anywhere anytime – Using Juniper VPN with 2 factor authentication and Virtual Desktop Slide 37 Operational Excellence for Commercial Real Estate
  • 39. Technologies Delivered • Integrated security single card to access lockers and printing • Swipe to Print • Room Booking System integrated with Outlook • Audio and Video conferencing, integrated controllers with lighting • Wireless Presenter and Electronic Whiteboards • Sharepoint Doc Management • Universal Docking Stations Slide 38 Operational Excellence for Commercial Real Estate
  • 40. BUT… It’s not about Technology Successfully delivering a fundamental workspace change means addressing: • Culture • Process • Space Slide 39 Operational Excellence for Commercial Real Estate
  • 41. The Change Management Process • Dedicated team of organisational and IT Change People • Start Early • Set Programs to engage the business – e.g. Biggest Loser, Passports • CEO and Leadership Team Support critical • Engage the doubters early and constantly Slide 40 Operational Excellence for Commercial Real Estate
  • 42. Outcomes • Activity based Workplace • 350 desks for 322 staff reduced to only 277 desks • Paper use less than a third • Paper Storage was more than 900 lineal metres now 300 lineal metres • No major outages or technology failures • 6 Green Star Slide 41 Operational Excellence for Commercial Real Estate
  • 43. More information on Logicalis and our Partners
  • 44. Logicalis Overview Logicalis brings differentiated solutions to address business issues in the ICT infrastructure space utilising multi-vendor technologies  Focused ICT infrastructure provider  Integrated “architectural approach” to addressing business issues  Differentiated by our support and managed service offerings 43
  • 45. Logicalis Capabilities Overview  Certifications  Citrix Gold Partner  VMware Enterprise Partner  Cisco Gold and “MSCP” Partner  EMC Velocity “Premier” Partner  NetApp Gold Partner  Microsoft Partner (Server, Virtualisation, UC)  Vblock (First accredited Australian partner)  Cisco Technology Specialisations  Advanced Routing and Switching  Advanced Security  Advanced Unified Communications  Advanced Wireless LAN  Cisco UCS and Cisco ISE  FlexPod solutions with single number support (FlexOne) 44
  • 46. Citrix Overview Citrix Systems, Inc. (NASDAQ:CTXS) Corporate Snapshot transforms how businesses and IT work and people collaborate in the cloud era. With  US$2.21B in 2011 market-leading cloud, collaboration, networking and virtualization technologies,  260,000 Customers and 10,000 Partners in 100 Citrix powers mobile workstyles and countries cloud services, making complex enterprise IT  6,900 Employees in 35 countries simpler and more accessible for 260,000 organizations. Citrix products touch 75 percent  100% of the Fortune 100 and Fortune Global 100 of Internet users each day and it partners with use Citrix to deliver IT as an on-demand service more than 10,000 companies in 100 countries. Annual revenue in 2011 was US$2.21 billion.  75% of Internet users The workplace of the 21st century is  Year Founded: 1989 undergoing a remarkable transformation, driven in part by innovation in consumer  Employees' Choice - 50 Best Places to Work technology. People are increasingly bringing (Glassdoor, 2012) the smartphones, tablets and other devices  Top 50 Most Innovative Companies (Forbes, they use ubiquitously in their personal lives into the workplace and expecting the same kind 2011) of rich, self-service experience they have at  Top 10 Places to Work in Silicon Valley home. This "consumerization" is driving rapid change in business and IT, dissolving the lines (Workplace Dynamics, 2011_ between work and play, the office, home or  Top 25 Best Tech Companies to Work For anywhere in between. Today's "workplace" is no longer a building you go to; it's wherever (Business Insider, 2011) you find inspiration. 45
  • 47. About NOI Strategies NOI is a global services company Expert Consulting. that provides expert consulting, Established in 2002, NOI consists of the top experts in technology, and outsourcing commercial real estate business process and services to the world’s leading technologies. commercial real estate owners, operators, and investors. Our Technology Leadership. consultants have deep experience NOI maintains strong working knowledge and partnerships transforming real estate processes with all of the major software solution providers in our and applying technology to industry. improve operations: Operational Support Services. NOI has significant expertise in Customized to your operation, our exclusive blend of delivering state of the art activity domestic and offshore resources will help your company based work environments. From reduce non-core FTE, increase its depth of capability, and advice on technology to minimize technology overhead. organisational change NOI can Global Enterprise Capability. assist companies embarking on programs to deliver the workplace We provide services to global tier-one real estate of the future companies. 46

Notes de l'éditeur

  1. - leading with space - architects key- culture / how people want to work / project team / stakeholder interviews / what's wrong- technology to support this