Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
2. INTRODUCTION
Eric Alfaro is the Chief Information Officer
of Modis, and Modis’s parent company,
Adecco Group North America.
Adecco Group is the world’s largest
recruitment and workforce solutions
provider. Eric’s team in North America
delivers technology enabled business
solutions and services to over 800 Adecco
locations and 8000 Adecco employees in
North America.
2
3. AGENDA
• Definition: BYOD
• BYOD – More Than a Trend, It’s a Shift
• Why implement a BYOD strategy?
• Best Practices in a Successful BYOD Program
• Downsides to BYOD and solutions
3
4. WHAT IS BYOD?
BYOD or Bring Your Own Device is becoming the norm among employees
and employers alike. It refers to the policy of allowing employees to
purchase and integrate their own devices into a corporate operating
environment. The most common devices are laptops, smartphones and
tablets.
While businesses benefit by having up-to-date and connected employees,
IT departments often find it difficult to balance changing technology
landscapes with requirements to manage and support a homogenous
environment.
BYOD also means dealing with new security concerns and a shift to
empowered employee computing.
4
5. HOW BIG IS BYOD?
• BYOD is a prominent component of the “Consumerization of IT” and
is rapidly changing the way IT delivers services and support.
• Client virtualization products (e.g. Citrix) are mainstream solutions for
securely deploying business applications to multiple end user devices,
and Internet standards (HTML5) mean multi-device support is closer.
• In a 2012 survey of 600 businesses, Cisco found that 95 percent
allowed their employees to BYOD in some form. An example of this
would be secure access to corporate email services from a BYOD,
which is the most common service provided.
• Of those companies, many also provided technical support for the
devices.
• 36% of respondents provided support across all devices and
platforms.
5
Source: 2012 Cisco IBSG Horizons Study
6. BYOD TOUCHES IT, HR, SOURCING, …
Empowered
Employees
6
Security of Business
Data
User Requirements
and Populations
IT Support
Capabilities
Cost Management
Continuous Mobile
Device Technology
Evolution
HR and Business
Policies
Employee IT
Procurement
HR
Sourcing
Sourcing
7. THE BENEFITS OF BYOD FOR COMPANIES
7
• BYOD enhances employee productivity. It allows for immediate access
to work when away from the office, during commutes, while traveling,
and during down-time. The costs of delivering a solution should be
measured against increase in employee productivity. Industry reports an
average $300 to $1,300, which would depend on your measurement.
• Employees are much more likely to protect and care for their own
devices. This equates to decreased expenditures due to damaged or
stolen devices and data loss.
• Device ownership costs such as initial set-up, maintenance, insurance,
and data plans are shifted to the employee rather than the employer.
• For Gens Y and Z, 50% are using these technologies at home (and
expecting them in the office).
8. BENEFITS OF BYOD FOR EMPLOYEES
• Efficiency: Carrying a single device is preferable to carrying
multiple devices.
• An employee’s device can be used for personal purposes so they’ll
be able to save settings and documents on a single phone, laptop,
or tablet.
• Employees can control which devices they want. This allows them
to choose the technology that best suits their needs while also
guaranteeing them the freedom to upgrade and purchase devices
on their own timeline.
9. IMPLEMENTING – BEST PRACTICES
1. Understand your customers and operating environment
2. Prioritize deployment of BYOD services
3. Make support processes simple and clear
4. Communicate!
9
10. TECHNOLOGY AND BYOD AT MODIS
• How similar is Modis to your business?
• Our workforce is technology driven and a large segment is comfortable
with minimal technology support – a good starting point for BYOD
services
10
43%
60%
67%
0% 20% 40% 60% 80%
I'm comfortable using technology
with little or no help
I like technology
Technology is important to me
11. UNDERSTAND YOUR CUSTOMERS AND
OPERATING ENVIRONMENT
• What populations of IT consumers exist in your business?
• Where do they work? How technology savvy are they?
• What applications do they use? What type of data do they
access?
• What does it cost to support them?
• What BYOD capabilities do your IT enterprise management tools
have?
• What corporate policies are relevant?
11
12. WHERE TO START – WHAT’S HOT WITH YOUR
CUSTOMERS?
• In the Modis environment, Tablets and Phones account for majority of
BYOD devices, which is where our current strategy is focused
• The complexity of desktop applications and security requirements has
made widespread laptop and desktop BYOD too costly
• Consider Tiered services, rather than “One Size Fits All”
• Products like Citrix and
Web delivery methods
are making application
portability more viable
on common computing
devices
12
91%
79%
12%
8%
1%
7%
9%
4%
3%
3%
2%
2%
84%
89%
96%
Desktop
Laptop/Notebook
Smartphone
Standard Mobile
Phone
Tablet
Company Device Ownership
Company Company &Personal Personal
13. MAKING BYOD WORK: WHAT APPLICATIONS DO
YOUR EMPLOYEES NEED?
• Not all applications work well across all BYOD devices
• Ensure the applications your employees need will meet performance and
ease of use expectations
• Consider starting with basics: Email, Calendar, Web
• Modis workforce relies heavily on
collaboration applications, most
of which run well on mobile,
tablet, and laptop devices
• Now is the time to start planning for
future applications can be used with BYOD
13
51%
53%
54%
59%
96%
99%
0% 20% 40% 60% 80% 100% 120%
Presentations
Web Meetings
Instant Messaging
Social Media
Calendar
Email
14. PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS
• Consider value vs. cost / effort / risk for different BYOD features
o Trap: Supporting BYOD like traditional internal IT systems
o Check: Most modern solutions include web access. Upgrading an old
application might get you BYOD access out of the box
• Engage your Legal, Risk Management, and Sourcing /
Procurement function(s) for guidance
• Think incrementally as you deploy features
• Test the most widely use device / technologies and VIPs
• Stick to mainstream BYOD-friendly applications if you can
• Expect challenges14
15. • Get right level of business and management sponsorship for
success
• Make BYOD program clear and align support methods with self-
service tenants
• Include BYOD survey items in your IT satisfaction surveys and IT
cost metrics
• Create employee Evangelist teams with access to news on
“what’s next” to drive demand
15
COMMUNICATE!
16. DOWNSIDE OF BYOD FOR COMPANIES
16
• Employee owned devices doesn’t translate to no cost for companies
Ensure you consider TCO – total cost of ownership
• Device types change almost daily
Identify essential version and interface requirements
• Sensitive and protected data can pose a security risk
Have this discussion with your Risk, Legal, or Data Protection resource prior to
BYOD implementation
• For IT leaders it’s difficult to explain the time, effort and expense issues
surrounding BYOD to business leaders
If you are already doing IT cost tracking, include BYOD from day one
17. DOWNSIDE OF BYOD FOR EMPLOYEES
17
• It can be costly to own and maintain a device
Consider an exception policy for employees who are unable to get a
device, but need one
• It may be necessary to purchase a more expensive data plan to
accommodate the larger volume of communications
Think through how you’ll break out person vs. company data use
• Employees may have difficulty “disconnecting” and having
downtime
Work – Life balance is a key satisfaction point for most employees
• When accessing the company’s network an employee may be
unwittingly exposing personal information, passwords and browsing
history
Acceptable use policy
• In some situations an employee may be forced to relinquish the
device so that it may be cleaned of company data
Communicate and help VIPs
18. THE BOTTOM LINE ON BYOD
• Understand what problem(s) you’re solving
• Consider the total cost of BYOD, including a reimbursement policy
• Plan comprehensively; it’s hard to “put the genie back in the bottle”
• Be incremental in your approach to features and services to limit
deployment risk and help users adjust to support
• Communicate!
• Review or update your security incident response processes
18
Contact info is only available for 1st level connections. This includes an email address and a phone number if it’s been entered in the “Contact Settings”ORFor members who have posted contact info in their profiles aka “open networkers”