SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
WHI T E PAP E R




                                     “Bring Your Own Computer” Program:
                                     6 Best Practices for Success

     Driven by the groundswell

      of demand for consumer

   technology like Apple Macs,

  “Bring Your Own Computer”

 (BYOC) programs are gaining

popularity with businesses. The

program provides a company’s

  employees with the flexibility

  to choose their device. Some

choose PCs. Many are choosing

  the Mac they already cherish

                 for personal use.



                                     SUMMARY
                                     Business users who love the Apple Mac are the “consumerizers” of technology
                                     in their firms. As loyal citizens of the company, they may use the one-size-fits-all
                                     approved desktop configured with Microsoft Windows. But each one dreams of
                                     ditching that device for a Mac or a better laptop.

                                     Driven by the groundswell of demand for consumer technology like Apple Macs,
                                     “Bring Your Own Computer” (BYOC) programs are gaining popularity with
                                     businesses. The program provides a company’s employees with the flexibility to
                                     choose their device. Some choose PCs. Many are choosing the Mac they already
                                     cherish for personal use.

                                     There are many valid reasons for choosing a Mac. Technologically, Macs are on
                                     par with, if not superior to, many Windows machines. Mac laptops also have a
                                     good battery life up to seven hours. Most importantly, Macs serve as a sleek
                                     accessory for the image-conscious executive who needs to project “latest
                                     and greatest” while wooing big clients.

                                     For these reasons, more organizations are beginning to o er BYOC programs.
                                     BYOC programs can be a huge benefit for both the employees and IT. Employees
                                     enjoy the flexibility of choosing the machine best suited to their needs, while
                                     companies benefit from happier executives and sta , and reduced hardware
                                     investment. In addition, if executed correctly BYOC can dramatically reduce IT
                                     administration and help desk costs.

                                     It is critical that su cient planning is done prior to implementation of these
                                     programs. On considering BYOC, your company will have questions about how
                                     to approach implementation. This guide describes the six best practices of
                                     BYOC for making this program a success in your organization.
             1
“Bring Your Own Computer” Program:
                                                                  6 Best Practices for Success




    1–CHOOSE APPROPRIATE DELIVERY MODEL
    When implementing BYOC, a key consideration is how to deliver identical services
    to multiple computing platforms. While there are many solutions in the market, a
    managed client based virtual machine is the most robust, flexible and cost e ective
    solution for BYOC. Since the image runs locally, it is available online or o ine, and
    requires little hardware or server infrastructure. The management wrapper further
    ensures the image can be centrally managed and updated.

    DELIVERY MODEL                   PROS                             CONS

    Port everything to the web       • Works with any device with     • Expensive and
    Convert all essential services     an Internet connection.          time-consuming
    to be web applications that                                         to convert.
    can be accessed from the                                          • Some applications cannot
    employee owned machine.                                             be converted to the web.
                                                                      • No offline access.

    Provide a remote desktop         • Can be accessed from           • Requires expensive
    Host employees’ corporate          many devices.                    back-end infrastructure.
    desktop in the cloud on a        • Can be centrally managed.      • Interactive applications do
    server using VDI (virtual                                           not work well in VDI or TS.
    desktop infrastructure)                                           • No offline access.
    or TS (Terminal Services).

    Provide virtualized              • Performance is good with       • May not work across both
    applications that run locally      local application execution.     Mac and PC.
    Distribute or stream             • Can be centrally managed.      • Virtual applications do
    virtualized applications to                                         not interoperate with
    employee owned device.                                              each other.
                                                                      • Some applications
                                                                        cannot be virtualized.
                                                                      • Weak security.


    Provide a managed                • Is centrally managed.          • None.
    corporate virtual machine        • Local execution provides
    to run locally                     great performance and
    Distribute corporate virtual       the ability to run online
    desktop directly to the            or o ine.
    employee owned machine           • OS virtualization provides
    using client virtualization.       security and platform
                                       independence.




2
“Bring Your Own Computer” Program:
                                                            6 Best Practices for Success




    2–CLEARLY DEFINE THE POLICIES FOR THE BYOC PROGRAM
    Articulation of policies will help guide success of a BYOC program. By specifying
    details in advance, your company can present a comprehensive, well-thought
    program that will be easy to understand and follow. Typically, a stipend model
    combined with a clearly defined minimum hardware support policy works the best.

    Here are typical policies to consider with BYOC:

    How will machines be acquired? Some programs direct users to buy machines
    from local retailers or through a corporate discount with an online retailer. A
    company can also fulfill BYOC by making the purchases through its own
    corporate acquisition process.

    Is there a stipend, and how much? While some companies require participants in
    BYOC to use their existing computer, others provide a stipend. The user would be
    free to add personal funds if they wanted to upgrade to a more powerful model.

    Which employees are eligible? Some BYOC programs are enterprise-wide; others
    specify eligibility, such as a minimum management level or pay grade.

    What are the minimum hardware specifications for a machine? The company
    must establish a baseline for running business applications at an acceptable level
    of performance. Once this baseline is established, the company should specify
    minimum system requirements (e.g. RAM, CPU and disk space).

    Any recommended or prohibited devices? The BYOC program will generate more
    enthusiasm by accepting as many types of devices as possible. This policy will be
    a ected by the program’s support policy and how the company implements
    program delivery (see “Delivery Model”).

    Who provides support? Policy should define if corporate IT provides hardware
    support, or if the employee must add a support package (like AppleCare) for
    their device. Policy should also specify the minimum level of the support package
    (such as response by “next business day”), and who will pay for the external
    support package.

    All policies should be clearly communicated to employees. Legal and tax
    implications are closely related to program policies.

    3–DISCUSS LEGAL ISSUES WITH CORPORATE COUNSEL
    Corporate counsel should consider factors in the BYOC program that would a ect
    a lawsuit or audit. A forensics analysis may require the company to gain control of
    particular computers in the possession of employees, contractors, or collaborators.
    For example:

    Who owns the hardware? If users own their devices, consider the use of a binding
    agreement that allows the company to meet potential obligations to auditors or
    the legal process. Consider solutions that provide tracking and containment of
    corporate data on the user device.

    Who owns data on the hardware? The agreement should specify which data are
    owned by the company versus user. For example, a partition such as a virtual
    machine would be owned by the company. Data and applications owned by
    users would go elsewhere on the hardware.

3
“Bring Your Own Computer” Program:
                                                                                               6 Best Practices for Success




                                       Statement on personal privacy. The company should clarify what it can and cannot
                                       see or access on the physical computer, and its commitment to privacy of personal
                                       use and data on the device. Users should be responsible for backing up their own
                                       data, as the company cannot be liable for its loss.


                                       4–CONSIDER TAX IMPLICATIONS TO
                                       BOTH THE USER AND THE COMPANY
                                       BYOC can a ect the company’s and employees’ tax responsibilities. The primary
                                       issue entails whether conveying all or even part of a physical device to an employee
7 Essentials for                       or contractor is a taxable event. Federal and/or state law may apply. For example:
Virtual Desktop Security               Does the recipient owe extra tax on the event? Users will be more enthusiastic
CHECK HOST SANITY                      about BYOC if they do not have to pay taxes on a new computer.
Check BYOC physical machine
for malware that can attack the        Does the company pay this tax for the recipient? If new taxes are due, users will
corporate VM. Each virtual desktop     be more enthusiastic about BYOC if the company pays those taxes.
is automatically scanned for malware
before device can be used.             If the recipient leaves the company and keeps the machine, does that constitute
VM ENCAPSULATION                       extra compensation? Policy should specify a user’s tax responsibility for separation
The VM is completely isolated from     from employment or contract.
and independent of the underlying
                                       Companies considering BYOC should consult their tax advisor to clarify these
physical computer.
                                       issues. Users also may be advised to consult their tax advisor.
VM ENCRYPTION
The VM supports strong encryption,
such as AES 128- or 256-bit.           5–NEGOTIATE SOFTWARE LICENSES
                                       BASED ON YOUR DELIVERY MODEL
ACTIVE DIRECTORY
INTEGRATION                            When using virtual desktops, the company may be required to pay for two software
VM supports AD credentials and         licenses unless the employee owns the device—one for the physical desktop, and
two-factor authentication, such as     one for the virtual machine. Licensing should be incorporated into multiyear
RSA SecurID and PKI.
                                       return-on-investment calculations for the BYOC program. For example:
GRANULAR SECURITY POLICIES
Address the entire organization or     What are the licensing considerations if the Virtual Machine runs on a server? If
target policies for di erent user      the user is running a Windows virtual environment on a server, VDA licenses are
groups.                                required in addition to the Microsoft OS license.
CENTRALIZED CONTROL OF
                                       What are the licensing considerations if the Virtual Machine runs on the endpoint?
SECURITY POLICIES
                                       If the user is running a Windows VM on top of an existing OS, only the only the
An administrator can revoke or kill
VMs running on any device.             Virtual Machine needs to be licensed by the corporation.
TAMPER RESISTANT CODE
Only authorized individuals can
                                       6–RE-ASSESS SECURITY AND NETWORK POLICIES
access, modify, or copy the VM         System security is the last major requirement for BYOC. Physical devices chosen by
image or metadata.
                                       end users are outside the reach of controls protecting the organization’s physical
                                       perimeter. So each device must be treated as “untrusted,” and subject to strict
                                       endpoint security measures. Regardless of the delivery model chosen, the BYOC
                                       machine should not be allowed to directly connect to the corporate network.
                                       One approach is to segment the network to create separate corporate and guest
                                       networks. The BYOC machines are allowed only on the guest network. Access to
                                       corporate resources can then be provided from within the secure virtual machine
                                       or through a VPN access point.




                   4
“Bring Your Own Computer” Program:
                                                                                             6 Best Practices for Success




                                     HOW MOKAFIVE IMPLEMENTS BYOC
                                     As you’ve seen, the key to a successful BYOC program is to enable flexibility on
                                     endpoint devices while protecting the corporate environment. MokaFive does this
                                     with desktop virtualization, but in a unique and di erent way from traditional
                                     server-based solutions. In essence, MokaFive moves the virtual machine o the
                                     server and onto each endpoint. Organizations get all the benefits of virtualization
                                     namely the ability to centrally manage but without the cost, complexity and the
                                     network needs of a server based virtual desktop solution.




C AS E    ST U DY

Major Silicon
Valley Law Firm
CHALLENGE
                                     A BETTER APPROACH
• Half of the lawyers wanted to
  use Macs, not PCs                  Simple to deploy, Simple to update
• Enable separate personal and
  corporate environments             With MokaFive, an IT administrator creates a “virtual golden image” of the enterprise
• Support mobile executives’         desktop, called LivePC, and uploads to their MokaFive server. LivePC golden images
  desktops across multiple           are delivered to MokaFive Player running on users’ devices. Updates applied to the
  platforms (Mac, PC, Linux)
                                     golden image are automatically distributed to all LivePCs. Users’ LivePCs are
SOLUTION                             bit-accurate copies of the golden image, so update success rates are significantly
• Deploy MokaFive directly on        higher. And no matter how many, how large, or how complex—updates get applied
  attorneys’ desktops, Mac or
                                     with a single reboot.
  PC hardware
• Single image across users in       Always secure
  the U.S. and China
• Users personalize desktops         MokaFive eliminates worry about infection from malware on users’ systems. The
  with applications                  enterprise golden image is virtualized and completely separated from the users’
BENEFITS                             hardware, applications, and data. More than 70 policy controls, such as encryption,
• Ease of management: single         personalization, and enterprise integration with features like AD and two-factor
  image for all mobile executives,   authentication servers, enable IT to easily implement enterprise security measures
  yet personalized by each user      and policies across all desktops.

                                     Users Keep Their Stu

                                     No longer will updates blow away users’ personal settings every time the enterprise
                                     desktop changes. Within the LivePC, user specific corporate applications, data, and
                                     settings are kept separate from the golden image and golden image updates. IT can
                                     maintain and update a single golden image yet provide customized experience for
                                     each user within their LivePC.




                   5
“Bring Your Own Computer” Program:
                                                                                                         6 Best Practices for Success




                                                One Total Package

                                                Unlike standalone client hypervisors, MokaFive incorporates a Type 2 client
                                                hypervisor (VMware Player, VMware Fusion, or Oracle VirtualBox) and wraps it
                                                with management capabilities. The Player runs on many platforms including Macs
                                                and PCs. The LivePC runs on top of MokaFive Player and is isolated well from the
                                                users’ machine. MokaFive will also o er a baremetal solution, which will allow
  “We’ve used MokaFive                          companies to use MokaFive management directly on corporate machines
      for more than two                         without having to manage and license a host OS.

           years. It lets us                    MokaFive is right for BYOC

     embrace consumer                           MokaFive provides the best of all worlds for a BYOC program. For the enterprise,
          technology and                        it enables total security and central control of all endpoints. The solution allows
                                                IT administrators to centrally create, deliver, secure and update a fully-contained
   personalization, while                       virtual desktop to every employee-owned computer. Robust endpoint security
        at the same time                        provided by MokaFive ensures that electronic corporate assets stay separate
     ensures a managed                          from personal applications and data. For the user, BYOC with MokaFive enables
                                                freedom to use and personalize whatever device they choose. These capabilities
    secure environment.
                                                provide the bedrock of a successful BYOC program.
        Bottom line: user
    satisfaction is higher                      LEARN MORE
           and my sta is                        By following these six best practices, companies will be prepared to avoid
         more e ective.”                        the potential speed bumps and road blocks of BYOC—and reap the benefits of
                                                more productivity, happier employees, and lower cost of IT operations. For more
                                Philip Hoare    information on creating a BYOC program or deploying virtual desktops, please
                          CIO, Wilson Sonsini
                           Goodrich & Rosati    email MokaFive at sales@mokafive.com or visit our website at www.mokafive.com.




MokaFive
475 Broadway Street, 2nd Floor
Redwood City, CA 94063
http://www.mokafive.com

MokaFive™, LivePC™, and the MokaFive
logo are trademarks of MokaFive, Inc. All
other product or company names may
be trademarks of their respective owners.

Revision: BYOCEWP1




                      6

Contenu connexe

Dernier

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

En vedette

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 

En vedette (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Bring Your Own Computer (BYOC) Program

  • 1. WHI T E PAP E R “Bring Your Own Computer” Program: 6 Best Practices for Success Driven by the groundswell of demand for consumer technology like Apple Macs, “Bring Your Own Computer” (BYOC) programs are gaining popularity with businesses. The program provides a company’s employees with the flexibility to choose their device. Some choose PCs. Many are choosing the Mac they already cherish for personal use. SUMMARY Business users who love the Apple Mac are the “consumerizers” of technology in their firms. As loyal citizens of the company, they may use the one-size-fits-all approved desktop configured with Microsoft Windows. But each one dreams of ditching that device for a Mac or a better laptop. Driven by the groundswell of demand for consumer technology like Apple Macs, “Bring Your Own Computer” (BYOC) programs are gaining popularity with businesses. The program provides a company’s employees with the flexibility to choose their device. Some choose PCs. Many are choosing the Mac they already cherish for personal use. There are many valid reasons for choosing a Mac. Technologically, Macs are on par with, if not superior to, many Windows machines. Mac laptops also have a good battery life up to seven hours. Most importantly, Macs serve as a sleek accessory for the image-conscious executive who needs to project “latest and greatest” while wooing big clients. For these reasons, more organizations are beginning to o er BYOC programs. BYOC programs can be a huge benefit for both the employees and IT. Employees enjoy the flexibility of choosing the machine best suited to their needs, while companies benefit from happier executives and sta , and reduced hardware investment. In addition, if executed correctly BYOC can dramatically reduce IT administration and help desk costs. It is critical that su cient planning is done prior to implementation of these programs. On considering BYOC, your company will have questions about how to approach implementation. This guide describes the six best practices of BYOC for making this program a success in your organization. 1
  • 2. “Bring Your Own Computer” Program: 6 Best Practices for Success 1–CHOOSE APPROPRIATE DELIVERY MODEL When implementing BYOC, a key consideration is how to deliver identical services to multiple computing platforms. While there are many solutions in the market, a managed client based virtual machine is the most robust, flexible and cost e ective solution for BYOC. Since the image runs locally, it is available online or o ine, and requires little hardware or server infrastructure. The management wrapper further ensures the image can be centrally managed and updated. DELIVERY MODEL PROS CONS Port everything to the web • Works with any device with • Expensive and Convert all essential services an Internet connection. time-consuming to be web applications that to convert. can be accessed from the • Some applications cannot employee owned machine. be converted to the web. • No offline access. Provide a remote desktop • Can be accessed from • Requires expensive Host employees’ corporate many devices. back-end infrastructure. desktop in the cloud on a • Can be centrally managed. • Interactive applications do server using VDI (virtual not work well in VDI or TS. desktop infrastructure) • No offline access. or TS (Terminal Services). Provide virtualized • Performance is good with • May not work across both applications that run locally local application execution. Mac and PC. Distribute or stream • Can be centrally managed. • Virtual applications do virtualized applications to not interoperate with employee owned device. each other. • Some applications cannot be virtualized. • Weak security. Provide a managed • Is centrally managed. • None. corporate virtual machine • Local execution provides to run locally great performance and Distribute corporate virtual the ability to run online desktop directly to the or o ine. employee owned machine • OS virtualization provides using client virtualization. security and platform independence. 2
  • 3. “Bring Your Own Computer” Program: 6 Best Practices for Success 2–CLEARLY DEFINE THE POLICIES FOR THE BYOC PROGRAM Articulation of policies will help guide success of a BYOC program. By specifying details in advance, your company can present a comprehensive, well-thought program that will be easy to understand and follow. Typically, a stipend model combined with a clearly defined minimum hardware support policy works the best. Here are typical policies to consider with BYOC: How will machines be acquired? Some programs direct users to buy machines from local retailers or through a corporate discount with an online retailer. A company can also fulfill BYOC by making the purchases through its own corporate acquisition process. Is there a stipend, and how much? While some companies require participants in BYOC to use their existing computer, others provide a stipend. The user would be free to add personal funds if they wanted to upgrade to a more powerful model. Which employees are eligible? Some BYOC programs are enterprise-wide; others specify eligibility, such as a minimum management level or pay grade. What are the minimum hardware specifications for a machine? The company must establish a baseline for running business applications at an acceptable level of performance. Once this baseline is established, the company should specify minimum system requirements (e.g. RAM, CPU and disk space). Any recommended or prohibited devices? The BYOC program will generate more enthusiasm by accepting as many types of devices as possible. This policy will be a ected by the program’s support policy and how the company implements program delivery (see “Delivery Model”). Who provides support? Policy should define if corporate IT provides hardware support, or if the employee must add a support package (like AppleCare) for their device. Policy should also specify the minimum level of the support package (such as response by “next business day”), and who will pay for the external support package. All policies should be clearly communicated to employees. Legal and tax implications are closely related to program policies. 3–DISCUSS LEGAL ISSUES WITH CORPORATE COUNSEL Corporate counsel should consider factors in the BYOC program that would a ect a lawsuit or audit. A forensics analysis may require the company to gain control of particular computers in the possession of employees, contractors, or collaborators. For example: Who owns the hardware? If users own their devices, consider the use of a binding agreement that allows the company to meet potential obligations to auditors or the legal process. Consider solutions that provide tracking and containment of corporate data on the user device. Who owns data on the hardware? The agreement should specify which data are owned by the company versus user. For example, a partition such as a virtual machine would be owned by the company. Data and applications owned by users would go elsewhere on the hardware. 3
  • 4. “Bring Your Own Computer” Program: 6 Best Practices for Success Statement on personal privacy. The company should clarify what it can and cannot see or access on the physical computer, and its commitment to privacy of personal use and data on the device. Users should be responsible for backing up their own data, as the company cannot be liable for its loss. 4–CONSIDER TAX IMPLICATIONS TO BOTH THE USER AND THE COMPANY BYOC can a ect the company’s and employees’ tax responsibilities. The primary issue entails whether conveying all or even part of a physical device to an employee 7 Essentials for or contractor is a taxable event. Federal and/or state law may apply. For example: Virtual Desktop Security Does the recipient owe extra tax on the event? Users will be more enthusiastic CHECK HOST SANITY about BYOC if they do not have to pay taxes on a new computer. Check BYOC physical machine for malware that can attack the Does the company pay this tax for the recipient? If new taxes are due, users will corporate VM. Each virtual desktop be more enthusiastic about BYOC if the company pays those taxes. is automatically scanned for malware before device can be used. If the recipient leaves the company and keeps the machine, does that constitute VM ENCAPSULATION extra compensation? Policy should specify a user’s tax responsibility for separation The VM is completely isolated from from employment or contract. and independent of the underlying Companies considering BYOC should consult their tax advisor to clarify these physical computer. issues. Users also may be advised to consult their tax advisor. VM ENCRYPTION The VM supports strong encryption, such as AES 128- or 256-bit. 5–NEGOTIATE SOFTWARE LICENSES BASED ON YOUR DELIVERY MODEL ACTIVE DIRECTORY INTEGRATION When using virtual desktops, the company may be required to pay for two software VM supports AD credentials and licenses unless the employee owns the device—one for the physical desktop, and two-factor authentication, such as one for the virtual machine. Licensing should be incorporated into multiyear RSA SecurID and PKI. return-on-investment calculations for the BYOC program. For example: GRANULAR SECURITY POLICIES Address the entire organization or What are the licensing considerations if the Virtual Machine runs on a server? If target policies for di erent user the user is running a Windows virtual environment on a server, VDA licenses are groups. required in addition to the Microsoft OS license. CENTRALIZED CONTROL OF What are the licensing considerations if the Virtual Machine runs on the endpoint? SECURITY POLICIES If the user is running a Windows VM on top of an existing OS, only the only the An administrator can revoke or kill VMs running on any device. Virtual Machine needs to be licensed by the corporation. TAMPER RESISTANT CODE Only authorized individuals can 6–RE-ASSESS SECURITY AND NETWORK POLICIES access, modify, or copy the VM System security is the last major requirement for BYOC. Physical devices chosen by image or metadata. end users are outside the reach of controls protecting the organization’s physical perimeter. So each device must be treated as “untrusted,” and subject to strict endpoint security measures. Regardless of the delivery model chosen, the BYOC machine should not be allowed to directly connect to the corporate network. One approach is to segment the network to create separate corporate and guest networks. The BYOC machines are allowed only on the guest network. Access to corporate resources can then be provided from within the secure virtual machine or through a VPN access point. 4
  • 5. “Bring Your Own Computer” Program: 6 Best Practices for Success HOW MOKAFIVE IMPLEMENTS BYOC As you’ve seen, the key to a successful BYOC program is to enable flexibility on endpoint devices while protecting the corporate environment. MokaFive does this with desktop virtualization, but in a unique and di erent way from traditional server-based solutions. In essence, MokaFive moves the virtual machine o the server and onto each endpoint. Organizations get all the benefits of virtualization namely the ability to centrally manage but without the cost, complexity and the network needs of a server based virtual desktop solution. C AS E ST U DY Major Silicon Valley Law Firm CHALLENGE A BETTER APPROACH • Half of the lawyers wanted to use Macs, not PCs Simple to deploy, Simple to update • Enable separate personal and corporate environments With MokaFive, an IT administrator creates a “virtual golden image” of the enterprise • Support mobile executives’ desktop, called LivePC, and uploads to their MokaFive server. LivePC golden images desktops across multiple are delivered to MokaFive Player running on users’ devices. Updates applied to the platforms (Mac, PC, Linux) golden image are automatically distributed to all LivePCs. Users’ LivePCs are SOLUTION bit-accurate copies of the golden image, so update success rates are significantly • Deploy MokaFive directly on higher. And no matter how many, how large, or how complex—updates get applied attorneys’ desktops, Mac or with a single reboot. PC hardware • Single image across users in Always secure the U.S. and China • Users personalize desktops MokaFive eliminates worry about infection from malware on users’ systems. The with applications enterprise golden image is virtualized and completely separated from the users’ BENEFITS hardware, applications, and data. More than 70 policy controls, such as encryption, • Ease of management: single personalization, and enterprise integration with features like AD and two-factor image for all mobile executives, authentication servers, enable IT to easily implement enterprise security measures yet personalized by each user and policies across all desktops. Users Keep Their Stu No longer will updates blow away users’ personal settings every time the enterprise desktop changes. Within the LivePC, user specific corporate applications, data, and settings are kept separate from the golden image and golden image updates. IT can maintain and update a single golden image yet provide customized experience for each user within their LivePC. 5
  • 6. “Bring Your Own Computer” Program: 6 Best Practices for Success One Total Package Unlike standalone client hypervisors, MokaFive incorporates a Type 2 client hypervisor (VMware Player, VMware Fusion, or Oracle VirtualBox) and wraps it with management capabilities. The Player runs on many platforms including Macs and PCs. The LivePC runs on top of MokaFive Player and is isolated well from the users’ machine. MokaFive will also o er a baremetal solution, which will allow “We’ve used MokaFive companies to use MokaFive management directly on corporate machines for more than two without having to manage and license a host OS. years. It lets us MokaFive is right for BYOC embrace consumer MokaFive provides the best of all worlds for a BYOC program. For the enterprise, technology and it enables total security and central control of all endpoints. The solution allows IT administrators to centrally create, deliver, secure and update a fully-contained personalization, while virtual desktop to every employee-owned computer. Robust endpoint security at the same time provided by MokaFive ensures that electronic corporate assets stay separate ensures a managed from personal applications and data. For the user, BYOC with MokaFive enables freedom to use and personalize whatever device they choose. These capabilities secure environment. provide the bedrock of a successful BYOC program. Bottom line: user satisfaction is higher LEARN MORE and my sta is By following these six best practices, companies will be prepared to avoid more e ective.” the potential speed bumps and road blocks of BYOC—and reap the benefits of more productivity, happier employees, and lower cost of IT operations. For more Philip Hoare information on creating a BYOC program or deploying virtual desktops, please CIO, Wilson Sonsini Goodrich & Rosati email MokaFive at sales@mokafive.com or visit our website at www.mokafive.com. MokaFive 475 Broadway Street, 2nd Floor Redwood City, CA 94063 http://www.mokafive.com MokaFive™, LivePC™, and the MokaFive logo are trademarks of MokaFive, Inc. All other product or company names may be trademarks of their respective owners. Revision: BYOCEWP1 6