SlideShare une entreprise Scribd logo
1  sur  15
BYOD: WHAT EVERY CFO NEEDS TO 
KNOW
Kirill Bensonoff, ComputerSupport.com 
o Founding partner at ComputerSupport.com 
o 15 years technology experience – datacenter, enterprise IT, 
SMB IT, cloud 
o Publish annual State of The Cloud Report 
FEI BYOD PRESENTATION| 2
Question? 
Do YOU want your Blackberry back? 
FEI BYOD PRESENTATION | 3
What is BYOD? 
FEI BYOD PRESENTATION | 4
What is BYOD? 
Bring your own device (BYOD) is an strategy for allowing 
employees, business partners and others to utilize a 
personally selected and purchased device to execute 
enterprise applications and access data. 
FEI BYOD PRESENTATION | 5
Mobile is no longer news, its reality 
FEI BYOD PRESENTATION | 6
What is driving BYOD? 
FEI BYOD PRESENTATION| 7 
LinkedIn BYOD 
Mobile Security 
Report
Driving The Nexus of Forces Demand 
June 2014 
FEI/Gartner 
survey 
FEI BYOD PRESENTATION| 8
24% of companies have already fully 
adopted BYOD 
FEI BYOD PRESENTATION| 9 
LinkedIn BYOD 
Mobile Security 
Report
Email and Calendar are the most popular 
apps on BYOD devices 
FEI BYOD PRESENTATION| 10 
LinkedIn BYOD 
Mobile Security 
Report
To BYOD or CYOD? 
Bring Your Own Device Choose Your Own Device 
FEI BYOD PRESENTATION| 11 
BYOD & CYOD
Which Are You? 
Bring Your Own Device Choose Your Own Device 
FEI BYOD PRESENTATION| 12 
BYOD & CYOD 
highly paid executives may 
prefer to use their own 
device 
while new joiners may be 
likelier to choose a company 
device
BYOD Challenges 
FEI BYOD PRESENTATION| 13 
o Security 
o 1 in 3 devices have no password protection 
o Less then 30% have Mobile Device Management enabled 
o Less then 10% of companies are aware what devices are 
accessing their network 
o Support 
o 50% of the device support time is spent supporting the C-suite
A Sound Mobile Device Strategy 
• Determine whether to adopt guidelines, a policy, an 
agreement, or some other means for BYOD program 
communication and compliance 
• Ensure that policies make clear that employees have no 
reasonable expectation of privacy 
• Require employees to provide affirmative consent to the 
BYOD policy either with electronic or paper acceptance 
• Determine whether employer will provide support for personal 
devices or if support will be handled by device vendor 
• Require employees to immediately report stolen/lost mobile 
devices, so that devices can be remotely wiped 
• Clearly state guidance on the use of cloud-based storage 
system to store company confidential information 
• Institute a Mobile Device Management software and service 
FEI BYOD PRESENTATION|14
YOUR IT 
 ITAnyWhere Managed - proactive IT support 
 ITAnyWhere Cloud - turnkey cloud services 
 ITAnyWhere Pro - Consulting and professional services 
ComputerSupport.com 
Kirill Bensonoff 
kb@computersupport.com 
YOUR IT

Contenu connexe

Tendances

Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Etisalat Digital Services
Etisalat Digital ServicesEtisalat Digital Services
Etisalat Digital ServicesGrafic.guru
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTAlcatel-Lucent Enterprise
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Alliance
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without PasswordsFIDO Alliance
 
ELIDZ Presentation: The Internet Economy in Africa
ELIDZ Presentation: The Internet Economy in AfricaELIDZ Presentation: The Internet Economy in Africa
ELIDZ Presentation: The Internet Economy in AfricaAndile Ngcaba
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Francisco Maroto
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09scharter
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentationcummins1
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionAlan Quayle
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyAlan Quayle
 
Innovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dustInnovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dustThibault Cantegrel
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyAlcatel-Lucent Enterprise
 

Tendances (20)

BYOD: UniBox
BYOD: UniBoxBYOD: UniBox
BYOD: UniBox
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Etisalat Digital Services
Etisalat Digital ServicesEtisalat Digital Services
Etisalat Digital Services
 
Wp byod
Wp byodWp byod
Wp byod
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoT
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory Landscape
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Cloud Adoption Trends
Cloud Adoption TrendsCloud Adoption Trends
Cloud Adoption Trends
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
 
ELIDZ Presentation: The Internet Economy in Africa
ELIDZ Presentation: The Internet Economy in AfricaELIDZ Presentation: The Internet Economy in Africa
ELIDZ Presentation: The Internet Economy in Africa
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
 
F-Secure Corporation
F-Secure CorporationF-Secure Corporation
F-Secure Corporation
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
 
Innovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dustInnovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dust
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application Fluency
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 

Similaire à BYOD - What Every CFO Needs To Know

Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016AGILLY
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
UnifiedCommunication
UnifiedCommunicationUnifiedCommunication
UnifiedCommunicationEmma Alsop
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 

Similaire à BYOD - What Every CFO Needs To Know (20)

Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
BYOD
BYODBYOD
BYOD
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Byod
ByodByod
Byod
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
UnifiedCommunication
UnifiedCommunicationUnifiedCommunication
UnifiedCommunication
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 

Dernier

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 

Dernier (20)

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 

BYOD - What Every CFO Needs To Know

  • 1. BYOD: WHAT EVERY CFO NEEDS TO KNOW
  • 2. Kirill Bensonoff, ComputerSupport.com o Founding partner at ComputerSupport.com o 15 years technology experience – datacenter, enterprise IT, SMB IT, cloud o Publish annual State of The Cloud Report FEI BYOD PRESENTATION| 2
  • 3. Question? Do YOU want your Blackberry back? FEI BYOD PRESENTATION | 3
  • 4. What is BYOD? FEI BYOD PRESENTATION | 4
  • 5. What is BYOD? Bring your own device (BYOD) is an strategy for allowing employees, business partners and others to utilize a personally selected and purchased device to execute enterprise applications and access data. FEI BYOD PRESENTATION | 5
  • 6. Mobile is no longer news, its reality FEI BYOD PRESENTATION | 6
  • 7. What is driving BYOD? FEI BYOD PRESENTATION| 7 LinkedIn BYOD Mobile Security Report
  • 8. Driving The Nexus of Forces Demand June 2014 FEI/Gartner survey FEI BYOD PRESENTATION| 8
  • 9. 24% of companies have already fully adopted BYOD FEI BYOD PRESENTATION| 9 LinkedIn BYOD Mobile Security Report
  • 10. Email and Calendar are the most popular apps on BYOD devices FEI BYOD PRESENTATION| 10 LinkedIn BYOD Mobile Security Report
  • 11. To BYOD or CYOD? Bring Your Own Device Choose Your Own Device FEI BYOD PRESENTATION| 11 BYOD & CYOD
  • 12. Which Are You? Bring Your Own Device Choose Your Own Device FEI BYOD PRESENTATION| 12 BYOD & CYOD highly paid executives may prefer to use their own device while new joiners may be likelier to choose a company device
  • 13. BYOD Challenges FEI BYOD PRESENTATION| 13 o Security o 1 in 3 devices have no password protection o Less then 30% have Mobile Device Management enabled o Less then 10% of companies are aware what devices are accessing their network o Support o 50% of the device support time is spent supporting the C-suite
  • 14. A Sound Mobile Device Strategy • Determine whether to adopt guidelines, a policy, an agreement, or some other means for BYOD program communication and compliance • Ensure that policies make clear that employees have no reasonable expectation of privacy • Require employees to provide affirmative consent to the BYOD policy either with electronic or paper acceptance • Determine whether employer will provide support for personal devices or if support will be handled by device vendor • Require employees to immediately report stolen/lost mobile devices, so that devices can be remotely wiped • Clearly state guidance on the use of cloud-based storage system to store company confidential information • Institute a Mobile Device Management software and service FEI BYOD PRESENTATION|14
  • 15. YOUR IT  ITAnyWhere Managed - proactive IT support  ITAnyWhere Cloud - turnkey cloud services  ITAnyWhere Pro - Consulting and professional services ComputerSupport.com Kirill Bensonoff kb@computersupport.com YOUR IT