SlideShare une entreprise Scribd logo
1  sur  18
Preparing an Effective BYOD or
Mobility Strategy
Martin Lindeman
Solution Architect
Agenda
1. Intro - What Are The Benefits?
2. Do You Need a Strategy?
3. Creating a BYOD Strategy
4. Questions
2
What is ‘Bring Your Own Device’?
3
 Bring Your Own Device enables end users to securely
use devices they choose to increase their productivity
and mobility
 These can be devices purchased by the employer, the
employee, contractors, suppliers
“BYOD means any device, with any
ownership, used anywhere”
BYOD Mobility Landscape
4
Smartphones and
Tablets
Two year mobile device growth rate is 102%
Platform
June
2010
June
2011
June
2012
iPhone 3,554 16,857 23,258
iPad 150 5,418 10,779
BlackBerry 14,802 14,233 9,724
Android 40 3,526 6,592
Others 7,005 1,406 1,010
Total 25,401 41,440 51,363
19% 45%
21%
13%
Win – Win
BYOD Delivers Benefits to Employees and the Enterprise
5
 Employees get greater control of their work
experience through choice of device
 75% of IT execs report that allowing employees to bring
consumer devices to work has increased employee
morale
1
 Employers get a more productive workforce and lower
costs
 72% of IT execs say that employees who bring consumer
devices into the workplace are more productive
1
 Annual benefits from BYOD to enterprises ranges from $300
to $1,300 per employee depending on job role
2
1. 2011 IDC Consumerization of IT Study
2. 2012 Cisco IBSG Horizons Study
Do You Need a Strategy?
This is What We are Facing
7
Reduce Security Risk
Improve End-User
Productivity Increase Operation Efficiencies
 Over 15 billion devices by
2015, with average worker
with 3 devices
 New workspace:
anywhere, anytime
 71% of Gen Y workforce
do not obey policies
 60% will download sensitive
data on a personal device
End – User Behaviours IT Trends
 Must control the multiple
devices and guests
 Security: Top concern for
BYOD
 Mobile malware quadrupled
(from 2010 to 2012)
 IT consumed with network
fragmentation
The BYOD Spectrum
8
Denied or
Restricted
Allowed Encouraged Mandated
Environment requires
tight control:
Corp Only Device
Mfg Environment
Trading Floor
Classified Gov Networks
Traditional Enterprise
Focus on basic
services, easy access,
almost anybody
Broader Device Types But
Internet Only
Edu Environment
Public Institutions
Simple Guest
Enable differentiated
services, on-boarding
with security but no
ownership
Multiple Device Types +
Access Methods, VDI
Healthcare
Early BYOD Enterprise
Adopters
Contractors
Corp native apps, new
services, full control
Multiple Device Types
Corp Issued, MDM
Innovative Enterprises
Retail on Demand
Mobile Sales Service
(Video, Collaboration, etc)
Creating a Desktop BYOD
Strategy
Five Steps to Create a BYOD Strategy
10
Step 1
Develop a
Business
Plan
Step 2
Segment the
Workforce
Step 3
Create a
Service
Strategy
Step 4
Define the
Policy
Step 5
Develop
User
Support
Model
Step 1: Developing a Business Case
Calculate an ROI for multiple scenarios
11
Operating Cost
Potential
Savings
Return on
Investment
Current TCO
Upfront
Investment
 Calculate the
Total Cost of
Ownership for
existing fleet
 Include OS,
Software,
Hardware,
Security, Asset
Management,
Support,
Storage, Lost
& Stolen
Devices
 Add the upfront
investment
required to
move to BYOD
 Include VDI,
licensing,
software &
content
virtualisation,
infrastructure,
resource costs
 Add the ongoing
costs of a BYOD
program
 Include all
incremental
costs to deliver
BYOD
 Include tax
implications of
any employee
allowance
 Subtract the
savings that can
be generated in
each TCO line
item through
BYOD
 Include savings
generated by
retiring old
services
 Calculate
potential ROI
then adjust the
elements of your
strategy to
model multiple
scenarios
 Model different
scope, timing,
employee
entitlements
Step 2: Workforce Segmentation
12
Work
Styles
Workstation
Anchored
Local
Collaborator
Remote WorkerHighly Mobile
Offsite External
 Select some key dimensions
to segment the workforce
(e.g. 'need for mobility‟ &
„need for support‟)
 Group users based on
common “work styles”
regardless of role and
department
 Identify common use cases
that apply to each set of
users
Step 3: Creating a Service Strategy
Map Workforce Segments to Planned Service Offerings
13
Corporate
Laptop
VDI
End Point
Mobile
Device
Non-Corp
Laptop
Workstation
Anchored
Local
Collaborator
Remote
Worker
Highly
Mobile
Offsite
External
Prioritise Use Cases for
Implementation
Step 4: Defining the Policy
BYOD Policy Design
14
 Designing the right policies is critical to controlling
costs - 86% of BYOD costs are non-device-
related
1
 IT should drive the policy design however buy-in
needed from HR, Finance, Tax, Legal, and
Corporate Security
 Policy must define minimum acceptable standards
for Hardware, Operating System, and Security
software
 A clear entitlement policy is necessary to ensure
the right tools and services are offered to the right
users for the right cost
 Rules of Use are necessary to set clear
expectations around user behaviours
15
Corporate Rules of Use
1) Allows Business to remotely
wipe the device
2) Requires an acceptable
password and 10 minute
timeout
3) Require users to immediately
report a lost or stolen
device.
 All users must accept rules
of use when signing up for
service
 Trade off between
employee trust and IT
control
 There is no IT jargon – the
rules are simple for end-
users to understand
Step 4: Defining the Policy
BYOD Rules of Use
16
Corporate Policies
 Service
Entitlement
 Rules of Use
 Device Purchase
Local Directives
• Geography
• Business
Functions
Approvals
 MD for Policy
Variations
 Manager for
Individual Liable
 Employee for Self
Support
Agreement
Step 4: Defining the Policy
BYOD Policy Implementation
17
 BYOD without a corresponding strategy
generates more work for IT – 80% of IT
respondents had increased support
workloads from consumerisation
1
 IT budgets are not scaling at the same rate
 A new support model is required:
 IT supports connectivity problems and
issues with the corporate applications
and the operating system
 Hardware support provided by device
manufacture or user
 Community support forums for
knowledge sharing and best practices
Step 5: Developing a User Support Model
Designing a Support Model
1. 2011 IDC Consumerization of IT Study
Conclusions
Key Takeaways
18
1. BYOD is happening - with or without IT
2. Position IT as an enabler - not a barrier
3. Leverage the BYOD trend and target high value use cases
4. Test the waters first before wide-scale deployment
5. Find your right balance between security and client experience
6. Leverage the latest tools out there: eg) MDM and Posture Assessment

Contenu connexe

Tendances

Tendances (20)

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Wp byod
Wp byodWp byod
Wp byod
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

Similaire à Preparing an Effective BYOD or Mobility Strategy

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 

Similaire à Preparing an Effective BYOD or Mobility Strategy (20)

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the Cloud
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To Know
 
BYOD
BYODBYOD
BYOD
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
8 Steps to a Successful Mobile Device Program
8 Steps to a Successful Mobile Device Program 8 Steps to a Successful Mobile Device Program
8 Steps to a Successful Mobile Device Program
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Microsoft's Approach to IoT
Microsoft's Approach to IoT Microsoft's Approach to IoT
Microsoft's Approach to IoT
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 

Plus de Logicalis Australia

Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Australia
 

Plus de Logicalis Australia (14)

Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to Completion
 
Cloud – from Conception to Completion
Cloud – from Conception to CompletionCloud – from Conception to Completion
Cloud – from Conception to Completion
 
Six Steps to Private Cloud
Six Steps to Private CloudSix Steps to Private Cloud
Six Steps to Private Cloud
 
Logicalis Cloud Briefing
Logicalis Cloud BriefingLogicalis Cloud Briefing
Logicalis Cloud Briefing
 
Capturing The New Normal
Capturing The New NormalCapturing The New Normal
Capturing The New Normal
 
Three perspective on migrating to Cloud
Three perspective on migrating to CloudThree perspective on migrating to Cloud
Three perspective on migrating to Cloud
 
Enable flexible working
Enable flexible workingEnable flexible working
Enable flexible working
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
IPv6: Why Should You Care?
IPv6: Why Should You Care?IPv6: Why Should You Care?
IPv6: Why Should You Care?
 
Cisco UCS Briefing
Cisco UCS BriefingCisco UCS Briefing
Cisco UCS Briefing
 
Tomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business BriefingTomorrow's Workplace: Logicalis Business Briefing
Tomorrow's Workplace: Logicalis Business Briefing
 
Enable Tomorrow's Workplace
Enable Tomorrow's WorkplaceEnable Tomorrow's Workplace
Enable Tomorrow's Workplace
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Preparing an Effective BYOD or Mobility Strategy

  • 1. Preparing an Effective BYOD or Mobility Strategy Martin Lindeman Solution Architect
  • 2. Agenda 1. Intro - What Are The Benefits? 2. Do You Need a Strategy? 3. Creating a BYOD Strategy 4. Questions 2
  • 3. What is ‘Bring Your Own Device’? 3  Bring Your Own Device enables end users to securely use devices they choose to increase their productivity and mobility  These can be devices purchased by the employer, the employee, contractors, suppliers “BYOD means any device, with any ownership, used anywhere”
  • 4. BYOD Mobility Landscape 4 Smartphones and Tablets Two year mobile device growth rate is 102% Platform June 2010 June 2011 June 2012 iPhone 3,554 16,857 23,258 iPad 150 5,418 10,779 BlackBerry 14,802 14,233 9,724 Android 40 3,526 6,592 Others 7,005 1,406 1,010 Total 25,401 41,440 51,363 19% 45% 21% 13%
  • 5. Win – Win BYOD Delivers Benefits to Employees and the Enterprise 5  Employees get greater control of their work experience through choice of device  75% of IT execs report that allowing employees to bring consumer devices to work has increased employee morale 1  Employers get a more productive workforce and lower costs  72% of IT execs say that employees who bring consumer devices into the workplace are more productive 1  Annual benefits from BYOD to enterprises ranges from $300 to $1,300 per employee depending on job role 2 1. 2011 IDC Consumerization of IT Study 2. 2012 Cisco IBSG Horizons Study
  • 6. Do You Need a Strategy?
  • 7. This is What We are Facing 7 Reduce Security Risk Improve End-User Productivity Increase Operation Efficiencies  Over 15 billion devices by 2015, with average worker with 3 devices  New workspace: anywhere, anytime  71% of Gen Y workforce do not obey policies  60% will download sensitive data on a personal device End – User Behaviours IT Trends  Must control the multiple devices and guests  Security: Top concern for BYOD  Mobile malware quadrupled (from 2010 to 2012)  IT consumed with network fragmentation
  • 8. The BYOD Spectrum 8 Denied or Restricted Allowed Encouraged Mandated Environment requires tight control: Corp Only Device Mfg Environment Trading Floor Classified Gov Networks Traditional Enterprise Focus on basic services, easy access, almost anybody Broader Device Types But Internet Only Edu Environment Public Institutions Simple Guest Enable differentiated services, on-boarding with security but no ownership Multiple Device Types + Access Methods, VDI Healthcare Early BYOD Enterprise Adopters Contractors Corp native apps, new services, full control Multiple Device Types Corp Issued, MDM Innovative Enterprises Retail on Demand Mobile Sales Service (Video, Collaboration, etc)
  • 9. Creating a Desktop BYOD Strategy
  • 10. Five Steps to Create a BYOD Strategy 10 Step 1 Develop a Business Plan Step 2 Segment the Workforce Step 3 Create a Service Strategy Step 4 Define the Policy Step 5 Develop User Support Model
  • 11. Step 1: Developing a Business Case Calculate an ROI for multiple scenarios 11 Operating Cost Potential Savings Return on Investment Current TCO Upfront Investment  Calculate the Total Cost of Ownership for existing fleet  Include OS, Software, Hardware, Security, Asset Management, Support, Storage, Lost & Stolen Devices  Add the upfront investment required to move to BYOD  Include VDI, licensing, software & content virtualisation, infrastructure, resource costs  Add the ongoing costs of a BYOD program  Include all incremental costs to deliver BYOD  Include tax implications of any employee allowance  Subtract the savings that can be generated in each TCO line item through BYOD  Include savings generated by retiring old services  Calculate potential ROI then adjust the elements of your strategy to model multiple scenarios  Model different scope, timing, employee entitlements
  • 12. Step 2: Workforce Segmentation 12 Work Styles Workstation Anchored Local Collaborator Remote WorkerHighly Mobile Offsite External  Select some key dimensions to segment the workforce (e.g. 'need for mobility‟ & „need for support‟)  Group users based on common “work styles” regardless of role and department  Identify common use cases that apply to each set of users
  • 13. Step 3: Creating a Service Strategy Map Workforce Segments to Planned Service Offerings 13 Corporate Laptop VDI End Point Mobile Device Non-Corp Laptop Workstation Anchored Local Collaborator Remote Worker Highly Mobile Offsite External Prioritise Use Cases for Implementation
  • 14. Step 4: Defining the Policy BYOD Policy Design 14  Designing the right policies is critical to controlling costs - 86% of BYOD costs are non-device- related 1  IT should drive the policy design however buy-in needed from HR, Finance, Tax, Legal, and Corporate Security  Policy must define minimum acceptable standards for Hardware, Operating System, and Security software  A clear entitlement policy is necessary to ensure the right tools and services are offered to the right users for the right cost  Rules of Use are necessary to set clear expectations around user behaviours
  • 15. 15 Corporate Rules of Use 1) Allows Business to remotely wipe the device 2) Requires an acceptable password and 10 minute timeout 3) Require users to immediately report a lost or stolen device.  All users must accept rules of use when signing up for service  Trade off between employee trust and IT control  There is no IT jargon – the rules are simple for end- users to understand Step 4: Defining the Policy BYOD Rules of Use
  • 16. 16 Corporate Policies  Service Entitlement  Rules of Use  Device Purchase Local Directives • Geography • Business Functions Approvals  MD for Policy Variations  Manager for Individual Liable  Employee for Self Support Agreement Step 4: Defining the Policy BYOD Policy Implementation
  • 17. 17  BYOD without a corresponding strategy generates more work for IT – 80% of IT respondents had increased support workloads from consumerisation 1  IT budgets are not scaling at the same rate  A new support model is required:  IT supports connectivity problems and issues with the corporate applications and the operating system  Hardware support provided by device manufacture or user  Community support forums for knowledge sharing and best practices Step 5: Developing a User Support Model Designing a Support Model 1. 2011 IDC Consumerization of IT Study
  • 18. Conclusions Key Takeaways 18 1. BYOD is happening - with or without IT 2. Position IT as an enabler - not a barrier 3. Leverage the BYOD trend and target high value use cases 4. Test the waters first before wide-scale deployment 5. Find your right balance between security and client experience 6. Leverage the latest tools out there: eg) MDM and Posture Assessment

Notes de l'éditeur

  1. Customers are wanting to provide choice in end-point devices – moving away from SOE. This allows people to work in new waysA simple definition of BYOD - any device, with any ownership, used anywhere – mobility is key to thisTraditional boundaries of an organisation are being blurred – both physically (where people work) and who (contractors, part time workers)These new workflows bring new challenges
  2. Above is a snapshot of a large enterprise customer – typical of many large organisations(Above is a poll of devices on the customer’s enterprise network over two years)Note the almost exponential growth of iOS and Android devices
  3. There are many benefits to enabling BYOD or having a mobility policy, including productivity and employee retention.
  4. Employees are looking to work anywhere, on any device… The implications is that we now have corporate data on personal devices and a significantly higher number of potential attack vectors (or vulnerabilities/malware) into an organisation.
  5. There are a range of organisational responses – in some case “no” may be the BYOD policy (for example Defence or specific applications). A more liberal approach is more common, with some degree of guest access or limited access to BYO devices or the use of MDM and VDI to securely bring BYO devices into the corporate environment. At the other end of the spectrum organisations will provide a choice of end device (COPE policy) and actively support mobility (for example, in the retail and often professional services sectors).
  6. What steps do we recommend you consider – it is a high-level framework and1) develop a business case (or why are you doing it?)2) what are your current workflows3) look at the requirements for each of the categories in Step 24) what policies are required to enable 5) how do you support this new strategy?
  7. Review the “current state” of the existing desktop/phone fleet, including support and “hidden” costs. Understand the costs of implementing a BYOD environment with the appropriate level of security (technology and operational costs)Estimate the potential savings that can be realised – retiring old devices, self-support models, reduced CapEx on corporate devices
  8. How do staff need to – and want to – work? Identify common work styles or “use cases” that can apply to sets of users.
  9. What kind of connectivity and devices best support each type of worker? These need to be mapped out – typically these can be grouped into 4-6 roles or working styles.
  10. All departments are stakeholders in making this change, and a consultative approach is required in developing a policylegal implications / risksHRAn important aspect is “rules of use” – clear expectations must be set and all employees must understands these. Write them in plain English and ensure they are communicated at all levels of the organisation.
  11. Some basic “rules” are:Acceptance that the business can remotely wipe data if requiredMinimum password length/complexityReporting of any device loss/theft
  12. Set clear policies around what is acceptable: what are the employee entitlements and responsibilities
  13. A sensible user support model is critical – BYOD can increase the workload (without an increase in the IT support budget), but self-support models and creating a community of knowledge / corporate wiki have been proven to offset this additional complexity
  14. So,in summary: BYOD is happening or not – so you need to position IT as an enabler and develop an appropriate strategy for your organisation. Once you have a strategy, there are many tools that can help you effectively implement the right balance of security and mobility – Logicalis has done this for a number of organisations and can assist with all aspects of developi