Preparing an Effective BYOD or Mobility Strategy outlines a 5-step process for developing a BYOD strategy:
1. Develop a business case by calculating the costs and savings of a BYOD program.
2. Segment the workforce based on work styles and common use cases.
3. Map workforce segments to planned service offerings like laptops, VDI, or mobile devices.
4. Define BYOD policies around minimum device standards, entitlements, and rules of use.
5. Design a new support model where IT supports applications and OS, while users support hardware.
2. Agenda
1. Intro - What Are The Benefits?
2. Do You Need a Strategy?
3. Creating a BYOD Strategy
4. Questions
2
3. What is ‘Bring Your Own Device’?
3
Bring Your Own Device enables end users to securely
use devices they choose to increase their productivity
and mobility
These can be devices purchased by the employer, the
employee, contractors, suppliers
“BYOD means any device, with any
ownership, used anywhere”
4. BYOD Mobility Landscape
4
Smartphones and
Tablets
Two year mobile device growth rate is 102%
Platform
June
2010
June
2011
June
2012
iPhone 3,554 16,857 23,258
iPad 150 5,418 10,779
BlackBerry 14,802 14,233 9,724
Android 40 3,526 6,592
Others 7,005 1,406 1,010
Total 25,401 41,440 51,363
19% 45%
21%
13%
5. Win – Win
BYOD Delivers Benefits to Employees and the Enterprise
5
Employees get greater control of their work
experience through choice of device
75% of IT execs report that allowing employees to bring
consumer devices to work has increased employee
morale
1
Employers get a more productive workforce and lower
costs
72% of IT execs say that employees who bring consumer
devices into the workplace are more productive
1
Annual benefits from BYOD to enterprises ranges from $300
to $1,300 per employee depending on job role
2
1. 2011 IDC Consumerization of IT Study
2. 2012 Cisco IBSG Horizons Study
7. This is What We are Facing
7
Reduce Security Risk
Improve End-User
Productivity Increase Operation Efficiencies
Over 15 billion devices by
2015, with average worker
with 3 devices
New workspace:
anywhere, anytime
71% of Gen Y workforce
do not obey policies
60% will download sensitive
data on a personal device
End – User Behaviours IT Trends
Must control the multiple
devices and guests
Security: Top concern for
BYOD
Mobile malware quadrupled
(from 2010 to 2012)
IT consumed with network
fragmentation
8. The BYOD Spectrum
8
Denied or
Restricted
Allowed Encouraged Mandated
Environment requires
tight control:
Corp Only Device
Mfg Environment
Trading Floor
Classified Gov Networks
Traditional Enterprise
Focus on basic
services, easy access,
almost anybody
Broader Device Types But
Internet Only
Edu Environment
Public Institutions
Simple Guest
Enable differentiated
services, on-boarding
with security but no
ownership
Multiple Device Types +
Access Methods, VDI
Healthcare
Early BYOD Enterprise
Adopters
Contractors
Corp native apps, new
services, full control
Multiple Device Types
Corp Issued, MDM
Innovative Enterprises
Retail on Demand
Mobile Sales Service
(Video, Collaboration, etc)
10. Five Steps to Create a BYOD Strategy
10
Step 1
Develop a
Business
Plan
Step 2
Segment the
Workforce
Step 3
Create a
Service
Strategy
Step 4
Define the
Policy
Step 5
Develop
User
Support
Model
11. Step 1: Developing a Business Case
Calculate an ROI for multiple scenarios
11
Operating Cost
Potential
Savings
Return on
Investment
Current TCO
Upfront
Investment
Calculate the
Total Cost of
Ownership for
existing fleet
Include OS,
Software,
Hardware,
Security, Asset
Management,
Support,
Storage, Lost
& Stolen
Devices
Add the upfront
investment
required to
move to BYOD
Include VDI,
licensing,
software &
content
virtualisation,
infrastructure,
resource costs
Add the ongoing
costs of a BYOD
program
Include all
incremental
costs to deliver
BYOD
Include tax
implications of
any employee
allowance
Subtract the
savings that can
be generated in
each TCO line
item through
BYOD
Include savings
generated by
retiring old
services
Calculate
potential ROI
then adjust the
elements of your
strategy to
model multiple
scenarios
Model different
scope, timing,
employee
entitlements
12. Step 2: Workforce Segmentation
12
Work
Styles
Workstation
Anchored
Local
Collaborator
Remote WorkerHighly Mobile
Offsite External
Select some key dimensions
to segment the workforce
(e.g. 'need for mobility‟ &
„need for support‟)
Group users based on
common “work styles”
regardless of role and
department
Identify common use cases
that apply to each set of
users
13. Step 3: Creating a Service Strategy
Map Workforce Segments to Planned Service Offerings
13
Corporate
Laptop
VDI
End Point
Mobile
Device
Non-Corp
Laptop
Workstation
Anchored
Local
Collaborator
Remote
Worker
Highly
Mobile
Offsite
External
Prioritise Use Cases for
Implementation
14. Step 4: Defining the Policy
BYOD Policy Design
14
Designing the right policies is critical to controlling
costs - 86% of BYOD costs are non-device-
related
1
IT should drive the policy design however buy-in
needed from HR, Finance, Tax, Legal, and
Corporate Security
Policy must define minimum acceptable standards
for Hardware, Operating System, and Security
software
A clear entitlement policy is necessary to ensure
the right tools and services are offered to the right
users for the right cost
Rules of Use are necessary to set clear
expectations around user behaviours
15. 15
Corporate Rules of Use
1) Allows Business to remotely
wipe the device
2) Requires an acceptable
password and 10 minute
timeout
3) Require users to immediately
report a lost or stolen
device.
All users must accept rules
of use when signing up for
service
Trade off between
employee trust and IT
control
There is no IT jargon – the
rules are simple for end-
users to understand
Step 4: Defining the Policy
BYOD Rules of Use
16. 16
Corporate Policies
Service
Entitlement
Rules of Use
Device Purchase
Local Directives
• Geography
• Business
Functions
Approvals
MD for Policy
Variations
Manager for
Individual Liable
Employee for Self
Support
Agreement
Step 4: Defining the Policy
BYOD Policy Implementation
17. 17
BYOD without a corresponding strategy
generates more work for IT – 80% of IT
respondents had increased support
workloads from consumerisation
1
IT budgets are not scaling at the same rate
A new support model is required:
IT supports connectivity problems and
issues with the corporate applications
and the operating system
Hardware support provided by device
manufacture or user
Community support forums for
knowledge sharing and best practices
Step 5: Developing a User Support Model
Designing a Support Model
1. 2011 IDC Consumerization of IT Study
18. Conclusions
Key Takeaways
18
1. BYOD is happening - with or without IT
2. Position IT as an enabler - not a barrier
3. Leverage the BYOD trend and target high value use cases
4. Test the waters first before wide-scale deployment
5. Find your right balance between security and client experience
6. Leverage the latest tools out there: eg) MDM and Posture Assessment
Notes de l'éditeur
Customers are wanting to provide choice in end-point devices – moving away from SOE. This allows people to work in new waysA simple definition of BYOD - any device, with any ownership, used anywhere – mobility is key to thisTraditional boundaries of an organisation are being blurred – both physically (where people work) and who (contractors, part time workers)These new workflows bring new challenges
Above is a snapshot of a large enterprise customer – typical of many large organisations(Above is a poll of devices on the customer’s enterprise network over two years)Note the almost exponential growth of iOS and Android devices
There are many benefits to enabling BYOD or having a mobility policy, including productivity and employee retention.
Employees are looking to work anywhere, on any device… The implications is that we now have corporate data on personal devices and a significantly higher number of potential attack vectors (or vulnerabilities/malware) into an organisation.
There are a range of organisational responses – in some case “no” may be the BYOD policy (for example Defence or specific applications). A more liberal approach is more common, with some degree of guest access or limited access to BYO devices or the use of MDM and VDI to securely bring BYO devices into the corporate environment. At the other end of the spectrum organisations will provide a choice of end device (COPE policy) and actively support mobility (for example, in the retail and often professional services sectors).
What steps do we recommend you consider – it is a high-level framework and1) develop a business case (or why are you doing it?)2) what are your current workflows3) look at the requirements for each of the categories in Step 24) what policies are required to enable 5) how do you support this new strategy?
Review the “current state” of the existing desktop/phone fleet, including support and “hidden” costs. Understand the costs of implementing a BYOD environment with the appropriate level of security (technology and operational costs)Estimate the potential savings that can be realised – retiring old devices, self-support models, reduced CapEx on corporate devices
How do staff need to – and want to – work? Identify common work styles or “use cases” that can apply to sets of users.
What kind of connectivity and devices best support each type of worker? These need to be mapped out – typically these can be grouped into 4-6 roles or working styles.
All departments are stakeholders in making this change, and a consultative approach is required in developing a policylegal implications / risksHRAn important aspect is “rules of use” – clear expectations must be set and all employees must understands these. Write them in plain English and ensure they are communicated at all levels of the organisation.
Some basic “rules” are:Acceptance that the business can remotely wipe data if requiredMinimum password length/complexityReporting of any device loss/theft
Set clear policies around what is acceptable: what are the employee entitlements and responsibilities
A sensible user support model is critical – BYOD can increase the workload (without an increase in the IT support budget), but self-support models and creating a community of knowledge / corporate wiki have been proven to offset this additional complexity
So,in summary: BYOD is happening or not – so you need to position IT as an enabler and develop an appropriate strategy for your organisation. Once you have a strategy, there are many tools that can help you effectively implement the right balance of security and mobility – Logicalis has done this for a number of organisations and can assist with all aspects of developi