SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
BYOD: Device Management
Introduction 
What is BYOD? 
Bring your own device (BYOD) is an alternative strategy allowing 
employees, business partners and other users to utilize a personally 
selected and purchased client device to execute enterprise applications 
and access data. 
First entered in 2009, as organizations started recognizing an increasing 
tendency among its employees to bring their own devices to work and 
connect them to the corporate network. 
Formal BYOD programs are a relatively new but fast-growing phenomenon. 
The rapid proliferation of employees mobile devices is changing the 
traditional IT environment in enterprises.
Dextop, 18% 
Laptop, 33% 
Smartphone, 
Ultraportable, 
Netbook, 7% 
26% 
Tablet, 11% 
5% 
Sales 
Dextop 
Laptop 
Netbook 
One in four devices used for work are 
either smartphones or tablets
There is no stopping BYOD 
The BYOD market will increase to 
$181 billion by 2017. 
(Marketsandmarkets) 
95% of organisation permit 
employee-owned devices.(CISCI 
IBSG) 
71% require technology that 
enables their staff to work 
anywhere at any time.(Microsoft) 
70% of employees use personal 
devices for business use. 
(Forrester)
WHY BYOD ? 
FLEXIBILITY 
No hassle with one device to combine work and personal activities. 
EFFICIENCY 
Can get more work done with their own device. 
COST REDUCTION 
Annual benefits from BYOD range from $300-$1300 per employee. 
PRODUCTIVITY 
53% have raised work productivity through innovative practices enabled by 
their devices. 
EMPLOYEE SATISFACTION 
Employees feel more comfortable while working on personal devices, which 
improves their job satisfaction levels.
9 out of 10 
Employees 
don’t use 
password 
security on 
their 
devices 
51% 
Have had 
loss due to 
insecure 
devices 
81% 
Admit 
accessing 
their 
employer’s 
network 
without 
their 
employer’s 
knowledge 
or 
permission 
46% 
Who use a 
personal 
device for 
work have 
let 
someone 
else use it 
66% 
Who use a 
personal 
device for 
work say 
that their 
organizati 
on doesn’t 
have 
BYOD 
policy 
BRING YOUR OWN DISASTER
Multi-layered security technologies 
File 
Storage 
Network 
Pretty Good Privacy 
Information Rights 
Management 
Full Disk Encryption 
Database Encryption 
Data Loss Prevention 
Firewall 
Virtual Private 
Network
Network-centric Solutions 
Firewall 
Protects the (eroded) perimeter 
DLP(Data Loss Prevention) 
Monitoring 
Good to understand where data is going 
Problem is wealth of information it produces 
VPN(Virtual Private Network) 
Protects data in transit only
MDM-Mobile Device Management 
Software that secures, monitors, manages and supports 
mobile devices. 
Over-the-air distribution of applications, data and 
configuration settings. 
Supports company-owned and employee-owned devices. 
Addresses the limitations of Microsoft ActiveSync. 
Comprehensive visibility and control over iPhones, iPads, 
Androids and other popular devices with a scalable mobile 
device management software solution.
CONCLUSION 
Employee attitudes to work-life balance and single device usage 
drive high levels of BYOD in high-growth markets 
Instead of denying access citing the security concerns, it would be 
best in business interest to embrace this business policy which 
allows people to be more productive in longer run. 
IT departments must find the right way to manage this behaviour.
BYOD
BYOD

Contenu connexe

Tendances

Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 
How to Calculate Data Center TCO (SlideShare)
How to Calculate Data Center TCO (SlideShare)How to Calculate Data Center TCO (SlideShare)
How to Calculate Data Center TCO (SlideShare)SP Home Run Inc.
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesThousandEyes
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 

Tendances (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
DLP
DLPDLP
DLP
 
How to Calculate Data Center TCO (SlideShare)
How to Calculate Data Center TCO (SlideShare)How to Calculate Data Center TCO (SlideShare)
How to Calculate Data Center TCO (SlideShare)
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 

En vedette

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Segurança da Informação em BYOD
Segurança da Informação em BYODSegurança da Informação em BYOD
Segurança da Informação em BYODMicrosoft
 
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...Instituto Crescer
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Clever Consulting
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliaripaolarduini
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...HEC Paris
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyrCLDEM
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPEAvocatsMathias
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Microsoft Technet France
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolasticirobertomartorana
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYODSwitchup srl
 

En vedette (20)

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Segurança da Informação em BYOD
Segurança da Informação em BYODSegurança da Informação em BYOD
Segurança da Informação em BYOD
 
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
Palestra “Reforçando a Educação Nomádica: Implementando BYOD e Cloud Computin...
 
Il pnsd a scuola
Il pnsd a scuolaIl pnsd a scuola
Il pnsd a scuola
 
09 età di_pericle
09 età di_pericle09 età di_pericle
09 età di_pericle
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
Pesquisa sobre BYOD
Pesquisa sobre BYODPesquisa sobre BYOD
Pesquisa sobre BYOD
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Byod
ByodByod
Byod
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyr
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
 
BYOD
BYOD BYOD
BYOD
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolastici
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYOD
 

Similaire à BYOD

Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012StalwartAcademy
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015Marcel Hoffmann
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device ManagementHexnode
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Vodafone Business
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 

Similaire à BYOD (20)

Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
 
Security that works
Security that worksSecurity that works
Security that works
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device Management
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 

Dernier

3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4DianaGray10
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTxtailishbaloch
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 

Dernier (20)

3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 

BYOD

  • 2. Introduction What is BYOD? Bring your own device (BYOD) is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. First entered in 2009, as organizations started recognizing an increasing tendency among its employees to bring their own devices to work and connect them to the corporate network. Formal BYOD programs are a relatively new but fast-growing phenomenon. The rapid proliferation of employees mobile devices is changing the traditional IT environment in enterprises.
  • 3. Dextop, 18% Laptop, 33% Smartphone, Ultraportable, Netbook, 7% 26% Tablet, 11% 5% Sales Dextop Laptop Netbook One in four devices used for work are either smartphones or tablets
  • 4. There is no stopping BYOD The BYOD market will increase to $181 billion by 2017. (Marketsandmarkets) 95% of organisation permit employee-owned devices.(CISCI IBSG) 71% require technology that enables their staff to work anywhere at any time.(Microsoft) 70% of employees use personal devices for business use. (Forrester)
  • 5. WHY BYOD ? FLEXIBILITY No hassle with one device to combine work and personal activities. EFFICIENCY Can get more work done with their own device. COST REDUCTION Annual benefits from BYOD range from $300-$1300 per employee. PRODUCTIVITY 53% have raised work productivity through innovative practices enabled by their devices. EMPLOYEE SATISFACTION Employees feel more comfortable while working on personal devices, which improves their job satisfaction levels.
  • 6. 9 out of 10 Employees don’t use password security on their devices 51% Have had loss due to insecure devices 81% Admit accessing their employer’s network without their employer’s knowledge or permission 46% Who use a personal device for work have let someone else use it 66% Who use a personal device for work say that their organizati on doesn’t have BYOD policy BRING YOUR OWN DISASTER
  • 7. Multi-layered security technologies File Storage Network Pretty Good Privacy Information Rights Management Full Disk Encryption Database Encryption Data Loss Prevention Firewall Virtual Private Network
  • 8. Network-centric Solutions Firewall Protects the (eroded) perimeter DLP(Data Loss Prevention) Monitoring Good to understand where data is going Problem is wealth of information it produces VPN(Virtual Private Network) Protects data in transit only
  • 9. MDM-Mobile Device Management Software that secures, monitors, manages and supports mobile devices. Over-the-air distribution of applications, data and configuration settings. Supports company-owned and employee-owned devices. Addresses the limitations of Microsoft ActiveSync. Comprehensive visibility and control over iPhones, iPads, Androids and other popular devices with a scalable mobile device management software solution.
  • 10. CONCLUSION Employee attitudes to work-life balance and single device usage drive high levels of BYOD in high-growth markets Instead of denying access citing the security concerns, it would be best in business interest to embrace this business policy which allows people to be more productive in longer run. IT departments must find the right way to manage this behaviour.