SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
IPnrSaicgthictasl 
The term BYOD is expanding its scope, including 
not only devices, but also cosumer-oriented 
technologies, like apps and cloud services (i.e. 
Google Docs or Microsoft Skydrive). The term 
is evolving from BYOD to BYOT, making things 
more challenging for companies and their IT 
departments. 
BYOD: 
Highlights of “Consumerization” 
At this phase of the information age, technology evolves and buzzwords and new concepts arise. 
Moreover, in recent years, the increasing role that technologies play with human interactions is 
creating the same effect in a wider, new space: the social space. 
BYOD—Bring Your Own Device-- is one of these effects. It is a social hype, and not necessarily a 
business phenomenon. This is because it has been not originated as a need of the corporations 
itself but as a natural behavior of its employees, collaborators or even clients. 
The concept of “Smartphone”, originally exploited by BlackBerry for business purposes, rapidly 
began to expand for personal use. Devices improved and became more flexible, allowing users 
to do even more with apps and functionalities than ever possible with a typical voice and email 
communication on a feature phone. Mobility, though not new, is a concept that rapidly exploded, 
putting information in the hands of practically “any” user. 
Along with these phenomena, people started to bring their personal devices to work, preferring 
their own devices over the one provided by the company for business purposes. This was further 
propelled as the lines between work and personal needs blurred as employees had to be always 
connected as a part of a global, mobile workforce. 
Thus, BYOD didn´t start as a business need, but rather as an effect of the “democratization” of 
technology. Thus, a new buzzword is born: “consumerization”, which could be defined as the 
consequence of bringing consumer technology to the workplace, and using it for both personal 
and work-related matters. 
The term BYOD is expanding its scope, including not only devices, but also consumer-oriented 
technologies, like apps and web services ( Google Docs or Microsoft Skydrive). The term is 
evolving from BYOD to BYOT, making things more challenging for companies and their IT de-partments. 
Rodrigo Rey 
Corporate IT Director
“IT Departments have to develop an answer to organize the expon ential 
growth of business and personal data of employees, collaborator s, 
consumers, and not only corporate users. ” 
‘Practical InSights’ is a Neoris publication. This material shall not be reproduced or 
copied in whole or in part without Neoris’ express consent. Neoris is a business and IT consulting 
company specialized in value-added consulting, emerging technologies and outsourcing solutions. 
Headquartered in Miami, Fl. Neoris has operations in the U.S., Europe, Latin America, Africa, and 
the Middle East. For local office information, please visit us at www.neoris.com 
703 Waterford Way. Suite 700. Miami, FL 33126 
Phone: (1) 305-728-6000 / Fax: (1) 786- 388-3139 
Under this reality, the challenge for companies is to 
give answers to this practice that is silently overtak-ing 
the work landscape. And these answers have to 
address two main aspects: 
1) Security: this consideration brings three important 
issues to the discussion: 
a. Mobile Data Protection: Users who bring their 
technology to access at work , build content and 
store business information on their devices or other 
services, like cloud storage solutions. 
b. Separation of personal and business information: 
Users held personal and work related information 
on the same device, and this could imply risks to 
the confidentiality of business information contained 
in the device. 
c. Protect internal infrastructure: Devices with access 
to company ‘information, resources and network, 
might encourage cyber criminals to use these devices 
as a bridge to grant access to the enterprise infrastruc-ture. 
2) Flexibility: Users bring different devices and other 
technologies (like web services), and on the other 
hand, companies need to manage this flexibility with 
proper administration practices. 
a. Diversity of Devices and Technologies: Devices 
with different operating systems, mainly Android, 
IOs and Windows, and thousands of apps down-loadable 
from safe and known sites (like iTunes) 
and other app stores are not necessarily secure. 
b. Understand User Profiles: Users are different 
and there is no “one size fits all.” It is important to 
understand the different users’ profiles and needs, 
and based on these aspects define eligibility for a 
BYOD program. 
Some statistics: 
This trend is global. Although with some variations 
in different geographies, the pattern is undoubtedly 
able growing. Analysts such as Forrester reported 
in Q4 2012 that in India for zexample, nearly 75% 
of employees use their own smartphones, mobile 
apps and online services or subscriptions for both 
personal and work-related purposes. In the case of 
tablets, this percentage drops to 62%. 
In other geographies this trend is confirmed. Gartner 
surveyed employees of companies of different indus-tries 
around the world, concluding interesting results 
the U.S., 55% of employees use their personal 
Smartphone for work purposes, while in Brazil the 
percentage raises to 71%. On the other hand, Euro-pean 
countries show more conservative numbers. 
But the common factor, in any case, is that the 
trend is growing. 
Gartner , for example, estimates that by 2015, the 
number of employees using mobile applications in 
the workplace will double. And by 2017 half of em-ployers 
will require employees to supply their own 
device for work purposes. In terms of administration 
costs for companies, by 2016 the typical organiza-tion 
will spend over $300 per year per employee 
on mobile applications, security, management and 
support. 
Are there real benefits of adopting a BYOD program? 
As it was expressed above, BOYD is a product of 
a modern social behavior more than a business re-quirement. 
Some analysts that defend BYOD mention 
several of benefits directly or indirectly associated to 
this trend: 
• Bring your own device (BYOD) drives innovation 
for businesses by increasing the number of mobile 
application users in the workforce. 
• BYOD improves employee satisfaction, given the 
possibility for each employee of using the technology 
that best fits his/her needs. And this satisfaction could 
impact improved productivity. 
• BYOD could lead to costs reductions, depending 
on the extent of the program implementation, the 
local culture and regulations. 
The realization of these and other benefits will 
depend on the way a company could implement 
a successful BYOD program, and positive results 
could be reinforced or mitigated depending on the 
company´s DNA or culture. 
What are companies doing to respond to this growing 
trend? 
IT Departments have to develop an answer to orga-nize 
the exponential growth of business and personal 
data of employees, collaborators, consumers, and 
not only corporate users. 
Under this situation, companies need to address the 
challenges of BYOD by developing and implement-ing 
a solid BYOD policy. This policy is prepared jointly 
with IT, Legal, Finance and HR areas, addressing all 
the possible aspects and impacts described above, 
and additionally considering local regulations. 
This policy should take into account the following 
considerations: 
1) Define type of users. Usually called “persona 
analysis” shall be executed to ensure a proper iden-tification 
of different profiles and user needs, and 
then define the level of involvement that these users 
will have in a BYOD program. 
2) Define eligible devices and technologies: not all 
devices or technologies are appropriate to ensure 
an acceptable level of security required to deal with 
companies’ critical information out of enterprise fa-cilities. 
3) Establish authorized apps stores and download 
sites: the policy shall clearly prohibit “hijacking” of 
mobile devices or download apps or information 
from non-secure sites. Moreover, some companies 
could provide exclusive company stores for apps, 
disabling or limiting the possibility of downloading 
apps outside this company´s apps store. 
4) Define conditions and criteria to access business 
data. 
5) Besides the policy, companies should implement 
a system to ensure the remote administration of 
devices allowed to connect to business information 
resources. This solutions should provide (as a mini-mum): 
a. Information wipe-out in case of robbery or lost. 
b. Allow download of only permitted apps. 
c. Data “containerization” (in order to keep separated 
personal and business information). 
Companies need to respond to the BYOD phenome-non 
not only by granting access to employees who 
want to have their email on their personal devices. 
Security is an important concern and should be 
addressed as soon as the implementation of a 
BYOD program is decided upon. 
The best instrument to provide security is a BYOD 
policy. After implementing a first version of the 
policy, the next step is to analyze tools that could 
help companies to ensure compliance to this policy. 
These tools are known as MDM (mobile data mana 
gement) and allow a proper management of business 
information during the day-to-day activities and un-der 
remarkable situations, such as loss or theft of 
the device. 
Companies need to respond to BYOD 
phenomenon not only by granting 
access to employees who want to 
have their email on their personal 
devices. Security is an important 
concern and should be addressed 
as soon as the implementation of a 
BYOD program is decided upon.

Contenu connexe

Tendances

BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global PerspectiveJoseph M Bradley
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaborationSvetlana Belyaeva
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Fujitsu CIO technology trends survey 2012
Fujitsu CIO technology trends survey  2012Fujitsu CIO technology trends survey  2012
Fujitsu CIO technology trends survey 2012Fujitsu Global
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD InfrastructureMelissa Andrews
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 

Tendances (19)

BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Fujitsu CIO technology trends survey 2012
Fujitsu CIO technology trends survey  2012Fujitsu CIO technology trends survey  2012
Fujitsu CIO technology trends survey 2012
 
Security that works
Security that worksSecurity that works
Security that works
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
The Economist, Serious Business, Web 2.0
The Economist,  Serious Business, Web 2.0The Economist,  Serious Business, Web 2.0
The Economist, Serious Business, Web 2.0
 

En vedette

Эксергия - взаимосвязи
Эксергия - взаимосвязиЭксергия - взаимосвязи
Эксергия - взаимосвязиAndrey Haydarov
 
Empathise and define
Empathise and defineEmpathise and define
Empathise and defineSanjay Sinha
 
Rip brandal slideshow
Rip brandal slideshowRip brandal slideshow
Rip brandal slideshowchrisward89
 
Quelle place pour la France dans un marché mondial en mouvement
Quelle place pour la France dans un marché mondial en mouvementQuelle place pour la France dans un marché mondial en mouvement
Quelle place pour la France dans un marché mondial en mouvementInstitut de l'Elevage - Idele
 
Les Français et l'arbitrage
Les Français et l'arbitrageLes Français et l'arbitrage
Les Français et l'arbitrageKantar
 

En vedette (8)

Эксергия - взаимосвязи
Эксергия - взаимосвязиЭксергия - взаимосвязи
Эксергия - взаимосвязи
 
Empathise and define
Empathise and defineEmpathise and define
Empathise and define
 
Rip brandal slideshow
Rip brandal slideshowRip brandal slideshow
Rip brandal slideshow
 
Quelle place pour la France dans un marché mondial en mouvement
Quelle place pour la France dans un marché mondial en mouvementQuelle place pour la France dans un marché mondial en mouvement
Quelle place pour la France dans un marché mondial en mouvement
 
Nytimesoped
NytimesopedNytimesoped
Nytimesoped
 
Les Français et l'arbitrage
Les Français et l'arbitrageLes Français et l'arbitrage
Les Français et l'arbitrage
 
Arc466 Dwelling
Arc466   DwellingArc466   Dwelling
Arc466 Dwelling
 
Research template of rings
Research template of ringsResearch template of rings
Research template of rings
 

Similaire à BYOD - Highlights of "Consumerization"

A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldKévin CÉCILE
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Finding the value in byod capgemini consulting - digital transformation
Finding the value in byod   capgemini consulting - digital transformationFinding the value in byod   capgemini consulting - digital transformation
Finding the value in byod capgemini consulting - digital transformationRick Bouter
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
Finding the value in BYOD
Finding the value in BYODFinding the value in BYOD
Finding the value in BYODCapgemini
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Learningade
 
Android Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise PerspectiveAndroid Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise PerspectiveIOSR Journals
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Gen Re
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfJPLoft Solutions
 

Similaire à BYOD - Highlights of "Consumerization" (20)

Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Finding the value in byod capgemini consulting - digital transformation
Finding the value in byod   capgemini consulting - digital transformationFinding the value in byod   capgemini consulting - digital transformation
Finding the value in byod capgemini consulting - digital transformation
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
BYOD
BYODBYOD
BYOD
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Finding the value in BYOD
Finding the value in BYODFinding the value in BYOD
Finding the value in BYOD
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
 
Android Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise PerspectiveAndroid Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise Perspective
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 

Plus de NEORIS

Gestión de personas 3.0
Gestión de personas 3.0 Gestión de personas 3.0
Gestión de personas 3.0 NEORIS
 
Social Enterprise Innovation Culture
Social Enterprise Innovation CultureSocial Enterprise Innovation Culture
Social Enterprise Innovation CultureNEORIS
 
The Future of Omni-Channel Shopping Experience
The Future of Omni-Channel Shopping ExperienceThe Future of Omni-Channel Shopping Experience
The Future of Omni-Channel Shopping Experience NEORIS
 
NEORIS IoT Omnichannel Presentation
NEORIS IoT Omnichannel PresentationNEORIS IoT Omnichannel Presentation
NEORIS IoT Omnichannel PresentationNEORIS
 
SAP Hybris Marketing
SAP Hybris MarketingSAP Hybris Marketing
SAP Hybris MarketingNEORIS
 
Comercio Electrónico Omnicanal en México
Comercio Electrónico Omnicanal en MéxicoComercio Electrónico Omnicanal en México
Comercio Electrónico Omnicanal en MéxicoNEORIS
 
SAP Hybris Live by NEORIS
SAP Hybris Live by NEORISSAP Hybris Live by NEORIS
SAP Hybris Live by NEORISNEORIS
 
Digital Business by NEORIS
Digital Business by NEORISDigital Business by NEORIS
Digital Business by NEORISNEORIS
 
NEORIS - Melhore seu autoatendimento com SAP MCF
NEORIS - Melhore seu autoatendimento com SAP MCFNEORIS - Melhore seu autoatendimento com SAP MCF
NEORIS - Melhore seu autoatendimento com SAP MCFNEORIS
 
SAP Multichannel Customer Engagement
SAP Multichannel Customer EngagementSAP Multichannel Customer Engagement
SAP Multichannel Customer EngagementNEORIS
 
Inovação e Segurança na Distribuição - Tecnologia SAP MII & Google Glass
Inovação e Segurança na Distribuição - Tecnologia SAP MII & Google GlassInovação e Segurança na Distribuição - Tecnologia SAP MII & Google Glass
Inovação e Segurança na Distribuição - Tecnologia SAP MII & Google GlassNEORIS
 
NEORIS Case Study - Prettl
NEORIS Case Study - PrettlNEORIS Case Study - Prettl
NEORIS Case Study - PrettlNEORIS
 
NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014
NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014
NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014NEORIS
 
Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...NEORIS
 
Global Templates - Key Design Components
Global Templates - Key Design ComponentsGlobal Templates - Key Design Components
Global Templates - Key Design ComponentsNEORIS
 
From wearable to ubiquitous computing - Science fiction is now IT science
From wearable to ubiquitous computing - Science fiction is now IT scienceFrom wearable to ubiquitous computing - Science fiction is now IT science
From wearable to ubiquitous computing - Science fiction is now IT scienceNEORIS
 
Digitizing Reverse Logistics - Enabling visualization & optimization of the e...
Digitizing Reverse Logistics - Enabling visualization & optimization of the e...Digitizing Reverse Logistics - Enabling visualization & optimization of the e...
Digitizing Reverse Logistics - Enabling visualization & optimization of the e...NEORIS
 
Customer Loyalty in the Digital industrial Economy
Customer Loyalty in the Digital industrial EconomyCustomer Loyalty in the Digital industrial Economy
Customer Loyalty in the Digital industrial EconomyNEORIS
 
Customer Experience Management - From indexes to action
Customer Experience Management - From indexes to actionCustomer Experience Management - From indexes to action
Customer Experience Management - From indexes to actionNEORIS
 
Cash management Optimization - The formula for drastically reducing cash mana...
Cash management Optimization - The formula for drastically reducing cash mana...Cash management Optimization - The formula for drastically reducing cash mana...
Cash management Optimization - The formula for drastically reducing cash mana...NEORIS
 

Plus de NEORIS (20)

Gestión de personas 3.0
Gestión de personas 3.0 Gestión de personas 3.0
Gestión de personas 3.0
 
Social Enterprise Innovation Culture
Social Enterprise Innovation CultureSocial Enterprise Innovation Culture
Social Enterprise Innovation Culture
 
The Future of Omni-Channel Shopping Experience
The Future of Omni-Channel Shopping ExperienceThe Future of Omni-Channel Shopping Experience
The Future of Omni-Channel Shopping Experience
 
NEORIS IoT Omnichannel Presentation
NEORIS IoT Omnichannel PresentationNEORIS IoT Omnichannel Presentation
NEORIS IoT Omnichannel Presentation
 
SAP Hybris Marketing
SAP Hybris MarketingSAP Hybris Marketing
SAP Hybris Marketing
 
Comercio Electrónico Omnicanal en México
Comercio Electrónico Omnicanal en MéxicoComercio Electrónico Omnicanal en México
Comercio Electrónico Omnicanal en México
 
SAP Hybris Live by NEORIS
SAP Hybris Live by NEORISSAP Hybris Live by NEORIS
SAP Hybris Live by NEORIS
 
Digital Business by NEORIS
Digital Business by NEORISDigital Business by NEORIS
Digital Business by NEORIS
 
NEORIS - Melhore seu autoatendimento com SAP MCF
NEORIS - Melhore seu autoatendimento com SAP MCFNEORIS - Melhore seu autoatendimento com SAP MCF
NEORIS - Melhore seu autoatendimento com SAP MCF
 
SAP Multichannel Customer Engagement
SAP Multichannel Customer EngagementSAP Multichannel Customer Engagement
SAP Multichannel Customer Engagement
 
Inovação e Segurança na Distribuição - Tecnologia SAP MII & Google Glass
Inovação e Segurança na Distribuição - Tecnologia SAP MII & Google GlassInovação e Segurança na Distribuição - Tecnologia SAP MII & Google Glass
Inovação e Segurança na Distribuição - Tecnologia SAP MII & Google Glass
 
NEORIS Case Study - Prettl
NEORIS Case Study - PrettlNEORIS Case Study - Prettl
NEORIS Case Study - Prettl
 
NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014
NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014
NEORIS ¨Presentación IFRS en Congreso ASUG Colombia 2014
 
Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...
 
Global Templates - Key Design Components
Global Templates - Key Design ComponentsGlobal Templates - Key Design Components
Global Templates - Key Design Components
 
From wearable to ubiquitous computing - Science fiction is now IT science
From wearable to ubiquitous computing - Science fiction is now IT scienceFrom wearable to ubiquitous computing - Science fiction is now IT science
From wearable to ubiquitous computing - Science fiction is now IT science
 
Digitizing Reverse Logistics - Enabling visualization & optimization of the e...
Digitizing Reverse Logistics - Enabling visualization & optimization of the e...Digitizing Reverse Logistics - Enabling visualization & optimization of the e...
Digitizing Reverse Logistics - Enabling visualization & optimization of the e...
 
Customer Loyalty in the Digital industrial Economy
Customer Loyalty in the Digital industrial EconomyCustomer Loyalty in the Digital industrial Economy
Customer Loyalty in the Digital industrial Economy
 
Customer Experience Management - From indexes to action
Customer Experience Management - From indexes to actionCustomer Experience Management - From indexes to action
Customer Experience Management - From indexes to action
 
Cash management Optimization - The formula for drastically reducing cash mana...
Cash management Optimization - The formula for drastically reducing cash mana...Cash management Optimization - The formula for drastically reducing cash mana...
Cash management Optimization - The formula for drastically reducing cash mana...
 

Dernier

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Dernier (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

BYOD - Highlights of "Consumerization"

  • 1. IPnrSaicgthictasl The term BYOD is expanding its scope, including not only devices, but also cosumer-oriented technologies, like apps and cloud services (i.e. Google Docs or Microsoft Skydrive). The term is evolving from BYOD to BYOT, making things more challenging for companies and their IT departments. BYOD: Highlights of “Consumerization” At this phase of the information age, technology evolves and buzzwords and new concepts arise. Moreover, in recent years, the increasing role that technologies play with human interactions is creating the same effect in a wider, new space: the social space. BYOD—Bring Your Own Device-- is one of these effects. It is a social hype, and not necessarily a business phenomenon. This is because it has been not originated as a need of the corporations itself but as a natural behavior of its employees, collaborators or even clients. The concept of “Smartphone”, originally exploited by BlackBerry for business purposes, rapidly began to expand for personal use. Devices improved and became more flexible, allowing users to do even more with apps and functionalities than ever possible with a typical voice and email communication on a feature phone. Mobility, though not new, is a concept that rapidly exploded, putting information in the hands of practically “any” user. Along with these phenomena, people started to bring their personal devices to work, preferring their own devices over the one provided by the company for business purposes. This was further propelled as the lines between work and personal needs blurred as employees had to be always connected as a part of a global, mobile workforce. Thus, BYOD didn´t start as a business need, but rather as an effect of the “democratization” of technology. Thus, a new buzzword is born: “consumerization”, which could be defined as the consequence of bringing consumer technology to the workplace, and using it for both personal and work-related matters. The term BYOD is expanding its scope, including not only devices, but also consumer-oriented technologies, like apps and web services ( Google Docs or Microsoft Skydrive). The term is evolving from BYOD to BYOT, making things more challenging for companies and their IT de-partments. Rodrigo Rey Corporate IT Director
  • 2. “IT Departments have to develop an answer to organize the expon ential growth of business and personal data of employees, collaborator s, consumers, and not only corporate users. ” ‘Practical InSights’ is a Neoris publication. This material shall not be reproduced or copied in whole or in part without Neoris’ express consent. Neoris is a business and IT consulting company specialized in value-added consulting, emerging technologies and outsourcing solutions. Headquartered in Miami, Fl. Neoris has operations in the U.S., Europe, Latin America, Africa, and the Middle East. For local office information, please visit us at www.neoris.com 703 Waterford Way. Suite 700. Miami, FL 33126 Phone: (1) 305-728-6000 / Fax: (1) 786- 388-3139 Under this reality, the challenge for companies is to give answers to this practice that is silently overtak-ing the work landscape. And these answers have to address two main aspects: 1) Security: this consideration brings three important issues to the discussion: a. Mobile Data Protection: Users who bring their technology to access at work , build content and store business information on their devices or other services, like cloud storage solutions. b. Separation of personal and business information: Users held personal and work related information on the same device, and this could imply risks to the confidentiality of business information contained in the device. c. Protect internal infrastructure: Devices with access to company ‘information, resources and network, might encourage cyber criminals to use these devices as a bridge to grant access to the enterprise infrastruc-ture. 2) Flexibility: Users bring different devices and other technologies (like web services), and on the other hand, companies need to manage this flexibility with proper administration practices. a. Diversity of Devices and Technologies: Devices with different operating systems, mainly Android, IOs and Windows, and thousands of apps down-loadable from safe and known sites (like iTunes) and other app stores are not necessarily secure. b. Understand User Profiles: Users are different and there is no “one size fits all.” It is important to understand the different users’ profiles and needs, and based on these aspects define eligibility for a BYOD program. Some statistics: This trend is global. Although with some variations in different geographies, the pattern is undoubtedly able growing. Analysts such as Forrester reported in Q4 2012 that in India for zexample, nearly 75% of employees use their own smartphones, mobile apps and online services or subscriptions for both personal and work-related purposes. In the case of tablets, this percentage drops to 62%. In other geographies this trend is confirmed. Gartner surveyed employees of companies of different indus-tries around the world, concluding interesting results the U.S., 55% of employees use their personal Smartphone for work purposes, while in Brazil the percentage raises to 71%. On the other hand, Euro-pean countries show more conservative numbers. But the common factor, in any case, is that the trend is growing. Gartner , for example, estimates that by 2015, the number of employees using mobile applications in the workplace will double. And by 2017 half of em-ployers will require employees to supply their own device for work purposes. In terms of administration costs for companies, by 2016 the typical organiza-tion will spend over $300 per year per employee on mobile applications, security, management and support. Are there real benefits of adopting a BYOD program? As it was expressed above, BOYD is a product of a modern social behavior more than a business re-quirement. Some analysts that defend BYOD mention several of benefits directly or indirectly associated to this trend: • Bring your own device (BYOD) drives innovation for businesses by increasing the number of mobile application users in the workforce. • BYOD improves employee satisfaction, given the possibility for each employee of using the technology that best fits his/her needs. And this satisfaction could impact improved productivity. • BYOD could lead to costs reductions, depending on the extent of the program implementation, the local culture and regulations. The realization of these and other benefits will depend on the way a company could implement a successful BYOD program, and positive results could be reinforced or mitigated depending on the company´s DNA or culture. What are companies doing to respond to this growing trend? IT Departments have to develop an answer to orga-nize the exponential growth of business and personal data of employees, collaborators, consumers, and not only corporate users. Under this situation, companies need to address the challenges of BYOD by developing and implement-ing a solid BYOD policy. This policy is prepared jointly with IT, Legal, Finance and HR areas, addressing all the possible aspects and impacts described above, and additionally considering local regulations. This policy should take into account the following considerations: 1) Define type of users. Usually called “persona analysis” shall be executed to ensure a proper iden-tification of different profiles and user needs, and then define the level of involvement that these users will have in a BYOD program. 2) Define eligible devices and technologies: not all devices or technologies are appropriate to ensure an acceptable level of security required to deal with companies’ critical information out of enterprise fa-cilities. 3) Establish authorized apps stores and download sites: the policy shall clearly prohibit “hijacking” of mobile devices or download apps or information from non-secure sites. Moreover, some companies could provide exclusive company stores for apps, disabling or limiting the possibility of downloading apps outside this company´s apps store. 4) Define conditions and criteria to access business data. 5) Besides the policy, companies should implement a system to ensure the remote administration of devices allowed to connect to business information resources. This solutions should provide (as a mini-mum): a. Information wipe-out in case of robbery or lost. b. Allow download of only permitted apps. c. Data “containerization” (in order to keep separated personal and business information). Companies need to respond to the BYOD phenome-non not only by granting access to employees who want to have their email on their personal devices. Security is an important concern and should be addressed as soon as the implementation of a BYOD program is decided upon. The best instrument to provide security is a BYOD policy. After implementing a first version of the policy, the next step is to analyze tools that could help companies to ensure compliance to this policy. These tools are known as MDM (mobile data mana gement) and allow a proper management of business information during the day-to-day activities and un-der remarkable situations, such as loss or theft of the device. Companies need to respond to BYOD phenomenon not only by granting access to employees who want to have their email on their personal devices. Security is an important concern and should be addressed as soon as the implementation of a BYOD program is decided upon.