SlideShare une entreprise Scribd logo
1  sur  27
Bring Your Own Device (BYOD)
              Making It Work for Your Organization
              Cognizant Research Center | June 2012




©2012, Cognizant
Executive Summary

• BYOD Drivers

• BYOD Benefits

• Implementation Challenges

• Overcoming BYOD Barriers

• Creating A Holistic BYOD Strategy and Policy

• Transitioning to BYOD

• BYOD’s Future




  2   | ©2012, Cognizant
Primary BYOD Drivers

Employees are increasingly using personal devices to access business applications.
    Devices Used to Access Business Applications


                                  2010                                                           2011




                                            30.7%                                                          40.7%
                                         Personal PC,                                                   Personal PC,
                                         smartphone                                                     smartphone,
                                                                                        59.3%
                                                                                                           tablet
                                                                                      Business PC,
                         69.3%                                                        smartphone,
                       Business PC,                                                      tablet
                       smartphone




                                                      Personally-owned   Company-owned


Base for 2010: 2,820 responses from enterprises with                           Base for 2011: Over 3,000 Information workers and
500 or more employees from 10 countries.                                       business executives from nine countries.

Source: IDC Information Worker Custom Survey, May 2011 and May 2010.


   3   | ©2012, Cognizant
Primary BYOD Drivers
Financial services, insurance, healthcare and professional services are leading BYOD demand and
adoption.
  BYOD Support By Industry




Source: Good Technology


   4   | ©2012, Cognizant
BYOD Benefits
Employees and organizations benefit from BYOD




Base: 700 IT professionals in seven countries, including Australia,   Percent of respondents
Canada, Germany, India, Netherlands, U.S. and UK.


Source: Citrix Global BYO Index


   5   | ©2012, Cognizant
BYOD Benefits
Easy to attract, retain and support new talent
       Business Staff Will Expect To Be More Self-Sufficient And Empowered                                     By 2020, 45% of
                                                                                                               your workforce
                                                                                                               will be Millennials.†
                                                                                        34% of
                                                                                        Millennials
                                                                                        say they
                                                                                        have better
                                                                        22% of your     technology
                                                                        employees       at home
                                                                        have used a     than they                       Empowered,
                                                                        service         have at                         tech-savvy
  Millennials                                                           delivered       work.*                          employees
    in the                                              39% of          over the Web
  workforce                                             Millennials     to help them
                                                                        get their job
                                                        select their
                                                                        done.*
                                                        own mobile
                                                        phone -
                                        66% of your     regardless of
                                        employees       what IT
                                        select their    support.*
                                        own mobile
                                        phone. *




 * Source: Forrsights Workforce Employee Survey, Q3 2010, † Source: Bureau of Labor Statistics and Forrester Research

Source: Forrester Research, Inc.


   6   | ©2012, Cognizant
Implementation Challenges

BYOD creates complexities that overwhelms
many organizations:

• Protecting Data

• Ensuring Security

• Providing Support

• BYOD Costs

• Compliance Requirements




  7   | ©2012, Cognizant
Overcoming BYOD Barriers

Have a robust, scalable, platform- and
OS-agnostic BYOD infrastructure to limit

•Security breaches

•Minimize organization support to and
management of employee-owned devices




  8   | ©2012, Cognizant
Overcoming BYOD Barriers

• Manage the complexity of a BYOD environment through intelligent
  provisioning of infrastructure.

• Use virtualization

      • Provide access to corporate data and enterprise applications
        from a centralized location.

      • Eliminate the IT and business costs of customizing apps and
        creating access mechanisms.




  9   | ©2012, Cognizant
Overcoming BYOD Barriers

Use “containerization”

• Separate corporate data into secure “container” structures
  on devices to have full control over them.

• Monitor the corporate applications and data effectively and
  securely.




 10   | ©2012, Cognizant
Overcoming BYOD Barriers

Use encryption

• Provide a strong layer of security for devices, applications
  and data.

• Make it difficult for anyone to view and obtain data from
  lost devices without the encryption key.




 11   | ©2012, Cognizant
Overcoming BYOD Barriers

Embrace a limited BYOD model

• Evaluate the device requirements of employees based on their
  roles and limit device support.

• Alleviate concerns over security, support issues and costs by
  allowing only secure and compliant personal devices for work.




 12   | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy
BYOD Strategy Essentials

• Understand employee roles and how they
  relate to the use of mobile devices at work.

• Create broad categories of users based on
  the kind of work they do and IT infrastructure
  to support them.

• Specify the kind of device configurations,
  preferred vendors and brands that support
  your business needs.

• Provide the right mix of enablement and
  control to employees and the company
  over personal devices and their usage.

• Balance enablement with control using
  mobile device management, mobile
  application management and mobile
  application development platform solutions.

• Customize, develop and update applications
  to work with personal devices.


 13   | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy




                          Key Takeaway

                          The BYOD strategy needs to be all-inclusive and balance the
                          risks and rewards for employees and employers.




14   | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy
                                              Understand Liability
                                             Employee vs. Company


 • Better control over devices                 Corporate
                                                                  Corporate         • Reduced IT overhead
   can be applied (blocking of                                     Liable,
                                                 Liable,
                                                                  Complete
   marketplace applications,                    Capped                              • Reduced device
                                                                  Expenses
   etc.)                                        Expense
                                                                     Paid             procurement cost
                                                                                      (Cap-Ex)
 • Better security
                                                                                    • Better choice of device
 • Comparatively easier for                                       Individual
                                               Individual
   enforcing policy and                                             Liable,         • Challenges in deploying
                                                 Liable,
   compliance                                                     Complete            corporate applications
                                               No/Capped
                                                                  Expenses
                                                Expense                               due to non-
                                                                     Paid
 • Need for application license                                                       standardization of OS
   management


                                      • Better control over expenditure

                                      • Reduced device running cost (direct Op-Ex cost)

              Corporate liable devices are recommended for environments with higher data security risks
              (e.g., financial services); individual liable devices are recommended for environments with
                                              lower data risks (e.g., education).

Source: Cognizant


 15    | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy

Balance risks and rewards for employees and employers

•Transition to BYOD only after your organization assesses the
net benefits it expects to realize from the initiative.

•Determine the liability your organization is willing to assume as
well as the tax and legal implications of allowing BYOD.




 16   | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy

Balance risks and rewards for employees and
employers

•Put in place a robust BYOD support model. Use
a mix of sourcing, automation and strong
technical customer support

•Take a middle path between the two extremes
of the complete freedom that employees
desire and the full control that organizations seek
over usage of personal devices for work.




 17   | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy

Define and understand factors such as:

•Which devices and operating systems to support.

•Security requirements based on employee role and designation.

•The level of risk organizations are willing to tolerate.

•Employee privacy concerns.

•Understand the altering IT environment.




 18   | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy
Defining BYOD Policies

                          Traditional
Policy Element            IT Policy                             BYOD Policy

Devices, device           Standardized.                         Complex and heterogeneous.
configurations and
operating systems

Mobile applications       Full command and control over         Limited control over corporate
and data                  data and apps.                        partitions, data and apps.

Device tracking and       Full IT control over evaluating how   Clarification of how devices are
monitoring                devices are used, with no express     tracked and monitored, as well as
                          permission required from users.       which portion of the devices and
                                                                data will fall under the policy’s
                                                                purview.

Cost reimbursement        No provision for reimbursement of     Definition of who pays for what,
                          company-owned device costs.           based on an understanding
                                                                between employees and
                                                                employer.




19   | ©2012, Cognizant
Creating A Holistic BYOD Strategy and Policy
A comprehensive BYOD policy framework covers:

Devices                                         Users

• Scalability of devices                        • Eligibility

• Device criteria                               • Acceptable usage

• Supported configurations                      • Compliance and governance
  and platforms
                                                • Ownership and liability
• Device certification
                                                • Reimbursement considerations
• Device support
                                                • Policy violations
• Security




20   | ©2012, Cognizant
Transitioning to BYOD

Provide employees with what they seek but with controls:

•Ensure employees have the right virtual workspace.

•Ensure effective security for corporate information and ease
of access.

•Categorize employees into broad pools based on their work
and IT requirements.

•Stream the right set of user profile, data and applications
on-demand, at the right performance levels and on any device,
securely.

•Implement a BYOD pilot to establish the reference architecture.




 21   | ©2012, Cognizant
Transitioning to BYOD
Defining User Profiles and Their Needs
                      Examples                 Typical Work Pattern                 IT Requirements

 Knowledge            Scientists, designers,   • Rich user experience, with         • Data security and compliance
 Workers              statisticians              multiple computer applications     • Flexibility to access multiple desktop computers
                                                 and tools running locally          • Application-specific security and regulatory
                                                                                      compliance efforts


 Office Workers       Admins, HR, finance      • Routine workflows, with multiple   • Data security and compliance
                                                 computer applications and tools    • PC integrity
                                                 running locally                    • Application-specific security and
                                                                                      regulatory compliance efforts


 Executive &          Function heads, sales    • Similar to knowledge/ office       • Data security and compliance
 Mobile Workers       reps                       workers                            • PC integrity
                                               • Offline computing                  • Application-specific security and regulatory
                                               • Anytime, anywhere access             compliance efforts
                                                                                    • Offline access to files and data

 Task Workers         Call center reps,        • Simplified and streamlined user    •   Data security and compliance
                      retail agents, factory     experience                         •   PC integrity
                      workers                  • No requirements to save data       •   Highly controlled environment
                                                 locally                            •   Low-cost hardware solution that maintains
                                                                                        high user productivity

 Contract Workers     External contractors,    • Local and remote access            • Data privacy and confidentiality
                      third-party                                                   • Low-cost hardware solution that maintains
                      collaborators                                                   high user productivity



Source: Cognizant


 22    | ©2012, Cognizant
Transitioning to BYOD
   Embrace BYOD in a phased manner




    Investment                    New Setup Implementation      Employee Onboarding
    ROI Analysis                                                Process

                                  •Build enabling
    •Baseline current TCO         infrastructure for solution   •Define trigger
    •Identify one-time            identified                    for onboarding
    investments                   •Finalize sourcing options    •Define policies
    •Assess ongoing cost with     •Define new support model     •Create implementation
    new model                                                   checklist
    •Go/no-go                                                   •Create communication
                                                                plans




Create a compliance audit framework to ensure success



Source: Cognizant


 23    | ©2012, Cognizant
Transitioning to BYOD

Embrace BYOD in a phased manner

•Measure the ROI – A better yardstick is to analyze the long term
returns and the possible value-additions from investments made
to enable and support BYOD.

•Include costs of setting up the required infrastructure to support the
program and reimbursements for device purchases.

•Examine and bolster the current infrastructure with the additional
capabilities required to support BYOD programs.

•A critical step – ensure that the employee onboarding process is
smooth and simple.




 24   | ©2012, Cognizant
BYOD’s Future

An opportunity with significant benefits, both tangible and intangible:

• Approach BYOD in a holistic fashion.

• The role of IT will transform from a support function to a strategic,
  business-enabling function.

• Take a proactive approach to embracing and molding your strategy.




25   | ©2012, Cognizant
BYOD’s Future

Implemented with the right strategy, BYOD can:

• Empower employees to improve their productivity through their choice of devices and
  collaboration styles.

• Ensure security of corporate data while complying with corporate mandates
  on compliance, risk management and privacy.

• Deliver cost savings with minimal IT support for employee-owned devices.

• Simplify IT by running any app, anywhere, on any device.




26   | ©2012, Cognizant
Thank You

              Author and Analyst
              Aala Santhosh Reddy, Senior Research Analyst, Cognizant Research Center



              Subject Matter Experts
              Jeff Wallace, Assistant Vice President and Cognizant Mobility Practice Leader
              Tim Rose, Associate Director, Cognizant IT Infrastructure Services Product Management
              Anindo Sengupta, Associate Director, Cognizant IT Infrastructure Services


              For more information / downloading the report, please visit
              http://www.cognizant.com/InsightsWhitepapers/Making-BYOD-Work-for-Your-Organization.pdf




©2012, Cognizant

Contenu connexe

Tendances

IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012Robert Sutor
 
Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...MaRS Discovery District
 
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...Saiful Hidayat
 
Telecom and employability skills for india
Telecom and employability skills for indiaTelecom and employability skills for india
Telecom and employability skills for indiaRishi Kapal
 
The untapped network
The untapped networkThe untapped network
The untapped networkJohn Nelson
 
Connected Lifestyle Solutions
Connected Lifestyle SolutionsConnected Lifestyle Solutions
Connected Lifestyle SolutionsAjay Hampapur
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissIBMSERBIA
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprexKim Aarenstrup
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteMasha Geller
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Enterprise
 

Tendances (19)

IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012
 
Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...
 
Lotusphere 2012 - The social business update
Lotusphere 2012 - The social business updateLotusphere 2012 - The social business update
Lotusphere 2012 - The social business update
 
IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
Telco Trends 2010 - Berlin Telco Summit
Telco Trends 2010 - Berlin Telco SummitTelco Trends 2010 - Berlin Telco Summit
Telco Trends 2010 - Berlin Telco Summit
 
Mobco session
Mobco sessionMobco session
Mobco session
 
Enterprise Grade BYOD
Enterprise Grade BYODEnterprise Grade BYOD
Enterprise Grade BYOD
 
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
 
Telecom and employability skills for india
Telecom and employability skills for indiaTelecom and employability skills for india
Telecom and employability skills for india
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
The untapped network
The untapped networkThe untapped network
The untapped network
 
Connected Lifestyle Solutions
Connected Lifestyle SolutionsConnected Lifestyle Solutions
Connected Lifestyle Solutions
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond Kiss
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
Greenplum hadoop
Greenplum hadoopGreenplum hadoop
Greenplum hadoop
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew Keynote
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for Business
 

En vedette

tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015tyntec
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!SolarWinds
 
SDN a strategic assessment
SDN a strategic assessment  SDN a strategic assessment
SDN a strategic assessment stefriche0199
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Diana Benner
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcareBitglass
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparisonPeter Hewer
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD ChecklistPip Cleaves
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD PlanSam Gliksman
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 
Energy, Work, and Simple Machines - Chapter 10
Energy, Work, and Simple Machines - Chapter 10Energy, Work, and Simple Machines - Chapter 10
Energy, Work, and Simple Machines - Chapter 10Galen West
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationCisco Services
 
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...Aruba, a Hewlett Packard Enterprise company
 

En vedette (18)

Intro to SDN - Part I
Intro to SDN - Part IIntro to SDN - Part I
Intro to SDN - Part I
 
tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
 
SDN a strategic assessment
SDN a strategic assessment  SDN a strategic assessment
SDN a strategic assessment
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparison
 
Intro to SDN - Part III
Intro to SDN - Part IIIIntro to SDN - Part III
Intro to SDN - Part III
 
Intro to SDN - Part IV
Intro to SDN - Part IVIntro to SDN - Part IV
Intro to SDN - Part IV
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD Checklist
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
Energy, Work, and Simple Machines - Chapter 10
Energy, Work, and Simple Machines - Chapter 10Energy, Work, and Simple Machines - Chapter 10
Energy, Work, and Simple Machines - Chapter 10
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
 

Similaire à Making BYOD Work for Your Organization

Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your OrganizationCognizant
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise MobilityCompTIA
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech WeekThe Judge Group
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsMasaf Dawood
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012StalwartAcademy
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) wipjam
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Caroline Lewko
 
Mobilising people and enterprise
Mobilising people and enterpriseMobilising people and enterprise
Mobilising people and enterprisePim Bilderbeek
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
The Future of Wireless Business Applications
The Future of Wireless Business ApplicationsThe Future of Wireless Business Applications
The Future of Wireless Business ApplicationsYankee Group
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learningeLearning Papers
 
BI4EC Microsoft
BI4EC MicrosoftBI4EC Microsoft
BI4EC MicrosoftPaulo Rita
 
UC Mobility Guide
UC Mobility GuideUC Mobility Guide
UC Mobility GuideLanair
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Crm as a business strategy
Crm as a business strategyCrm as a business strategy
Crm as a business strategySiska Bossuyt
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolIBM Danmark
 

Similaire à Making BYOD Work for Your Organization (20)

Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your Organization
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programs
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition)
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)
 
Mobilising people and enterprise
Mobilising people and enterpriseMobilising people and enterprise
Mobilising people and enterprise
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
The Future of Wireless Business Applications
The Future of Wireless Business ApplicationsThe Future of Wireless Business Applications
The Future of Wireless Business Applications
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learning
 
BI4EC Microsoft
BI4EC MicrosoftBI4EC Microsoft
BI4EC Microsoft
 
UC Mobility Guide
UC Mobility GuideUC Mobility Guide
UC Mobility Guide
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Crm as a business strategy
Crm as a business strategyCrm as a business strategy
Crm as a business strategy
 
BYOD
BYODBYOD
BYOD
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian Cagnol
 

Plus de Cognizant

Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Cognizant
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingCognizant
 
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesIt Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesCognizant
 
Intuition Engineered
Intuition EngineeredIntuition Engineered
Intuition EngineeredCognizant
 
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...Cognizant
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesCognizant
 
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateThe Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateCognizant
 
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...Cognizant
 
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Cognizant
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Cognizant
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityCognizant
 
Policy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersPolicy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersCognizant
 
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalThe Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalCognizant
 
AI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueAI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueCognizant
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachCognizant
 
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudFive Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudCognizant
 
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedGetting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedCognizant
 
Crafting the Utility of the Future
Crafting the Utility of the FutureCrafting the Utility of the Future
Crafting the Utility of the FutureCognizant
 
Utilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformUtilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformCognizant
 
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...Cognizant
 

Plus de Cognizant (20)

Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
 
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesIt Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
 
Intuition Engineered
Intuition EngineeredIntuition Engineered
Intuition Engineered
 
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
 
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateThe Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
 
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
 
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for Sustainability
 
Policy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersPolicy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for Insurers
 
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalThe Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
 
AI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueAI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to Value
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First Approach
 
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudFive Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the Cloud
 
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedGetting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
 
Crafting the Utility of the Future
Crafting the Utility of the FutureCrafting the Utility of the Future
Crafting the Utility of the Future
 
Utilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformUtilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data Platform
 
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
 

Dernier

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 

Dernier (20)

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 

Making BYOD Work for Your Organization

  • 1. Bring Your Own Device (BYOD) Making It Work for Your Organization Cognizant Research Center | June 2012 ©2012, Cognizant
  • 2. Executive Summary • BYOD Drivers • BYOD Benefits • Implementation Challenges • Overcoming BYOD Barriers • Creating A Holistic BYOD Strategy and Policy • Transitioning to BYOD • BYOD’s Future 2 | ©2012, Cognizant
  • 3. Primary BYOD Drivers Employees are increasingly using personal devices to access business applications. Devices Used to Access Business Applications 2010 2011 30.7% 40.7% Personal PC, Personal PC, smartphone smartphone, 59.3% tablet Business PC, 69.3% smartphone, Business PC, tablet smartphone Personally-owned Company-owned Base for 2010: 2,820 responses from enterprises with Base for 2011: Over 3,000 Information workers and 500 or more employees from 10 countries. business executives from nine countries. Source: IDC Information Worker Custom Survey, May 2011 and May 2010. 3 | ©2012, Cognizant
  • 4. Primary BYOD Drivers Financial services, insurance, healthcare and professional services are leading BYOD demand and adoption. BYOD Support By Industry Source: Good Technology 4 | ©2012, Cognizant
  • 5. BYOD Benefits Employees and organizations benefit from BYOD Base: 700 IT professionals in seven countries, including Australia, Percent of respondents Canada, Germany, India, Netherlands, U.S. and UK. Source: Citrix Global BYO Index 5 | ©2012, Cognizant
  • 6. BYOD Benefits Easy to attract, retain and support new talent Business Staff Will Expect To Be More Self-Sufficient And Empowered By 2020, 45% of your workforce will be Millennials.† 34% of Millennials say they have better 22% of your technology employees at home have used a than they Empowered, service have at tech-savvy Millennials delivered work.* employees in the 39% of over the Web workforce Millennials to help them get their job select their done.* own mobile phone - 66% of your regardless of employees what IT select their support.* own mobile phone. * * Source: Forrsights Workforce Employee Survey, Q3 2010, † Source: Bureau of Labor Statistics and Forrester Research Source: Forrester Research, Inc. 6 | ©2012, Cognizant
  • 7. Implementation Challenges BYOD creates complexities that overwhelms many organizations: • Protecting Data • Ensuring Security • Providing Support • BYOD Costs • Compliance Requirements 7 | ©2012, Cognizant
  • 8. Overcoming BYOD Barriers Have a robust, scalable, platform- and OS-agnostic BYOD infrastructure to limit •Security breaches •Minimize organization support to and management of employee-owned devices 8 | ©2012, Cognizant
  • 9. Overcoming BYOD Barriers • Manage the complexity of a BYOD environment through intelligent provisioning of infrastructure. • Use virtualization • Provide access to corporate data and enterprise applications from a centralized location. • Eliminate the IT and business costs of customizing apps and creating access mechanisms. 9 | ©2012, Cognizant
  • 10. Overcoming BYOD Barriers Use “containerization” • Separate corporate data into secure “container” structures on devices to have full control over them. • Monitor the corporate applications and data effectively and securely. 10 | ©2012, Cognizant
  • 11. Overcoming BYOD Barriers Use encryption • Provide a strong layer of security for devices, applications and data. • Make it difficult for anyone to view and obtain data from lost devices without the encryption key. 11 | ©2012, Cognizant
  • 12. Overcoming BYOD Barriers Embrace a limited BYOD model • Evaluate the device requirements of employees based on their roles and limit device support. • Alleviate concerns over security, support issues and costs by allowing only secure and compliant personal devices for work. 12 | ©2012, Cognizant
  • 13. Creating A Holistic BYOD Strategy and Policy BYOD Strategy Essentials • Understand employee roles and how they relate to the use of mobile devices at work. • Create broad categories of users based on the kind of work they do and IT infrastructure to support them. • Specify the kind of device configurations, preferred vendors and brands that support your business needs. • Provide the right mix of enablement and control to employees and the company over personal devices and their usage. • Balance enablement with control using mobile device management, mobile application management and mobile application development platform solutions. • Customize, develop and update applications to work with personal devices. 13 | ©2012, Cognizant
  • 14. Creating A Holistic BYOD Strategy and Policy Key Takeaway The BYOD strategy needs to be all-inclusive and balance the risks and rewards for employees and employers. 14 | ©2012, Cognizant
  • 15. Creating A Holistic BYOD Strategy and Policy Understand Liability Employee vs. Company • Better control over devices Corporate Corporate • Reduced IT overhead can be applied (blocking of Liable, Liable, Complete marketplace applications, Capped • Reduced device Expenses etc.) Expense Paid procurement cost (Cap-Ex) • Better security • Better choice of device • Comparatively easier for Individual Individual enforcing policy and Liable, • Challenges in deploying Liable, compliance Complete corporate applications No/Capped Expenses Expense due to non- Paid • Need for application license standardization of OS management • Better control over expenditure • Reduced device running cost (direct Op-Ex cost) Corporate liable devices are recommended for environments with higher data security risks (e.g., financial services); individual liable devices are recommended for environments with lower data risks (e.g., education). Source: Cognizant 15 | ©2012, Cognizant
  • 16. Creating A Holistic BYOD Strategy and Policy Balance risks and rewards for employees and employers •Transition to BYOD only after your organization assesses the net benefits it expects to realize from the initiative. •Determine the liability your organization is willing to assume as well as the tax and legal implications of allowing BYOD. 16 | ©2012, Cognizant
  • 17. Creating A Holistic BYOD Strategy and Policy Balance risks and rewards for employees and employers •Put in place a robust BYOD support model. Use a mix of sourcing, automation and strong technical customer support •Take a middle path between the two extremes of the complete freedom that employees desire and the full control that organizations seek over usage of personal devices for work. 17 | ©2012, Cognizant
  • 18. Creating A Holistic BYOD Strategy and Policy Define and understand factors such as: •Which devices and operating systems to support. •Security requirements based on employee role and designation. •The level of risk organizations are willing to tolerate. •Employee privacy concerns. •Understand the altering IT environment. 18 | ©2012, Cognizant
  • 19. Creating A Holistic BYOD Strategy and Policy Defining BYOD Policies Traditional Policy Element IT Policy BYOD Policy Devices, device Standardized. Complex and heterogeneous. configurations and operating systems Mobile applications Full command and control over Limited control over corporate and data data and apps. partitions, data and apps. Device tracking and Full IT control over evaluating how Clarification of how devices are monitoring devices are used, with no express tracked and monitored, as well as permission required from users. which portion of the devices and data will fall under the policy’s purview. Cost reimbursement No provision for reimbursement of Definition of who pays for what, company-owned device costs. based on an understanding between employees and employer. 19 | ©2012, Cognizant
  • 20. Creating A Holistic BYOD Strategy and Policy A comprehensive BYOD policy framework covers: Devices Users • Scalability of devices • Eligibility • Device criteria • Acceptable usage • Supported configurations • Compliance and governance and platforms • Ownership and liability • Device certification • Reimbursement considerations • Device support • Policy violations • Security 20 | ©2012, Cognizant
  • 21. Transitioning to BYOD Provide employees with what they seek but with controls: •Ensure employees have the right virtual workspace. •Ensure effective security for corporate information and ease of access. •Categorize employees into broad pools based on their work and IT requirements. •Stream the right set of user profile, data and applications on-demand, at the right performance levels and on any device, securely. •Implement a BYOD pilot to establish the reference architecture. 21 | ©2012, Cognizant
  • 22. Transitioning to BYOD Defining User Profiles and Their Needs Examples Typical Work Pattern IT Requirements Knowledge Scientists, designers, • Rich user experience, with • Data security and compliance Workers statisticians multiple computer applications • Flexibility to access multiple desktop computers and tools running locally • Application-specific security and regulatory compliance efforts Office Workers Admins, HR, finance • Routine workflows, with multiple • Data security and compliance computer applications and tools • PC integrity running locally • Application-specific security and regulatory compliance efforts Executive & Function heads, sales • Similar to knowledge/ office • Data security and compliance Mobile Workers reps workers • PC integrity • Offline computing • Application-specific security and regulatory • Anytime, anywhere access compliance efforts • Offline access to files and data Task Workers Call center reps, • Simplified and streamlined user • Data security and compliance retail agents, factory experience • PC integrity workers • No requirements to save data • Highly controlled environment locally • Low-cost hardware solution that maintains high user productivity Contract Workers External contractors, • Local and remote access • Data privacy and confidentiality third-party • Low-cost hardware solution that maintains collaborators high user productivity Source: Cognizant 22 | ©2012, Cognizant
  • 23. Transitioning to BYOD Embrace BYOD in a phased manner Investment New Setup Implementation Employee Onboarding ROI Analysis Process •Build enabling •Baseline current TCO infrastructure for solution •Define trigger •Identify one-time identified for onboarding investments •Finalize sourcing options •Define policies •Assess ongoing cost with •Define new support model •Create implementation new model checklist •Go/no-go •Create communication plans Create a compliance audit framework to ensure success Source: Cognizant 23 | ©2012, Cognizant
  • 24. Transitioning to BYOD Embrace BYOD in a phased manner •Measure the ROI – A better yardstick is to analyze the long term returns and the possible value-additions from investments made to enable and support BYOD. •Include costs of setting up the required infrastructure to support the program and reimbursements for device purchases. •Examine and bolster the current infrastructure with the additional capabilities required to support BYOD programs. •A critical step – ensure that the employee onboarding process is smooth and simple. 24 | ©2012, Cognizant
  • 25. BYOD’s Future An opportunity with significant benefits, both tangible and intangible: • Approach BYOD in a holistic fashion. • The role of IT will transform from a support function to a strategic, business-enabling function. • Take a proactive approach to embracing and molding your strategy. 25 | ©2012, Cognizant
  • 26. BYOD’s Future Implemented with the right strategy, BYOD can: • Empower employees to improve their productivity through their choice of devices and collaboration styles. • Ensure security of corporate data while complying with corporate mandates on compliance, risk management and privacy. • Deliver cost savings with minimal IT support for employee-owned devices. • Simplify IT by running any app, anywhere, on any device. 26 | ©2012, Cognizant
  • 27. Thank You Author and Analyst Aala Santhosh Reddy, Senior Research Analyst, Cognizant Research Center Subject Matter Experts Jeff Wallace, Assistant Vice President and Cognizant Mobility Practice Leader Tim Rose, Associate Director, Cognizant IT Infrastructure Services Product Management Anindo Sengupta, Associate Director, Cognizant IT Infrastructure Services For more information / downloading the report, please visit http://www.cognizant.com/InsightsWhitepapers/Making-BYOD-Work-for-Your-Organization.pdf ©2012, Cognizant