SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Viability of
Bring -Your–Own-                                      June 22
                                                      2011
Computer (BYOC)
Programs
 The confluence of powerful hand held devices, and a broadband network at
home has created the desire for employees to expect the same level of
connectedness in the enterprise space/workplace. Businesses are feeling the
pressure to develop a hybrid support approach that also includes Gen Y and Gen
Z workers, who are technology savvy and would like to use these devices in the   By: Masaf Dawood
workplace. What is un-clear is how some of the programs aimed at integrating
users own devices will work with the existing IT/framework and this paper
attempts to provide a balanced approach to analyze the problem and propose a
solution.
Executive Summary                                                   According to J.P. Morgan analyst Mark
                                                                    Markowitz tablet revenues will rise
The wide spread consumerization of IT has created a demand          to$24.9 billion in 2011 (up from $10.2
                                                                    billion this year) and that they’ll hit
for personal devices to be connected to the corporate networks      $34.1 billion in 2012. The iPad, which
and used in the workplace. This is on the heels of new              will make up for 89.4 percent of tablet
generation of workers who have grown up with the social media       revenues this year, will still account
                                                                    for a significant portion of total tablet
and are savvy with the usage of such tools/devices. Enterprises     revenues in the next few years. In
recognize this trend and, Bring-your-own-computer to the            2011, he predicts the iPad will account
                                                                    for 71.6 percent of tablet revenue,
workplace “BYOC”, programs are being piloted to assess the          and by 2012 it will still lead with 61.4
viability of the concept and address any issues as a result. This   percent.
introduces management challenges in terms of divergent
requirements of corporate vs. employee owned devices. The
program requires a careful analysis and review of the target
environment and user demographics to tailor a specific program
to meet the business needs.

A carefully blended approach is needed, that manages the
changing demographics in the workplace with the plethora of
new computing devices availability to address the data integrity
and security needs. This research note addresses the issues,
facing corporate IT departments in the process of implementing
BYOC programs, and outlines an approach that could assess the
viability of such programs.




                                                    2
An IDC study forecasts annual mobile
                                                                        app downloads to increase from 10.9
What is Bring-Your-Own-Computer “BYOC” ?                                billion in 2010 to nearly 76.9 billion in
                                                                        2014 as developers create apps for
                                                                        virtually every aspect of a mobile
The term Bring-Your-Own-Computer to work (BYOC) refers to the
                                                                        user's personal and business lives. In
employee owned computers connecting to the corporate                    addition to booming adoption of
networks. The devices are employee owned (purchased and                 smart phones around the world, new
provisioned) and employee is responsible for the device                 connected device categories including
                                                                        media tablets, eReaders, portable
subscription and associated services. The connectivity to the           media players, consumer electronics,
corporate network enables the employee to access application            TVs, automobiles, and eventually
and infrastructure resources on-demand, with the convenience            even PCs will all contribute to the
                                                                        enormous growth of mobile apps.
of a familiar and preferred user interface. The key differentiator
in usage of corporate vs. employee owned device is the user             "Mobile app developers will 'appify'
preference for the employee owned device. The employee                  just about every interaction you can
affinity for the device is driven in part by device interface and the   think of in your physical and digital
                                                                        worlds. The extension of mobile apps
built-in eco systems of apps and services.
                                                                        to every aspect of our personal and
                                                                        business lives will be one of the
                                                                        hallmarks of the new decade with
               Desktops                  Laptops                        enormous opportunities for virtually
                                                                        every business sector.”

                                BYOD
                                                                        Scott Ellison IDC - VP, Mobile and
                               Devices                                  Connected Consumer Platforms


                 Tablets               SmartPhones

While the desktops, and laptops has been around for over a
quarter century the tablets and smart phones are relatively new
arrivals, but they are growing steadily and swiftly. Laptop
shipments eclipsed desktop shipments and now the mobile
devices are taking the enterprise and consumer world by a
storm. See the mobile devices growth chart below from RBC capital
markets.




                                                      3
Demand Driver # 1 : The Appification of Board room and Family room

The rapid rise of mobile computing power with the widespread and persistent availability of wireless
networks has influenced the computing habits of current and future employees alike. The “C” level
executives usually are technology agnostic, but have flocked to the ipad and other tablet devices for
applications such as email, mobile web /news, social networking and updating their corporate blogs
amongst other things. The convenience, user-friendliness, and the penchant for the ever updating news
feeds, social interactions etc that we like fits with the information age lifestyle and the mobile devices
provide the medium with little or no effort/expense. The usage of the mobile computing devices at
home and for leisure far exceeds the business usage – however the business uses and applications are
catching up. The connected consumer at home is fully conversant with the tools and technologies and
constantly is evaluating the tools, offerings and new services. The velocity of downloads has taken the
most optimists by storm and apple apps store has crossed 5B downloads last year. This demonstrates
the enormous demand and an unsatisfying appetite for consuming more of these apps. The key driver
for productivity in the personal spaces and spilling over to the corporate space is the appification and or
proliferation of mobile apps running on employee owned devices.

Demand Driver # 2: Workplace or Workspace – what the heck is it…

The acceptance of the remote worker or tele-worker in the workplace is a credentialed activity and
routinely people work remotely to provide same services as they would do if they were on-site.
Companies have resorted to shared cubicles, in this age of cost cutting to trim necessary overheads
including expensive downtown real estate. The benefits to employee are zero or no travel costs and
more productive time with the flexibility of their own schedule. Essentially workplace has changed to
workspace in terms of the ability to connect and perform the same productivity tasks as if on-site. This is
also enabled in part by the mobile devices and or laptops using traditional secured connection protocols.

Benefits to the enterprise

The benefits to an enterprise are a combination of “Soft” (motivational) and “Hard” ($ value) savings
that will evolve over time as the implementation matures and scope increases to cover the entire set of
employees (vs. subset). The immediate value realization may be in terms of employee satisfaction and
empowerment that could lead to higher productivity in the workspace and foster innovation. Some of
the potential IT service benefits are listed in the table below:

Reduced Cost of IT       Reduced IT support                 Flexibility            Less Field Services
   equipment          requirements(less tickets)

Reduced Software         Single/Consolidated            Enterprise refresh        Less On-site support
  License Costs               Image set                  program savings

  Heterogeneous               Innovation           Reduced Depot services      Employee Empowerment
   environment

                                                    4
What about IT folks…?

The IT folks are concerned, nervous and unsure of the potential and the associated risk BYOC programs
can bring in the enterprise. After all, the devices are owned by the employees and when the employee
connects the device to corporate networks – is against the conventional IT wisdom and policies and
procedures. The employee may run the risk of data theft, corruption, loss and or other security policy
violations. It is turning upside down the traditional view of a corporate device. In the face of these
concerns and un-resolved problems, the technology is being brokered downstream to IT with its
sponsors in the boardroom and supporters in the cubicles. With the current devices we have today that
have USB and CDrom’s and are connected to the internet, the potential of downloads/uploads and
possibility of corruption/data loss exists. The biggest fear is around three areas - “lack of control”
“service assurance”, as well “data privacy and security”. We manage and improve continuously to
provide a better, safer and robust IT environment. Historically connectivity is based on managing the risk
associated with these interactions using the standardization of the devices, operating systems, and tools
that has led us to evolve to this level of collaboration. Now it seems we may be on cusp of the next
generation of productivity in the enterprise and employee owned/mobile devices may be acting as a
catalyst to ignite this. The perceived and real risks needs to be managed by crafting a program to pilot
the BYOC program and stress testing the proposed approach as well learning from the pilot outcomes in
terms of key areas of concerns. However before the pilot is considered – we need to make sure there is
a game plan for management of employee owned mobile devices.

Do you have an MDM Strategy….

The enterprise needs to have a Mobile Device Management Strategy that provides provisioning,
configuration, security, policy management, and software distribution, for smart phones, tablets and
other mobile devices. The underlying architecture should take into account the specific and unique
needs of the business in terms of regulatory, security and data privacy requirements. Some of the other
core capabilities that are required are remote wipe, device tracking, voice and data usage, support and
troubleshooting functions. The landscape of vendors is growing with some of the core capabilities
maturing in this space while the additional capabilities are being developed. The capabilities should
include management layer for managing multiple mobile device operating systems to include ios,
Windows, and Android.

A risk managed approach

In order to test the viability and feasibility of BYOC program in an enterprise – a careful approach is
needed that manages the value against the potential deployment risk. Based on the demand at the
enterprise level – the implementation team may develop a “Proof of Concept” strategy to stress test the
viability of such a program. The selected employees should be voluntarily participating in the program
and would generally be technology savvy and motivated to see this thru and live thru the growing pains.
The focus should be on developing the required policies and procedures that facilitate the adoption of
BYOC devices into the workspace while providing the necessary checks and balances IT needs to manage
the risk associated with the introduction of these devices. The service delivery model of such devices
should also be tested and options evaluated during the course of the pilot program.




                                                    5
The following points highlight the key steps in implementing the proposed program:

a) Identify the appropriate worker/employee to participate
    o Not all employees would be suitable or open to participation.
    o Identify the employee based on the request/need and profile
b) Define the overall roadmap of BYOC program
       o Lay out the timeline for initial POC “Proof of concept”
       o Identify the pilot duration and business unit’s participation
       o Draft an enterprise wide program availability (subject to poc, pilot findings)
c) Implement the MDM strategy
       o Security management
       o Policy management
       o Inventory management
       o Software distribution and service management
d) Define device requirements
       o 3 year support contract/24 hours loaner in case of breakdown
       o Antivirus (AV)update enabled
       o Partitioning Ability
       o Software distribution and service management capability
d) Define service management model
       o Define the support model
       o Define the SLA’s
       o Solution for Self-Serve (shift left)
       o Define the roles and responsibilities (RACI)
e) Findings
       o Update the processes and procedures based on the findings
       o Document lessons learned
       o Execute the next steps


Conclusion

The viability of BYOC devices to work is a viable solution that holds the promise of greater collaboration
and more enterprise productivity in the workspace. The continued proliferation of handheld devices will
drive the demand for integration with the corporate networks. Enterprises need to be ready for such
employee requests and can get a head start if they pilot a program with specific objectives and criteria
in mind.




                                                       6

Contenu connexe

Tendances

Consumerization of the Enterprise (Subscribed13)
Consumerization of the Enterprise (Subscribed13)Consumerization of the Enterprise (Subscribed13)
Consumerization of the Enterprise (Subscribed13)Zuora, Inc.
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwCarolineFlamand
 
E2 lennertdewaal
E2 lennertdewaalE2 lennertdewaal
E2 lennertdewaalStrategy
 
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...Faruk Emre Güngör
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce Partners
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICEMicrosoft India
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Fjord digital trends 2012
Fjord digital trends 2012Fjord digital trends 2012
Fjord digital trends 2012Fjord
 
Untethered employees: The evolution of a wireless workplace
Untethered employees: The evolution of a wireless workplaceUntethered employees: The evolution of a wireless workplace
Untethered employees: The evolution of a wireless workplaceThe Economist Media Businesses
 
The Future of Meetings is Going Mobile
The Future of Meetings is Going Mobile The Future of Meetings is Going Mobile
The Future of Meetings is Going Mobile MeetingMogul
 
collaboration_with_mobile_uc_article
collaboration_with_mobile_uc_articlecollaboration_with_mobile_uc_article
collaboration_with_mobile_uc_articleAyham Kochaji
 
Upgrade Your Daily Grind With Mobile Compatibility
Upgrade Your Daily Grind With Mobile CompatibilityUpgrade Your Daily Grind With Mobile Compatibility
Upgrade Your Daily Grind With Mobile CompatibilityLiveTiles
 

Tendances (18)

Consumerization of the Enterprise (Subscribed13)
Consumerization of the Enterprise (Subscribed13)Consumerization of the Enterprise (Subscribed13)
Consumerization of the Enterprise (Subscribed13)
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lw
 
E2 lennertdewaal
E2 lennertdewaalE2 lennertdewaal
E2 lennertdewaal
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Tech Trends 2012
Tech Trends 2012Tech Trends 2012
Tech Trends 2012
 
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
Driving maximum value_from_mobile_technology_(en) for aerospace & defense ind...
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 
Unplugged
UnpluggedUnplugged
Unplugged
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Fjord digital trends 2012
Fjord digital trends 2012Fjord digital trends 2012
Fjord digital trends 2012
 
Untethered employees: The evolution of a wireless workplace
Untethered employees: The evolution of a wireless workplaceUntethered employees: The evolution of a wireless workplace
Untethered employees: The evolution of a wireless workplace
 
The Future of Meetings is Going Mobile
The Future of Meetings is Going Mobile The Future of Meetings is Going Mobile
The Future of Meetings is Going Mobile
 
collaboration_with_mobile_uc_article
collaboration_with_mobile_uc_articlecollaboration_with_mobile_uc_article
collaboration_with_mobile_uc_article
 
IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
Upgrade Your Daily Grind With Mobile Compatibility
Upgrade Your Daily Grind With Mobile CompatibilityUpgrade Your Daily Grind With Mobile Compatibility
Upgrade Your Daily Grind With Mobile Compatibility
 

En vedette

Livioon fragrancelist
Livioon fragrancelistLivioon fragrancelist
Livioon fragrancelistRomana123456
 
Satışcıların Ödünlendirilmesi
Satışcıların ÖdünlendirilmesiSatışcıların Ödünlendirilmesi
Satışcıların ÖdünlendirilmesiKeskin Bicak
 
Resumen tema 13 de ciencias de la tierra y medioambientales
Resumen tema 13 de ciencias de la tierra y medioambientalesResumen tema 13 de ciencias de la tierra y medioambientales
Resumen tema 13 de ciencias de la tierra y medioambientalesDavid Leunda
 
Batman o longo dia das bruxas 05
Batman   o longo dia das bruxas 05Batman   o longo dia das bruxas 05
Batman o longo dia das bruxas 05Marcos Donato
 
Diseño basico etapa 2
Diseño basico etapa 2Diseño basico etapa 2
Diseño basico etapa 2MARVINCOMIC7
 
Feedback Management Guide (Deutsch)
Feedback Management Guide (Deutsch)Feedback Management Guide (Deutsch)
Feedback Management Guide (Deutsch)Spectos GmbH
 
satışcının eğitimi
satışcının eğitimisatışcının eğitimi
satışcının eğitimiKeskin Bicak
 
Diapositivas biodiversidad
Diapositivas biodiversidadDiapositivas biodiversidad
Diapositivas biodiversidad23052008
 
Satiş tahmini satiş kotasi
Satiş tahmini satiş kotasiSatiş tahmini satiş kotasi
Satiş tahmini satiş kotasiKeskin Bicak
 
öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...
öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...
öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...bahahfz
 
Instructivo final manejo catalogo, actividad 4
Instructivo final manejo catalogo, actividad  4Instructivo final manejo catalogo, actividad  4
Instructivo final manejo catalogo, actividad 4Claudia Muñoz
 

En vedette (20)

Solvay
SolvaySolvay
Solvay
 
El Kremlin
El KremlinEl Kremlin
El Kremlin
 
Constitutia - un privilegiu al tuturor
Constitutia - un privilegiu al tuturorConstitutia - un privilegiu al tuturor
Constitutia - un privilegiu al tuturor
 
Livioon fragrancelist
Livioon fragrancelistLivioon fragrancelist
Livioon fragrancelist
 
Redação
RedaçãoRedação
Redação
 
Satışcıların Ödünlendirilmesi
Satışcıların ÖdünlendirilmesiSatışcıların Ödünlendirilmesi
Satışcıların Ödünlendirilmesi
 
Resumen tema 13 de ciencias de la tierra y medioambientales
Resumen tema 13 de ciencias de la tierra y medioambientalesResumen tema 13 de ciencias de la tierra y medioambientales
Resumen tema 13 de ciencias de la tierra y medioambientales
 
Batman o longo dia das bruxas 05
Batman   o longo dia das bruxas 05Batman   o longo dia das bruxas 05
Batman o longo dia das bruxas 05
 
Goldfields
GoldfieldsGoldfields
Goldfields
 
Diseño basico etapa 2
Diseño basico etapa 2Diseño basico etapa 2
Diseño basico etapa 2
 
R.th.5 skbb baru
R.th.5 skbb baruR.th.5 skbb baru
R.th.5 skbb baru
 
Feedback Management Guide (Deutsch)
Feedback Management Guide (Deutsch)Feedback Management Guide (Deutsch)
Feedback Management Guide (Deutsch)
 
Digi Aula
Digi AulaDigi Aula
Digi Aula
 
satışcının eğitimi
satışcının eğitimisatışcının eğitimi
satışcının eğitimi
 
Diapositivas biodiversidad
Diapositivas biodiversidadDiapositivas biodiversidad
Diapositivas biodiversidad
 
Satiş tahmini satiş kotasi
Satiş tahmini satiş kotasiSatiş tahmini satiş kotasi
Satiş tahmini satiş kotasi
 
öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...
öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...
öğRetim teknolojileri ve materyal tasarımı ödevi okul öncesi öğretmenliği 2. ...
 
OS UROS
OS UROSOS UROS
OS UROS
 
Hymnsheet for the 1st Anual Thanksgiving Service - 2014
Hymnsheet for the 1st Anual Thanksgiving Service - 2014Hymnsheet for the 1st Anual Thanksgiving Service - 2014
Hymnsheet for the 1st Anual Thanksgiving Service - 2014
 
Instructivo final manejo catalogo, actividad 4
Instructivo final manejo catalogo, actividad  4Instructivo final manejo catalogo, actividad  4
Instructivo final manejo catalogo, actividad 4
 

Similaire à Analyzing the Viability of BYOC Programs

Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
Micro focus visual cobol & mainframe solution information
Micro focus visual cobol & mainframe solution informationMicro focus visual cobol & mainframe solution information
Micro focus visual cobol & mainframe solution informationMicro Focus
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderOKTOPUS Consulting
 
Whitepaper vision on mobile, mobility, clouds and the enterprise of tomorrow
Whitepaper vision on mobile, mobility, clouds and the enterprise of tomorrowWhitepaper vision on mobile, mobility, clouds and the enterprise of tomorrow
Whitepaper vision on mobile, mobility, clouds and the enterprise of tomorrowMichel van den Berg
 
UnifiedCommunication
UnifiedCommunicationUnifiedCommunication
UnifiedCommunicationEmma Alsop
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023XDuce Corporation
 
Unified-Communications-IPSolutions
Unified-Communications-IPSolutionsUnified-Communications-IPSolutions
Unified-Communications-IPSolutionsYaz Mistry
 
Mobile application Trends in 2021
Mobile application Trends in 2021Mobile application Trends in 2021
Mobile application Trends in 2021Anirudhmishra19
 
Domaincer presentation
Domaincer presentationDomaincer presentation
Domaincer presentationKennithRecardo
 
Mobile Application Trends of 2021
Mobile Application Trends of 2021  Mobile Application Trends of 2021
Mobile Application Trends of 2021 KennithRecardo
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023XDuce Corporation
 
Low Code Platforms - Ebook
Low Code Platforms - EbookLow Code Platforms - Ebook
Low Code Platforms - EbookWaveMaker, Inc.
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTTekRevol LLC
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learningeLearning Papers
 
Top 7 Digital Transformation Trends to Watch Out in 2021
Top 7 Digital Transformation Trends to Watch Out in 2021Top 7 Digital Transformation Trends to Watch Out in 2021
Top 7 Digital Transformation Trends to Watch Out in 2021BusinessDevelopment35
 
Att uc newsletter issue 3
Att uc newsletter   issue 3Att uc newsletter   issue 3
Att uc newsletter issue 3Eric Sineath
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxsreevidyaopenteq
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionPaul Van Doorn
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperAbhishek Sood
 

Similaire à Analyzing the Viability of BYOC Programs (20)

Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
Micro focus visual cobol & mainframe solution information
Micro focus visual cobol & mainframe solution informationMicro focus visual cobol & mainframe solution information
Micro focus visual cobol & mainframe solution information
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
 
Whitepaper vision on mobile, mobility, clouds and the enterprise of tomorrow
Whitepaper vision on mobile, mobility, clouds and the enterprise of tomorrowWhitepaper vision on mobile, mobility, clouds and the enterprise of tomorrow
Whitepaper vision on mobile, mobility, clouds and the enterprise of tomorrow
 
UnifiedCommunication
UnifiedCommunicationUnifiedCommunication
UnifiedCommunication
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Unified-Communications-IPSolutions
Unified-Communications-IPSolutionsUnified-Communications-IPSolutions
Unified-Communications-IPSolutions
 
Mobile application Trends in 2021
Mobile application Trends in 2021Mobile application Trends in 2021
Mobile application Trends in 2021
 
Domaincer presentation
Domaincer presentationDomaincer presentation
Domaincer presentation
 
Mobile Application Trends of 2021
Mobile Application Trends of 2021  Mobile Application Trends of 2021
Mobile Application Trends of 2021
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Low Code Platforms - Ebook
Low Code Platforms - EbookLow Code Platforms - Ebook
Low Code Platforms - Ebook
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learning
 
Top 7 Digital Transformation Trends to Watch Out in 2021
Top 7 Digital Transformation Trends to Watch Out in 2021Top 7 Digital Transformation Trends to Watch Out in 2021
Top 7 Digital Transformation Trends to Watch Out in 2021
 
Att uc newsletter issue 3
Att uc newsletter   issue 3Att uc newsletter   issue 3
Att uc newsletter issue 3
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
 

Plus de Masaf Dawood

Outsourcing life cycle
Outsourcing life cycleOutsourcing life cycle
Outsourcing life cycleMasaf Dawood
 
Service delivery and Estimania
Service delivery and EstimaniaService delivery and Estimania
Service delivery and EstimaniaMasaf Dawood
 
Service delivery Relationship Management
Service delivery Relationship ManagementService delivery Relationship Management
Service delivery Relationship ManagementMasaf Dawood
 
Service delivery and Project management
Service delivery and Project managementService delivery and Project management
Service delivery and Project managementMasaf Dawood
 
Service delivery governance
Service delivery governanceService delivery governance
Service delivery governanceMasaf Dawood
 
Service delivery management
Service delivery managementService delivery management
Service delivery managementMasaf Dawood
 

Plus de Masaf Dawood (6)

Outsourcing life cycle
Outsourcing life cycleOutsourcing life cycle
Outsourcing life cycle
 
Service delivery and Estimania
Service delivery and EstimaniaService delivery and Estimania
Service delivery and Estimania
 
Service delivery Relationship Management
Service delivery Relationship ManagementService delivery Relationship Management
Service delivery Relationship Management
 
Service delivery and Project management
Service delivery and Project managementService delivery and Project management
Service delivery and Project management
 
Service delivery governance
Service delivery governanceService delivery governance
Service delivery governance
 
Service delivery management
Service delivery managementService delivery management
Service delivery management
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Analyzing the Viability of BYOC Programs

  • 1. Viability of Bring -Your–Own- June 22 2011 Computer (BYOC) Programs The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the By: Masaf Dawood workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
  • 2. Executive Summary According to J.P. Morgan analyst Mark Markowitz tablet revenues will rise The wide spread consumerization of IT has created a demand to$24.9 billion in 2011 (up from $10.2 billion this year) and that they’ll hit for personal devices to be connected to the corporate networks $34.1 billion in 2012. The iPad, which and used in the workplace. This is on the heels of new will make up for 89.4 percent of tablet generation of workers who have grown up with the social media revenues this year, will still account for a significant portion of total tablet and are savvy with the usage of such tools/devices. Enterprises revenues in the next few years. In recognize this trend and, Bring-your-own-computer to the 2011, he predicts the iPad will account for 71.6 percent of tablet revenue, workplace “BYOC”, programs are being piloted to assess the and by 2012 it will still lead with 61.4 viability of the concept and address any issues as a result. This percent. introduces management challenges in terms of divergent requirements of corporate vs. employee owned devices. The program requires a careful analysis and review of the target environment and user demographics to tailor a specific program to meet the business needs. A carefully blended approach is needed, that manages the changing demographics in the workplace with the plethora of new computing devices availability to address the data integrity and security needs. This research note addresses the issues, facing corporate IT departments in the process of implementing BYOC programs, and outlines an approach that could assess the viability of such programs. 2
  • 3. An IDC study forecasts annual mobile app downloads to increase from 10.9 What is Bring-Your-Own-Computer “BYOC” ? billion in 2010 to nearly 76.9 billion in 2014 as developers create apps for virtually every aspect of a mobile The term Bring-Your-Own-Computer to work (BYOC) refers to the user's personal and business lives. In employee owned computers connecting to the corporate addition to booming adoption of networks. The devices are employee owned (purchased and smart phones around the world, new provisioned) and employee is responsible for the device connected device categories including media tablets, eReaders, portable subscription and associated services. The connectivity to the media players, consumer electronics, corporate network enables the employee to access application TVs, automobiles, and eventually and infrastructure resources on-demand, with the convenience even PCs will all contribute to the enormous growth of mobile apps. of a familiar and preferred user interface. The key differentiator in usage of corporate vs. employee owned device is the user "Mobile app developers will 'appify' preference for the employee owned device. The employee just about every interaction you can affinity for the device is driven in part by device interface and the think of in your physical and digital worlds. The extension of mobile apps built-in eco systems of apps and services. to every aspect of our personal and business lives will be one of the hallmarks of the new decade with Desktops Laptops enormous opportunities for virtually every business sector.” BYOD Scott Ellison IDC - VP, Mobile and Devices Connected Consumer Platforms Tablets SmartPhones While the desktops, and laptops has been around for over a quarter century the tablets and smart phones are relatively new arrivals, but they are growing steadily and swiftly. Laptop shipments eclipsed desktop shipments and now the mobile devices are taking the enterprise and consumer world by a storm. See the mobile devices growth chart below from RBC capital markets. 3
  • 4. Demand Driver # 1 : The Appification of Board room and Family room The rapid rise of mobile computing power with the widespread and persistent availability of wireless networks has influenced the computing habits of current and future employees alike. The “C” level executives usually are technology agnostic, but have flocked to the ipad and other tablet devices for applications such as email, mobile web /news, social networking and updating their corporate blogs amongst other things. The convenience, user-friendliness, and the penchant for the ever updating news feeds, social interactions etc that we like fits with the information age lifestyle and the mobile devices provide the medium with little or no effort/expense. The usage of the mobile computing devices at home and for leisure far exceeds the business usage – however the business uses and applications are catching up. The connected consumer at home is fully conversant with the tools and technologies and constantly is evaluating the tools, offerings and new services. The velocity of downloads has taken the most optimists by storm and apple apps store has crossed 5B downloads last year. This demonstrates the enormous demand and an unsatisfying appetite for consuming more of these apps. The key driver for productivity in the personal spaces and spilling over to the corporate space is the appification and or proliferation of mobile apps running on employee owned devices. Demand Driver # 2: Workplace or Workspace – what the heck is it… The acceptance of the remote worker or tele-worker in the workplace is a credentialed activity and routinely people work remotely to provide same services as they would do if they were on-site. Companies have resorted to shared cubicles, in this age of cost cutting to trim necessary overheads including expensive downtown real estate. The benefits to employee are zero or no travel costs and more productive time with the flexibility of their own schedule. Essentially workplace has changed to workspace in terms of the ability to connect and perform the same productivity tasks as if on-site. This is also enabled in part by the mobile devices and or laptops using traditional secured connection protocols. Benefits to the enterprise The benefits to an enterprise are a combination of “Soft” (motivational) and “Hard” ($ value) savings that will evolve over time as the implementation matures and scope increases to cover the entire set of employees (vs. subset). The immediate value realization may be in terms of employee satisfaction and empowerment that could lead to higher productivity in the workspace and foster innovation. Some of the potential IT service benefits are listed in the table below: Reduced Cost of IT Reduced IT support Flexibility Less Field Services equipment requirements(less tickets) Reduced Software Single/Consolidated Enterprise refresh Less On-site support License Costs Image set program savings Heterogeneous Innovation Reduced Depot services Employee Empowerment environment 4
  • 5. What about IT folks…? The IT folks are concerned, nervous and unsure of the potential and the associated risk BYOC programs can bring in the enterprise. After all, the devices are owned by the employees and when the employee connects the device to corporate networks – is against the conventional IT wisdom and policies and procedures. The employee may run the risk of data theft, corruption, loss and or other security policy violations. It is turning upside down the traditional view of a corporate device. In the face of these concerns and un-resolved problems, the technology is being brokered downstream to IT with its sponsors in the boardroom and supporters in the cubicles. With the current devices we have today that have USB and CDrom’s and are connected to the internet, the potential of downloads/uploads and possibility of corruption/data loss exists. The biggest fear is around three areas - “lack of control” “service assurance”, as well “data privacy and security”. We manage and improve continuously to provide a better, safer and robust IT environment. Historically connectivity is based on managing the risk associated with these interactions using the standardization of the devices, operating systems, and tools that has led us to evolve to this level of collaboration. Now it seems we may be on cusp of the next generation of productivity in the enterprise and employee owned/mobile devices may be acting as a catalyst to ignite this. The perceived and real risks needs to be managed by crafting a program to pilot the BYOC program and stress testing the proposed approach as well learning from the pilot outcomes in terms of key areas of concerns. However before the pilot is considered – we need to make sure there is a game plan for management of employee owned mobile devices. Do you have an MDM Strategy…. The enterprise needs to have a Mobile Device Management Strategy that provides provisioning, configuration, security, policy management, and software distribution, for smart phones, tablets and other mobile devices. The underlying architecture should take into account the specific and unique needs of the business in terms of regulatory, security and data privacy requirements. Some of the other core capabilities that are required are remote wipe, device tracking, voice and data usage, support and troubleshooting functions. The landscape of vendors is growing with some of the core capabilities maturing in this space while the additional capabilities are being developed. The capabilities should include management layer for managing multiple mobile device operating systems to include ios, Windows, and Android. A risk managed approach In order to test the viability and feasibility of BYOC program in an enterprise – a careful approach is needed that manages the value against the potential deployment risk. Based on the demand at the enterprise level – the implementation team may develop a “Proof of Concept” strategy to stress test the viability of such a program. The selected employees should be voluntarily participating in the program and would generally be technology savvy and motivated to see this thru and live thru the growing pains. The focus should be on developing the required policies and procedures that facilitate the adoption of BYOC devices into the workspace while providing the necessary checks and balances IT needs to manage the risk associated with the introduction of these devices. The service delivery model of such devices should also be tested and options evaluated during the course of the pilot program. 5
  • 6. The following points highlight the key steps in implementing the proposed program: a) Identify the appropriate worker/employee to participate o Not all employees would be suitable or open to participation. o Identify the employee based on the request/need and profile b) Define the overall roadmap of BYOC program o Lay out the timeline for initial POC “Proof of concept” o Identify the pilot duration and business unit’s participation o Draft an enterprise wide program availability (subject to poc, pilot findings) c) Implement the MDM strategy o Security management o Policy management o Inventory management o Software distribution and service management d) Define device requirements o 3 year support contract/24 hours loaner in case of breakdown o Antivirus (AV)update enabled o Partitioning Ability o Software distribution and service management capability d) Define service management model o Define the support model o Define the SLA’s o Solution for Self-Serve (shift left) o Define the roles and responsibilities (RACI) e) Findings o Update the processes and procedures based on the findings o Document lessons learned o Execute the next steps Conclusion The viability of BYOC devices to work is a viable solution that holds the promise of greater collaboration and more enterprise productivity in the workspace. The continued proliferation of handheld devices will drive the demand for integration with the corporate networks. Enterprises need to be ready for such employee requests and can get a head start if they pilot a program with specific objectives and criteria in mind. 6