SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
The BYOD
Opportunity
Say “Yes”to Device Diversity and Enable New Ways to
Drive Productivity
W H I T E P A P E R
The BYOD Opportunity
W H I T E P A P E R / 2
Table of Contents
Abstract. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
Introduction.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
A New Approach to BYOD .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
Positive Results.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
Preparing for BYOD.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
Strategic Transformation. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
Let’s Talk.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
W H I T E P A P E R / 3
The BYOD Opportunity
The BYOD Opportunity
Abstract
Research shows that the bring your own device (BYOD)
movement has reached a critical point: a range of studies show
that more than half of companies surveyed allow employees use
personally owned devices to access the corporate network. With
VMware as your partner for managing device diversity, you can
create a flexible yet secure BYOD environment that increases
efficiency, lowers operating costs and drives productivity.
Introduction
The bring your own device (BYOD) movement has gone
mainstream. Reports from Cisco, Computerworld, CompTIA,
Mobilisafe and others indicate that more than half of companies
surveyed now permit employee-owned devices in the
workplace—and in some sectors the numbers are much higher.
New companies are using BYOD as the foundation for their
network infrastructure, and a growing number of organizations
(including VMware) give employees complete freedom to
purchase and use their own devices to access corporate data.
The attraction of BYOD is easy to understand. Smartphones
and tablets offer an unprecedented level of flexibility, and
when employees buy their own devices, the company can
save hardware and IT support costs.
The drawbacks, of course, are security and manageability.
Personal devices could potentially infect the company network
with viruses, and private customer or company data can be
compromised if the device is lost or stolen. Employers also risk
becoming unwittingly responsible for liabilities beyond their
control: corporate assets might get mixed with personal data
such as family photos and music or, worse yet, with
downloaded applications that aren’t safe or in line with
company policy.
The challenge, then, is to implement a BYOD program that
supports device diversity while putting the proper safeguards in
place and keeping business and personal items separate. VMware
offers pioneering solutions for managing device diversity and
gives you the tools to create a BYOD environment that works
for everyone—employees and IT organizations alike.
A New Approach to BYOD
Our industry-leading solutions for end-user computing enable a
flexible yet secure BYOD environment. The VMware approach
links applications and customized virtual desktops to user
identities, not devices, so end users can access their data from
any qualified device, whether they’re working in the office or
halfway around the world. Corporate and personal digital
assets are kept separate in a secure and auditable way. IT
controls corporate digital assets, while end users manage
and maintain their personal applications and data.
This pragmatic approach to BYOD lets IT leverage hybrid cloud
resources to maintain a managed, secure end-user environment
while providing new ways for employees to collaborate. IT
maintains centralized control over policies, security and delivery
of content across devices. Employees can connect to the network
24/7 with the device of their choice—laptop, tablet or
smartphone—regardless of whether they’re using a Windows,
Mac OS, Linux, iOS or Android platform.
The networks that authenticate BYOD devices can be isolated so
users access only the data and applications they should. Isolation
minimizes the risk of malware coming onto the network, so IT
doesn’t need to worry if users have the latest versions of
firmware or other software on their personal devices. Readily
available third-party software can provide additional levels of
protection, such as mitigating the risks of cloud-based storage
systems or providing real-time activity monitoring. IT can apply
policies at individual or group levels, to ensure that single users
or whole departments with access to sensitive data operate
within stated guidelines. For example, IT can restrict USB
capabilities for finance employees, and can prevent social
security numbers or credit-card information displayed in text files
from being copied or printed.
Positive Results
The VMware model for BYOD can give employees the flexibility
to work the way they want, which can increase satisfaction and
productivity. End users move seamlessly from device to device
and location to location. They can work at any time, from any
place, and can connect to corporate systems with little or no
assistance from internal IT. Data remains secure with central
control of access to corporate systems and data.
When employees choose their own devices, IT spends less time
(and money) specifying and purchasing equipment. Routine
support and help-desk overhead that comes with device
ownership is directed at the retailer, manufacturer or service
provider—not corporate IT—and that can lower operational costs
and free up resources.
For instance, by leveraging desktop virtualization for BYOD, IT
can focus more on application and activity management and less
on hardware provisioning and maintenance. The ongoing shift
toward operating system–neutral applications will make it
easier to accommodate new and next-generation devices.
User configuration and management becomes simpler, so a new
user can be provisioned in just minutes. The IT organization
becomes more agile, taking less time to open (or close) offices
and, when necessary, moving faster to support mergers and
acquisitions. Even routine workforce additions and changes
become simpler to implement.
W H I T E P A P E R / 4
The BYOD Opportunity
Preparing for BYOD
Solid planning is the first step in any successful BYOD
implementation. End users expect seamless functionality from the
start, and it’s difficult to recover from even small glitches in the
initial rollout. After control over access to digital assets is given
away, it’s hard to take back. In most cases, IT has only one chance
to get BYOD right, so it’s important to have a detailed strategy
and design in place before the project begins.
The VMware Professional Services Organization (PSO) can help
IT organizations chart a course, so they don’t have to go it alone.
Our strategists and architects (many of them former chief
information officers, chief technology officers and industry
consultants) collaborate with your team to develop a pragmatic
IT strategy and a roadmap for transformation.
The planning process often starts with some internal housekeeping,
which lets IT revisit your current processes and eliminate outdated
methods. Our consultants can help you reappraise present status
and rationalize applications, keeping in mind that the tools
people use today might not be the tools they really need.
The next step is to consider how a BYOD environment will
change the way IT operates. Will the IT organization need
to change support models, the help desk or service-level
agreements (SLAs)? How will these changes affect IT staff?
What new skills and knowledge will people need? A confident,
competent IT staff yields savings in efficiency and cost, so
consider including an educational component in your plan.
VMware offers certifications, courses and online classes that
can help your staff get up to speed quickly on the new world
of BYOD.
While you’re evaluating the organization and preparing your
implementation plan, start thinking about future BYOD policies.
IT must assert the right to manage access from all devices,
whether they’re owned by the company or the user. Seek to
manage the minimum footprint required on the device; this
approach lets you manage less and manage better.
Beyond the standard policies for monitoring activity and
enforcing security, consider what defines acceptable use and
what will happen if the device is damaged, lost or stolen. For
example, policies might state the user’s obligation to ensure that
a suitable replacement device is made available within a certain
timeframe if a primary device becomes inoperable; users must
understand their responsibility to remain productive.
Likewise, policies might require that users report device loss or
theft within a certain time period, so that IT can intervene to
disable access and delete corporate data. IT’s right to take action
in emergencies—such as the right to remotely erase the device
if it is stolen—must also be made clear. The aim is to create
policies that protect corporate assets and limit liability while
maximizing the user’s ability to be productive, make decisions
and think creatively.
The VMware approach for BYOD lets you think less about
devices and more about the user experience and enabling
employees. This shift in focus, from devices to access and
activity, makes BYOD improvements more visible and easier to
measure. IT can be more responsive and operate more cost-
effectively, and is likely to be perceived as being more flexible
and more open.
Most important, the VMware approach to BYOD can make
the organization more productive, and that, in turn, can drive
profitability.
BYOD Success Story
Foley & Lardner LLP is a global law firm of approximately
2,100 employees that provides business and legal insight
to clients. Looking to support a highly mobile workforce
of lawyers and support staff, the company implemented
VMware® View™ as part of its BYOD program. Employees
can now access their virtual desktops and critical
applications from their mobile device of choice, including
iPads and laptops.
Linda D. Sanders, CIO for the firm, describes it this way:
“Today, our lawyers and staff can access their virtual
desktops at the office on thin clients, in the courtroom on
their iPads or anywhere on their personal PCs. As we look
beyond desktops, we see an opportunity to offer our
employees a secure way to access their applications,
share data and collaborate from any device based on the
VMware end-user computing portfolio.”
Foley & Lardner LLP
Industry:	Legal services
Location: Milwaukee, Wisconsin
Key Challenges
•	Accommodate reduction in IT staff.
•	Maintain high levels of end-user services.
•	Improve end-user system uptime.
Solution
Foley leveraged VMware View and VMware Professional
Services to deploy desktops as a service. The new
architecture also enables a BYOD model so that end users,
instead of IT, now procure and set up mobile devices.
Business Benefits
•	Reduced number of “tech touches.”
•	Reduced provisioning times from four hours to
ten minutes.
•	Improved uptime and availability to end users.
•	Cut mobile device costs by 22 percent.
W H I T E P A P E R / 5
The BYOD Opportunity
VMware Solutions for BYOD
Built on the foundation of VMware vSphere®, our portfolio
for BYOD includes technologies that help IT organizations
empower a more agile, productive and connected
enterprise:
•	VMware View – Simplifying the delivery of a better
desktop
VMware View enables the industry’s best end-user
experience while simplifying IT management for large-
scale deployments and reducing the total cost of
ownership (TCO) associated with a virtual desktop
infrastructure by as much as 50 percent.
•	The VMware View Mobile Secure Desktop is an
innovative way to support BYOD initiatives:
–– Enable true session mobility.
–– Support more devices.
–– Streamline application patches and updates.
–– Enhance data security and compliance.
–– Deliver uncompromised end-user experiences.
•	VMware Horizon Application Manager™ – Your personal
cloud broker
Horizon is a universal broker for setting policies and
entitling users to access applications that are Web-
based or packaged by VMware ThinApp®. It provides
end users with a simple, seamless window into their
work resources, across private and public clouds, and
on the device of their choice.
Professional Services Organization
The VMware Professional Services Organization (PSO)
offers education, account management and onsite,
end-to-end consulting services to assist in strategy
development and program execution. Our consultants
bring in-depth expertise in a wide range of implementations
across industries. With a proven project methodology,
PSO provides the assurance that your project starts with
a solid foundation and builds on VMware best practices.
Choose high-level interactions, such as a day-long seminar
on situation analysis and initial planning, or opt for an
in-depth, multiweek engagement that yields a detailed
blueprint tailored to your environment. Our education
offerings include online, onsite and self-paced classes that
let you increase your staff’s confidence and competence
with new technologies.
 
Strategic Transformation
Saying “yes” to BYOD has the potential to transform the enterprise.
It goes beyond giving people a more flexible way to access the
network: it presents a fresh opportunity for IT to contribute at a
strategic level, as a driver of productivity.
VMware has the expertise that enables you to say “yes” to BYOD
with confidence. Our proven solutions for end-user computing—
which include VMware View and VMware Horizon™—facilitate
the industry’s best end-user experience while simplifying IT
management. Add to this our professional services for planning,
implementation and educational support, and you have a trusted
partner for a complete BYOD program.
Let’s Talk
Whether you’re just beginning to consider BYOD or you’re
already well on the path, our consultants can provide expert
guidance. Call your VMware account manager today to get the
conversation started.
VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com
Copyright © 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed
at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be
trademarks of their respective companies. Item No: VMW-WP-BYODOpp-USLET-102 07/12

Contenu connexe

Tendances

White Paper on IBM MTSS
White Paper on IBM MTSSWhite Paper on IBM MTSS
White Paper on IBM MTSS
Ed Aussem
 

Tendances (20)

Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the game
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDC
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?
 
Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
 
Infosys – Lean Manufacturing Software Solutions | Methodology White Paper
Infosys – Lean Manufacturing Software Solutions | Methodology White PaperInfosys – Lean Manufacturing Software Solutions | Methodology White Paper
Infosys – Lean Manufacturing Software Solutions | Methodology White Paper
 
White Paper on IBM MTSS
White Paper on IBM MTSSWhite Paper on IBM MTSS
White Paper on IBM MTSS
 
Career implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruptionCareer implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruption
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 
Catia team pdm
Catia team pdmCatia team pdm
Catia team pdm
 
White Paper on IBM MTSS
White Paper on IBM MTSSWhite Paper on IBM MTSS
White Paper on IBM MTSS
 
The CIO Handbook
The CIO HandbookThe CIO Handbook
The CIO Handbook
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
White Paper - The Business Case For Business Intelligence
White Paper -  The Business Case For Business IntelligenceWhite Paper -  The Business Case For Business Intelligence
White Paper - The Business Case For Business Intelligence
 

Similaire à VMware: The BYOD Opportunity

Mobile Discovery User Guide v9
Mobile Discovery User Guide v9Mobile Discovery User Guide v9
Mobile Discovery User Guide v9
David Miller
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
lverb
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital Workspace
Tricia Stream
 
Technology Planning Document V1.1
Technology Planning Document V1.1Technology Planning Document V1.1
Technology Planning Document V1.1
digital.signage
 
Technology Planning Document
Technology Planning DocumentTechnology Planning Document
Technology Planning Document
digital.signage
 

Similaire à VMware: The BYOD Opportunity (20)

The VMware Mobile Secure Workplace
The VMware Mobile Secure WorkplaceThe VMware Mobile Secure Workplace
The VMware Mobile Secure Workplace
 
The Cloud Disaster Recovery "Cookbook''
 The Cloud Disaster Recovery "Cookbook''  The Cloud Disaster Recovery "Cookbook''
The Cloud Disaster Recovery "Cookbook''
 
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
 
BYOD
BYODBYOD
BYOD
 
Cio buy versus build
Cio buy versus buildCio buy versus build
Cio buy versus build
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
How UC Pays For Itself
How UC Pays For ItselfHow UC Pays For Itself
How UC Pays For Itself
 
How Unified Communications Pays For Itself
How Unified Communications Pays For ItselfHow Unified Communications Pays For Itself
How Unified Communications Pays For Itself
 
Internet of Things - Enablement by Techcello
Internet of Things - Enablement by TechcelloInternet of Things - Enablement by Techcello
Internet of Things - Enablement by Techcello
 
Mobile Discovery User Guide v9
Mobile Discovery User Guide v9Mobile Discovery User Guide v9
Mobile Discovery User Guide v9
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
 
Handheld Applications guidebook
Handheld Applications guidebookHandheld Applications guidebook
Handheld Applications guidebook
 
Disruptive manufacturing wp
Disruptive manufacturing wpDisruptive manufacturing wp
Disruptive manufacturing wp
 
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ..."ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital Workspace
 
Technology Planning Document V1.1
Technology Planning Document V1.1Technology Planning Document V1.1
Technology Planning Document V1.1
 
Technology Planning Document
Technology Planning DocumentTechnology Planning Document
Technology Planning Document
 
Masters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMasters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleem
 

Plus de VMware

Plus de VMware (20)

vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3
 
How Secure Is Your Business?
How Secure Is Your Business?How Secure Is Your Business?
How Secure Is Your Business?
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent OperationsvRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
 
Running and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierRunning and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got Easier
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
Infographic: Supercharge your Networking Career
Infographic: Supercharge your Networking CareerInfographic: Supercharge your Networking Career
Infographic: Supercharge your Networking Career
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service Provider
 
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
 
Virtualization Journey
Virtualization JourneyVirtualization Journey
Virtualization Journey
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

VMware: The BYOD Opportunity

  • 1. The BYOD Opportunity Say “Yes”to Device Diversity and Enable New Ways to Drive Productivity W H I T E P A P E R
  • 2. The BYOD Opportunity W H I T E P A P E R / 2 Table of Contents Abstract. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 A New Approach to BYOD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Positive Results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Preparing for BYOD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Strategic Transformation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Let’s Talk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
  • 3. W H I T E P A P E R / 3 The BYOD Opportunity The BYOD Opportunity Abstract Research shows that the bring your own device (BYOD) movement has reached a critical point: a range of studies show that more than half of companies surveyed allow employees use personally owned devices to access the corporate network. With VMware as your partner for managing device diversity, you can create a flexible yet secure BYOD environment that increases efficiency, lowers operating costs and drives productivity. Introduction The bring your own device (BYOD) movement has gone mainstream. Reports from Cisco, Computerworld, CompTIA, Mobilisafe and others indicate that more than half of companies surveyed now permit employee-owned devices in the workplace—and in some sectors the numbers are much higher. New companies are using BYOD as the foundation for their network infrastructure, and a growing number of organizations (including VMware) give employees complete freedom to purchase and use their own devices to access corporate data. The attraction of BYOD is easy to understand. Smartphones and tablets offer an unprecedented level of flexibility, and when employees buy their own devices, the company can save hardware and IT support costs. The drawbacks, of course, are security and manageability. Personal devices could potentially infect the company network with viruses, and private customer or company data can be compromised if the device is lost or stolen. Employers also risk becoming unwittingly responsible for liabilities beyond their control: corporate assets might get mixed with personal data such as family photos and music or, worse yet, with downloaded applications that aren’t safe or in line with company policy. The challenge, then, is to implement a BYOD program that supports device diversity while putting the proper safeguards in place and keeping business and personal items separate. VMware offers pioneering solutions for managing device diversity and gives you the tools to create a BYOD environment that works for everyone—employees and IT organizations alike. A New Approach to BYOD Our industry-leading solutions for end-user computing enable a flexible yet secure BYOD environment. The VMware approach links applications and customized virtual desktops to user identities, not devices, so end users can access their data from any qualified device, whether they’re working in the office or halfway around the world. Corporate and personal digital assets are kept separate in a secure and auditable way. IT controls corporate digital assets, while end users manage and maintain their personal applications and data. This pragmatic approach to BYOD lets IT leverage hybrid cloud resources to maintain a managed, secure end-user environment while providing new ways for employees to collaborate. IT maintains centralized control over policies, security and delivery of content across devices. Employees can connect to the network 24/7 with the device of their choice—laptop, tablet or smartphone—regardless of whether they’re using a Windows, Mac OS, Linux, iOS or Android platform. The networks that authenticate BYOD devices can be isolated so users access only the data and applications they should. Isolation minimizes the risk of malware coming onto the network, so IT doesn’t need to worry if users have the latest versions of firmware or other software on their personal devices. Readily available third-party software can provide additional levels of protection, such as mitigating the risks of cloud-based storage systems or providing real-time activity monitoring. IT can apply policies at individual or group levels, to ensure that single users or whole departments with access to sensitive data operate within stated guidelines. For example, IT can restrict USB capabilities for finance employees, and can prevent social security numbers or credit-card information displayed in text files from being copied or printed. Positive Results The VMware model for BYOD can give employees the flexibility to work the way they want, which can increase satisfaction and productivity. End users move seamlessly from device to device and location to location. They can work at any time, from any place, and can connect to corporate systems with little or no assistance from internal IT. Data remains secure with central control of access to corporate systems and data. When employees choose their own devices, IT spends less time (and money) specifying and purchasing equipment. Routine support and help-desk overhead that comes with device ownership is directed at the retailer, manufacturer or service provider—not corporate IT—and that can lower operational costs and free up resources. For instance, by leveraging desktop virtualization for BYOD, IT can focus more on application and activity management and less on hardware provisioning and maintenance. The ongoing shift toward operating system–neutral applications will make it easier to accommodate new and next-generation devices. User configuration and management becomes simpler, so a new user can be provisioned in just minutes. The IT organization becomes more agile, taking less time to open (or close) offices and, when necessary, moving faster to support mergers and acquisitions. Even routine workforce additions and changes become simpler to implement.
  • 4. W H I T E P A P E R / 4 The BYOD Opportunity Preparing for BYOD Solid planning is the first step in any successful BYOD implementation. End users expect seamless functionality from the start, and it’s difficult to recover from even small glitches in the initial rollout. After control over access to digital assets is given away, it’s hard to take back. In most cases, IT has only one chance to get BYOD right, so it’s important to have a detailed strategy and design in place before the project begins. The VMware Professional Services Organization (PSO) can help IT organizations chart a course, so they don’t have to go it alone. Our strategists and architects (many of them former chief information officers, chief technology officers and industry consultants) collaborate with your team to develop a pragmatic IT strategy and a roadmap for transformation. The planning process often starts with some internal housekeeping, which lets IT revisit your current processes and eliminate outdated methods. Our consultants can help you reappraise present status and rationalize applications, keeping in mind that the tools people use today might not be the tools they really need. The next step is to consider how a BYOD environment will change the way IT operates. Will the IT organization need to change support models, the help desk or service-level agreements (SLAs)? How will these changes affect IT staff? What new skills and knowledge will people need? A confident, competent IT staff yields savings in efficiency and cost, so consider including an educational component in your plan. VMware offers certifications, courses and online classes that can help your staff get up to speed quickly on the new world of BYOD. While you’re evaluating the organization and preparing your implementation plan, start thinking about future BYOD policies. IT must assert the right to manage access from all devices, whether they’re owned by the company or the user. Seek to manage the minimum footprint required on the device; this approach lets you manage less and manage better. Beyond the standard policies for monitoring activity and enforcing security, consider what defines acceptable use and what will happen if the device is damaged, lost or stolen. For example, policies might state the user’s obligation to ensure that a suitable replacement device is made available within a certain timeframe if a primary device becomes inoperable; users must understand their responsibility to remain productive. Likewise, policies might require that users report device loss or theft within a certain time period, so that IT can intervene to disable access and delete corporate data. IT’s right to take action in emergencies—such as the right to remotely erase the device if it is stolen—must also be made clear. The aim is to create policies that protect corporate assets and limit liability while maximizing the user’s ability to be productive, make decisions and think creatively. The VMware approach for BYOD lets you think less about devices and more about the user experience and enabling employees. This shift in focus, from devices to access and activity, makes BYOD improvements more visible and easier to measure. IT can be more responsive and operate more cost- effectively, and is likely to be perceived as being more flexible and more open. Most important, the VMware approach to BYOD can make the organization more productive, and that, in turn, can drive profitability. BYOD Success Story Foley & Lardner LLP is a global law firm of approximately 2,100 employees that provides business and legal insight to clients. Looking to support a highly mobile workforce of lawyers and support staff, the company implemented VMware® View™ as part of its BYOD program. Employees can now access their virtual desktops and critical applications from their mobile device of choice, including iPads and laptops. Linda D. Sanders, CIO for the firm, describes it this way: “Today, our lawyers and staff can access their virtual desktops at the office on thin clients, in the courtroom on their iPads or anywhere on their personal PCs. As we look beyond desktops, we see an opportunity to offer our employees a secure way to access their applications, share data and collaborate from any device based on the VMware end-user computing portfolio.” Foley & Lardner LLP Industry: Legal services Location: Milwaukee, Wisconsin Key Challenges • Accommodate reduction in IT staff. • Maintain high levels of end-user services. • Improve end-user system uptime. Solution Foley leveraged VMware View and VMware Professional Services to deploy desktops as a service. The new architecture also enables a BYOD model so that end users, instead of IT, now procure and set up mobile devices. Business Benefits • Reduced number of “tech touches.” • Reduced provisioning times from four hours to ten minutes. • Improved uptime and availability to end users. • Cut mobile device costs by 22 percent.
  • 5. W H I T E P A P E R / 5 The BYOD Opportunity VMware Solutions for BYOD Built on the foundation of VMware vSphere®, our portfolio for BYOD includes technologies that help IT organizations empower a more agile, productive and connected enterprise: • VMware View – Simplifying the delivery of a better desktop VMware View enables the industry’s best end-user experience while simplifying IT management for large- scale deployments and reducing the total cost of ownership (TCO) associated with a virtual desktop infrastructure by as much as 50 percent. • The VMware View Mobile Secure Desktop is an innovative way to support BYOD initiatives: –– Enable true session mobility. –– Support more devices. –– Streamline application patches and updates. –– Enhance data security and compliance. –– Deliver uncompromised end-user experiences. • VMware Horizon Application Manager™ – Your personal cloud broker Horizon is a universal broker for setting policies and entitling users to access applications that are Web- based or packaged by VMware ThinApp®. It provides end users with a simple, seamless window into their work resources, across private and public clouds, and on the device of their choice. Professional Services Organization The VMware Professional Services Organization (PSO) offers education, account management and onsite, end-to-end consulting services to assist in strategy development and program execution. Our consultants bring in-depth expertise in a wide range of implementations across industries. With a proven project methodology, PSO provides the assurance that your project starts with a solid foundation and builds on VMware best practices. Choose high-level interactions, such as a day-long seminar on situation analysis and initial planning, or opt for an in-depth, multiweek engagement that yields a detailed blueprint tailored to your environment. Our education offerings include online, onsite and self-paced classes that let you increase your staff’s confidence and competence with new technologies.   Strategic Transformation Saying “yes” to BYOD has the potential to transform the enterprise. It goes beyond giving people a more flexible way to access the network: it presents a fresh opportunity for IT to contribute at a strategic level, as a driver of productivity. VMware has the expertise that enables you to say “yes” to BYOD with confidence. Our proven solutions for end-user computing— which include VMware View and VMware Horizon™—facilitate the industry’s best end-user experience while simplifying IT management. Add to this our professional services for planning, implementation and educational support, and you have a trusted partner for a complete BYOD program. Let’s Talk Whether you’re just beginning to consider BYOD or you’re already well on the path, our consultants can provide expert guidance. Call your VMware account manager today to get the conversation started.
  • 6. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW-WP-BYODOpp-USLET-102 07/12