SlideShare una empresa de Scribd logo
To BYOD or
not to BYOD
How will it affect your business
and your people?
Sources: Cisco Systems, Forrester, Aberdeen, Dell Quest, ICP Networks, Harris, Juniper Networks Malicious Mobile Threats Report May 2011
By 2015 there will be almost
15 billion
network-connected devices
By 2016
350,000,000
people
will use their smartphones for work
In 2013, 52% of IT professionals in
the UK see BYOD as positive.
Compared with 88% in China.
88%
52%
IT departments are keen
to embrace the trend
There are challenges
1in 20
mobile devices
were stolen
in 2010
29%
distribute
unauthorised
data
31%
Who use a
laptop for work
will connect to
the company’s
network via a
free or public
Wi-Fi
connection
46%
who use a
personal
device for
work have let
someone else
use it
81%
Use a personal
electronic
device for
work-related
functions
Get you and your
business safe and
ready for BYOD
Call +44 (0)1793 417755
Visit http://enterprise.bcs.org
• Professional certification
• Career mapping
• Skills benchmarking
• Professional development

Más contenido relacionado

La actualidad más candente

Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3
sapenov
 
Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)
Sujit Soman
 
State of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreState of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is core
Erol Dizdar
 

La actualidad más candente (20)

2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities 2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
D link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wirelessD link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wireless
 
5 technology that will redefine a post covid 19 aleena
5 technology that will redefine a post covid 19 aleena5 technology that will redefine a post covid 19 aleena
5 technology that will redefine a post covid 19 aleena
 
Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
 
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesInternet of Things Gouvernance Challenges
Internet of Things Gouvernance Challenges
 
Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
 
Minedshare 10 21 08
Minedshare 10 21 08Minedshare 10 21 08
Minedshare 10 21 08
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
IOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in TaiwanIOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in Taiwan
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
State of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreState of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is core
 
Mobile Web
Mobile WebMobile Web
Mobile Web
 
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationIEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
 

Destacado

Technology integration
Technology integrationTechnology integration
Technology integration
briggsad
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
Bee_Ware
 
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
Mark Mad
 
Всеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРАВсеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРА
mariya776
 
La vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaLa vida al voltant de la mediterrànea
La vida al voltant de la mediterrànea
Kracopayner
 
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงานใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
Mark Mad
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre infor
lissalejandra
 

Destacado (20)

morphometric analysis
morphometric analysismorphometric analysis
morphometric analysis
 
Intro
IntroIntro
Intro
 
Technology integration
Technology integrationTechnology integration
Technology integration
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
 
Всеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРАВсеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРА
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
La vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaLa vida al voltant de la mediterrànea
La vida al voltant de la mediterrànea
 
Erreportajea dna
Erreportajea dnaErreportajea dna
Erreportajea dna
 
Sql injection
Sql injectionSql injection
Sql injection
 
Vocales ruddy
Vocales ruddyVocales ruddy
Vocales ruddy
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvio
 
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
 
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงานใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
 
Infographic: Dementia Toolkit
Infographic: Dementia ToolkitInfographic: Dementia Toolkit
Infographic: Dementia Toolkit
 
Moving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationMoving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authentication
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre infor
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistry
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
 

Similar a To byod or not to byod

50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
Vala Afshar
 
Infographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem AdvantageInfographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem Advantage
AppDirect
 
When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do? When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do?
MadgeTech Inc
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
Extreme Networks
 
IS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_BroadcomIS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_Broadcom
William H. Miller, Jr.
 

Similar a To byod or not to byod (20)

BYOD
BYODBYOD
BYOD
 
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
 
Infographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem AdvantageInfographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem Advantage
 
When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do? When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do?
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
 
Internet of Things - The new Paradigmn
Internet of Things - The new ParadigmnInternet of Things - The new Paradigmn
Internet of Things - The new Paradigmn
 
IS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_BroadcomIS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_Broadcom
 
Trends in IT
Trends in ITTrends in IT
Trends in IT
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Meet&Greet #3 - IoT Vietnam
Meet&Greet #3 - IoT VietnamMeet&Greet #3 - IoT Vietnam
Meet&Greet #3 - IoT Vietnam
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
Technology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai IndustriesTechnology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai Industries
 
The Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoTThe Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoT
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and Consumerization
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 

Más de Bee_Ware

Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
Bee_Ware
 

Más de Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 

Último

一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理
一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理
一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理
btohy
 
一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理
一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理
一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理
aytyn
 

Último (9)

Investor Day 2024 Presentation Sysco 2024
Investor Day 2024 Presentation Sysco 2024Investor Day 2024 Presentation Sysco 2024
Investor Day 2024 Presentation Sysco 2024
 
Teck Investor Presentation - May 23, 2024
Teck Investor Presentation - May 23, 2024Teck Investor Presentation - May 23, 2024
Teck Investor Presentation - May 23, 2024
 
一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理
一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理
一比一原版CBU毕业证卡普顿大学毕业证成绩单如何办理
 
BRL - Investor Presentation - May 2024.pdf
BRL - Investor Presentation - May 2024.pdfBRL - Investor Presentation - May 2024.pdf
BRL - Investor Presentation - May 2024.pdf
 
Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024
 
一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理
一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理
一比一原版MQU毕业证麦考瑞大学毕业证成绩单如何办理
 
Investor Day 2024 Presentation Sysco 2024
Investor Day 2024 Presentation Sysco 2024Investor Day 2024 Presentation Sysco 2024
Investor Day 2024 Presentation Sysco 2024
 
Investor Day 2024 Presentation Sysco 2024
Investor Day 2024 Presentation Sysco 2024Investor Day 2024 Presentation Sysco 2024
Investor Day 2024 Presentation Sysco 2024
 
Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024
 

To byod or not to byod

  • 1. To BYOD or not to BYOD How will it affect your business and your people? Sources: Cisco Systems, Forrester, Aberdeen, Dell Quest, ICP Networks, Harris, Juniper Networks Malicious Mobile Threats Report May 2011
  • 2. By 2015 there will be almost 15 billion network-connected devices
  • 3. By 2016 350,000,000 people will use their smartphones for work
  • 4. In 2013, 52% of IT professionals in the UK see BYOD as positive. Compared with 88% in China. 88% 52%
  • 5. IT departments are keen to embrace the trend
  • 6. There are challenges 1in 20 mobile devices were stolen in 2010 29% distribute unauthorised data 31% Who use a laptop for work will connect to the company’s network via a free or public Wi-Fi connection 46% who use a personal device for work have let someone else use it 81% Use a personal electronic device for work-related functions
  • 7. Get you and your business safe and ready for BYOD Call +44 (0)1793 417755 Visit http://enterprise.bcs.org • Professional certification • Career mapping • Skills benchmarking • Professional development