SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Considering a BYOD
Infrastructure
Presented By: Melissa Andrews
April 10, 2013
Controversy
Position and Argument Summary
Argument Detail
Conclusion
Presentation Agenda
Suggested Cons
Threatens Security
Escalates Costs
Proven Pros
Creates Productivity
Fosters Innovation
Should We Implement a Bring Your
Own Device (BYOD) Infrastructure?
Tighten Security Controls
Optimize Technical Costs
Increase Employee Productivity
Foster Technical Innovation
Implement Pioneering Strategy
We Should Implement a BYOD
Infrastructure
Although 55% of the federal employees who use
smartphones or tablets for work bring their own, just
11% of them say their agency has an official BYOD
policy at all.
Source: (1)
Prevent Rogue Devices
Tighten Security Controls
With hosted VDI, no data ever leaves the data center.
Through the use of security policies, administrators of client-
hosted VDI can have virtual machines expire after a specified
time, helping to prevent data leakage.
Source (2)
Source (3)
Minimize Data Leakage
Tighten Security Controls
Virtual Desktop Environment
Virginia Bank VP of IT, Sharon Moynihan credits the cloud
component of the bank’s BYOD model for delivering the cost
savings…. Virginia Commerce Bank stands to save roughly
$1,500 per [BYOD] device.
Source (4)
Reduce Capital Expenditures
Optimize Technical Costs
The State of Delaware has begun “a two year transition
plan to migrate all users off of the existing infrastructure
by June 30, 2013 and move them to either a personal
device through a proposed reimbursement program”
“By doing so, the state stands to save up to $2.5 million
dollars annually through the reimbursement program but
also would save $75K in lifecycle costs and $120K in
ongoing support. “
Source (5)
Reallocate Technical Resources
Optimize Technical Costs
“One of the strong drivers of BYOD activity is that people want
to use a single device for both work and personal purposes”
Source (6)
In 2011 Mobile Workers carried on average 2.7 devices (spanning
tablets, laptops, smartphones, netbooks, etc.). In 2012 that
jumped to 3.5 devices. For the Q1 2013 report that dropped to 3
devices (2.95). This recent drop is directly attributed to BYOD.
Source (7)
Optimize Electronic Devices
Increase Employee Productivity
“According to a 2010 IDC-Unisys report, consumer-powered IT is
being touted as the principal driver behind the fourth wave of
corporate productivity. The first wave was inspired by Henry Ford's
invention of the assembly line (between 1908 and 1915). The
Japanese collaborative model, Kaizen, was the second wave. The
third was driven by the Chinese model of mass production, low
prices and global domination.”
“Today, the fourth wave is driven by a network of constantly
connected workers. A network connected by mobiles, laptops,
smartphones and the like.”
Source (8)
Facilitate Unrestricted Mobility
Increase Employee Productivity
Elevate Workforce Composition
Foster Technical Innovation
“It is especially true for Millennials
and teleworkers.”
“Increased flexibility is attractive.”
“It shows your office is forward
thinking, savvy, and efficient.”
Source (9)
“In an organization where the average age of employees ranges
between 28 to 30 years…. Prabhu realized that this squad of power
users was far ahead of their peers when it came to adopting whiz-
bang technology.
“[BYOD] would allow the IT team to focus on strategic innovation
instead of fixing IT issues. Keeping the IT team enthused is an
imperative at a time when attrition is rampant and work pressure is
mounting.”
“[BYOD] would free my IT resources from managing non-strategic
assets and help me focus on high business value initiatives.”
Source (8)
Leverage Technical Advances
Foster Technical Innovation
“Groups like Gartner … claim that BYOD will rise to become a
major technology trend in 2013, largely based on the huge
amount of iPads streaming into employees’ hands. These tablets
in the workplace are expected to reach 250 million by 2016,
according to findings by Forrester Research.”
Source (10)
Create Infrastructure Versatility
Implement Pioneering Strategy
S Source (11)
Embrace the Future
Implement Pioneering Strategy
Virtual Desktop
Infrastructure
Mobile Device
Management Systems
Dual-Persona Devices
Source (10)
 Prevent Rogue Devices
 Minimize Data Leakage
 Reduce Capital Expenditures
 Reallocate Technical Resources
 Optimize Electronic Devices
 Facilitate Unrestricted Mobility
 Elevate Workforce Composition
 Leverage Technical Advances
 Create Infrastructure Versatility
 Embrace the Future
A BYOD Infrastructure is a Must!
1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013.
<http://www.networkworld.com/news/2013/012213-federal-byod-266032.html?page=1>.
2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013.
<http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>.
3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. <http://vdi.co.nz/category/vdi/>.
4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013.
<http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-savings/?fp=16&fpid=1>.
5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov. Federal Chief Information Officers Council, n.d. Web.
19 Feb. 2013. <https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf>.
6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. <Source 6:
http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>.
7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass." IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact
Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. <http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>.
8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-study/bring-it-essar>.
9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public Sector." Api.ning.com. Api.ning.com, n.d. Web. 19
Feb. 2013.
<http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0pKqqZKcURsbISzQ__/BYODfinal_1.pdf>.
10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013.
<http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx>.
11. Wainwright, Ashley. "IT Solutions Blog." How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013.
<http://www.securedgenetworks.com/secure-edge-networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>.
12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC, 10 Apr. 2013. Web. 16 Apr. 2013.
<http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-support-it-infographic>.
Bibliography

Más contenido relacionado

La actualidad más candente

Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTijtsrd
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
IDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-ChaosIDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-ChaosLarry Levine
 
Global Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT IntegratorGlobal Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT Integratorinside-BigData.com
 
Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.inside-BigData.com
 
The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesEMC
 
Bulut bilişimin BT organizasyonları ve istihdama etkisi
Bulut bilişimin BT organizasyonları ve istihdama etkisiBulut bilişimin BT organizasyonları ve istihdama etkisi
Bulut bilişimin BT organizasyonları ve istihdama etkisiErol Dizdar
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Desiree Miloshevic
 
Cognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsCognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsPietro Leo
 
ARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationDavid Bellocchi
 
On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014Opher Etzion
 
Intel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & CloudIntel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & Clouditnewsafrica
 
New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...
New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...
New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...Bohyun Kim
 

La actualidad más candente (20)

Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
IDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-ChaosIDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-Chaos
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Global Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT IntegratorGlobal Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT Integrator
 
Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United States
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Tech trends
Tech trendsTech trends
Tech trends
 
Bulut bilişimin BT organizasyonları ve istihdama etkisi
Bulut bilişimin BT organizasyonları ve istihdama etkisiBulut bilişimin BT organizasyonları ve istihdama etkisi
Bulut bilişimin BT organizasyonları ve istihdama etkisi
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
 
Cognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsCognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analytics
 
CMMC - IoT
CMMC - IoTCMMC - IoT
CMMC - IoT
 
ARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classification
 
On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014
 
Intel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & CloudIntel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & Cloud
 
New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...
New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...
New Technologies of the Fourth Industrial Revolution: AI, IoT, Robotics, and ...
 

Similar a Considering a BYOD Infrastructure

Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD InfrastructureMelissa Andrews
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Getting ‘Smart’er – Collaboration and the Internet of Everything
Getting ‘Smart’er –  Collaboration and the Internet of Everything Getting ‘Smart’er –  Collaboration and the Internet of Everything
Getting ‘Smart’er – Collaboration and the Internet of Everything Cisco Collaboration
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
 
National seminar on emergence of internet of things (io t) trends and challe...
National seminar on emergence of internet of things (io t)  trends and challe...National seminar on emergence of internet of things (io t)  trends and challe...
National seminar on emergence of internet of things (io t) trends and challe...Ajay Ohri
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsRaúl Castañón Martínez
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICEMicrosoft India
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docxjeffsrosalyn
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableCapgemini
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energyBayu imadul Bilad
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxcowinhelen
 

Similar a Considering a BYOD Infrastructure (20)

Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Getting ‘Smart’er – Collaboration and the Internet of Everything
Getting ‘Smart’er –  Collaboration and the Internet of Everything Getting ‘Smart’er –  Collaboration and the Internet of Everything
Getting ‘Smart’er – Collaboration and the Internet of Everything
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
National seminar on emergence of internet of things (io t) trends and challe...
National seminar on emergence of internet of things (io t)  trends and challe...National seminar on emergence of internet of things (io t)  trends and challe...
National seminar on emergence of internet of things (io t) trends and challe...
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
IoT
IoTIoT
IoT
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerable
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energy
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 

Último

Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4DianaGray10
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTxtailishbaloch
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 

Último (20)

Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 

Considering a BYOD Infrastructure

  • 1. Considering a BYOD Infrastructure Presented By: Melissa Andrews April 10, 2013
  • 2. Controversy Position and Argument Summary Argument Detail Conclusion Presentation Agenda
  • 3. Suggested Cons Threatens Security Escalates Costs Proven Pros Creates Productivity Fosters Innovation Should We Implement a Bring Your Own Device (BYOD) Infrastructure?
  • 4. Tighten Security Controls Optimize Technical Costs Increase Employee Productivity Foster Technical Innovation Implement Pioneering Strategy We Should Implement a BYOD Infrastructure
  • 5. Although 55% of the federal employees who use smartphones or tablets for work bring their own, just 11% of them say their agency has an official BYOD policy at all. Source: (1) Prevent Rogue Devices Tighten Security Controls
  • 6. With hosted VDI, no data ever leaves the data center. Through the use of security policies, administrators of client- hosted VDI can have virtual machines expire after a specified time, helping to prevent data leakage. Source (2) Source (3) Minimize Data Leakage Tighten Security Controls Virtual Desktop Environment
  • 7. Virginia Bank VP of IT, Sharon Moynihan credits the cloud component of the bank’s BYOD model for delivering the cost savings…. Virginia Commerce Bank stands to save roughly $1,500 per [BYOD] device. Source (4) Reduce Capital Expenditures Optimize Technical Costs
  • 8. The State of Delaware has begun “a two year transition plan to migrate all users off of the existing infrastructure by June 30, 2013 and move them to either a personal device through a proposed reimbursement program” “By doing so, the state stands to save up to $2.5 million dollars annually through the reimbursement program but also would save $75K in lifecycle costs and $120K in ongoing support. “ Source (5) Reallocate Technical Resources Optimize Technical Costs
  • 9. “One of the strong drivers of BYOD activity is that people want to use a single device for both work and personal purposes” Source (6) In 2011 Mobile Workers carried on average 2.7 devices (spanning tablets, laptops, smartphones, netbooks, etc.). In 2012 that jumped to 3.5 devices. For the Q1 2013 report that dropped to 3 devices (2.95). This recent drop is directly attributed to BYOD. Source (7) Optimize Electronic Devices Increase Employee Productivity
  • 10. “According to a 2010 IDC-Unisys report, consumer-powered IT is being touted as the principal driver behind the fourth wave of corporate productivity. The first wave was inspired by Henry Ford's invention of the assembly line (between 1908 and 1915). The Japanese collaborative model, Kaizen, was the second wave. The third was driven by the Chinese model of mass production, low prices and global domination.” “Today, the fourth wave is driven by a network of constantly connected workers. A network connected by mobiles, laptops, smartphones and the like.” Source (8) Facilitate Unrestricted Mobility Increase Employee Productivity
  • 11. Elevate Workforce Composition Foster Technical Innovation “It is especially true for Millennials and teleworkers.” “Increased flexibility is attractive.” “It shows your office is forward thinking, savvy, and efficient.” Source (9)
  • 12. “In an organization where the average age of employees ranges between 28 to 30 years…. Prabhu realized that this squad of power users was far ahead of their peers when it came to adopting whiz- bang technology. “[BYOD] would allow the IT team to focus on strategic innovation instead of fixing IT issues. Keeping the IT team enthused is an imperative at a time when attrition is rampant and work pressure is mounting.” “[BYOD] would free my IT resources from managing non-strategic assets and help me focus on high business value initiatives.” Source (8) Leverage Technical Advances Foster Technical Innovation
  • 13. “Groups like Gartner … claim that BYOD will rise to become a major technology trend in 2013, largely based on the huge amount of iPads streaming into employees’ hands. These tablets in the workplace are expected to reach 250 million by 2016, according to findings by Forrester Research.” Source (10) Create Infrastructure Versatility Implement Pioneering Strategy
  • 14. S Source (11) Embrace the Future Implement Pioneering Strategy Virtual Desktop Infrastructure Mobile Device Management Systems Dual-Persona Devices Source (10)
  • 15.  Prevent Rogue Devices  Minimize Data Leakage  Reduce Capital Expenditures  Reallocate Technical Resources  Optimize Electronic Devices  Facilitate Unrestricted Mobility  Elevate Workforce Composition  Leverage Technical Advances  Create Infrastructure Versatility  Embrace the Future A BYOD Infrastructure is a Must!
  • 16. 1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. <http://www.networkworld.com/news/2013/012213-federal-byod-266032.html?page=1>. 2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013. <http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>. 3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. <http://vdi.co.nz/category/vdi/>. 4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013. <http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-savings/?fp=16&fpid=1>. 5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov. Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. <https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf>. 6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. <Source 6: http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>. 7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass." IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. <http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>. 8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-study/bring-it-essar>. 9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public Sector." Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013. <http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0pKqqZKcURsbISzQ__/BYODfinal_1.pdf>. 10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. <http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx>. 11. Wainwright, Ashley. "IT Solutions Blog." How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. <http://www.securedgenetworks.com/secure-edge-networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>. 12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC, 10 Apr. 2013. Web. 16 Apr. 2013. <http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-support-it-infographic>. Bibliography

Notas del editor

  1. Overview of what BYOD is
  2. Explain overall approach of the presentation
  3. Most common cons citedBYOD can increase security and can lessen costsMore important business benefits: Productivity and InnovationAdds to bottom line and competitive advantage
  4. Prevent Rogue Devices / Minimize Data LeakageReduce Capital Expenditures / Reallocate Technical ResourcesOptimize Electronic Devices / Facilitate Unrestricted MobilityElevate Workforce Composition / Leverage Technical Advances Create Infrastructure Versatility / Embrace the FutureWe will see that BYOD Becomes a Must
  5. On a daily basis, employees are attempting to utilize their own devices. The implementation of a Mobile Device Management system will control what devices can access the networkSource 1: Messmer, Ellen. &quot;Are Federal Agency Workers Going Rogue with Personal Devices?&quot; Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. &lt;http://www.networkworld.com/news/2013/012213-federal-byod-266032.html?page=1&gt;.
  6. No data touches the devices eliminating need for device encryptionCan prevent download of data to USB and other devicesCentralized data makes it easier to secure, audit and recover.Source 2: Schultz, Keith. &quot;VDI Tailored to BYOD.&quot; CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013. &lt;http://www.cio.com.au/article/432639/review_vdi_tailored_byod/&gt;.Source 3: Valaboju, Krishna. &quot;V Blog.&quot; Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. &lt;http://vdi.co.nz/category/vdi/&gt;.
  7. BYOD can eliminate the capital expenditure of replacement hardware. A cost-effective BYOD requires the cloud on the back end otherwise costs of maintaining security will quickly negate capital savings.With VDI in the back end standard end-point patch management and anti-virus costs can be eliminated. A BYOD model doesn’t need to be all or nothing. A certain subset of users can be allowed into the BYOD model. Reimbursements or stipends can be offered. Source 4: Kaneshige, Tom. &quot;The BYOD Troubleshoot: Security and Cost-savings.&quot; Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013. &lt;http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-savings/?fp=16&amp;fpid=1&gt;.
  8. A BYOD model can require that employees, not IT support, to select, provision and maintain their equipment. In the case of cell phones, almost all employees are savvy enough to call their wireless provider for assistance. In terms of laptop support, hardware recommendation and subsidized helpdesk support can be offered. It is important that the BYOD policy clearly delineate the support responsibilities. When done well, IT staff get out of the “hardware” business and can focus on more strategic goals. Source 5: &quot;A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs.&quot; CIO.gov. Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. &lt;https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf&gt;.
  9. Employees are burned with carrying multiple devices and using sub-optimal equipmentBYOD allows employees to rely on one set of devices they are comfortable withBYOD allows employees to utilize equipment that meets their individual needs (size, battery life, weight)BYOD prevents employees from having to transfer data between devicesSource 6: Bender, Adam. &quot;BYOD 101: What Are BYOD and the Consumerization of IT?&quot; Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. &lt;Source 6: http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3&gt;.Source 7: Witeck, Chris. &quot;Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass.&quot; IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. &lt;http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/&gt;.
  10. A BYOD model supports secure anytime, anywhere access to electronic resources.Source 8: Roy, Debarati. &quot;BYOD: The Essar Way.&quot; CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. &lt;http://www.cio.in/case-study/bring-it-essar&gt;.
  11. 2012 Gov Loop Study of 103 public sector employeesForward-thinking policies such as BYOD help attract and retain a forward-thinking workforceA BYOD model increases employee satisfactionThe implementation of a BYOD model suggests a cutting-edge mindset that is attractive to new talentSource 9: Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. &quot;Exploring Bring Your Own Device in the Public Sector.&quot; Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013.&lt;http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0pKqqZKcURsbISzQ__/BYODfinal_1.pdf&gt;.
  12. Source . JayanthaPrabhu, CTO, Essar GroupManufacturing Sector – Case Study of BYOD implementationEmployees will introduce new ways of leveraging technology Employees will introduce new technology faster than IT can test and standardize devicesIT staff are available to focus on strategic projects rather than operational tasksSource 8:Roy, Debarati. &quot;BYOD: The Essar Way.&quot; CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. &lt;http://www.cio.in/case-study/bring-it-essar&gt;.
  13. There will be increased pressure from employees to bring their own devicesThere will be increased pressure to support a variety of devicesEven if a BYOD program is optional rather than mandatory, the number of employees seeking it will continue to growSource 10:&quot;BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies.&quot; Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. &lt;http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx&gt;.
  14. This informative infographic on the State of BYOD in 2013 by Magic Software shows how the move to BYOD environments is affecting devices, employees, and IT staffs in 2013. It provides many interesting statistics gathered from a variety of sources such as Gartner and Ovum to cover all the need-to-know facts about the state of BYOD and it’s expected growth.The BYOD model will become a standard infrastructure modelVDI interfaces will continue to advance in order to support the BYOD modelMDM technology will also advanceThe concept of a device having a manageable dual-persona, private versus business, will further the BYOD push. Source 11:Wainwright, Ashley. &quot;IT Solutions Blog.&quot; How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. &lt;http://www.securedgenetworks.com/secure-edge-networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic&gt;.Source 10: &quot;BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies.&quot; Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. &lt;http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx&gt;.
  15. Review each of these points.Adds to bottom line and competitive advantageLeading companies will embrace it now rather play “catch-up”