SlideShare a Scribd company logo
1 of 19
CLIENT LOGO HERE
The Debate Over BYOD
10.16.2012
INTRODUCTION
Eric Alfaro is the Chief Information Officer
of Modis, and Modis’s parent company,
Adecco Group North America.
Adecco Group is the world’s largest
recruitment and workforce solutions
provider. Eric’s team in North America
delivers technology enabled business
solutions and services to over 800 Adecco
locations and 8000 Adecco employees in
North America.
2
AGENDA
• Definition: BYOD
• BYOD – More Than a Trend, It’s a Shift
• Why implement a BYOD strategy?
• Best Practices in a Successful BYOD Program
• Downsides to BYOD and solutions
3
WHAT IS BYOD?
BYOD or Bring Your Own Device is becoming the norm among employees
and employers alike. It refers to the policy of allowing employees to
purchase and integrate their own devices into a corporate operating
environment. The most common devices are laptops, smartphones and
tablets.
While businesses benefit by having up-to-date and connected employees,
IT departments often find it difficult to balance changing technology
landscapes with requirements to manage and support a homogenous
environment.
BYOD also means dealing with new security concerns and a shift to
empowered employee computing.
4
HOW BIG IS BYOD?
• BYOD is a prominent component of the “Consumerization of IT” and
is rapidly changing the way IT delivers services and support.
• Client virtualization products (e.g. Citrix) are mainstream solutions for
securely deploying business applications to multiple end user devices,
and Internet standards (HTML5) mean multi-device support is closer.
• In a 2012 survey of 600 businesses, Cisco found that 95 percent
allowed their employees to BYOD in some form. An example of this
would be secure access to corporate email services from a BYOD,
which is the most common service provided.
• Of those companies, many also provided technical support for the
devices.
• 36% of respondents provided support across all devices and
platforms.
5
Source: 2012 Cisco IBSG Horizons Study
BYOD TOUCHES IT, HR, SOURCING, …
Empowered
Employees
6
Security of Business
Data
User Requirements
and Populations
IT Support
Capabilities
Cost Management
Continuous Mobile
Device Technology
Evolution
HR and Business
Policies
Employee IT
Procurement
HR
Sourcing
Sourcing
THE BENEFITS OF BYOD FOR COMPANIES
7
• BYOD enhances employee productivity. It allows for immediate access
to work when away from the office, during commutes, while traveling,
and during down-time. The costs of delivering a solution should be
measured against increase in employee productivity. Industry reports an
average $300 to $1,300, which would depend on your measurement.
• Employees are much more likely to protect and care for their own
devices. This equates to decreased expenditures due to damaged or
stolen devices and data loss.
• Device ownership costs such as initial set-up, maintenance, insurance,
and data plans are shifted to the employee rather than the employer.
• For Gens Y and Z, 50% are using these technologies at home (and
expecting them in the office).
BENEFITS OF BYOD FOR EMPLOYEES
• Efficiency: Carrying a single device is preferable to carrying
multiple devices.
• An employee’s device can be used for personal purposes so they’ll
be able to save settings and documents on a single phone, laptop,
or tablet.
• Employees can control which devices they want. This allows them
to choose the technology that best suits their needs while also
guaranteeing them the freedom to upgrade and purchase devices
on their own timeline.
IMPLEMENTING – BEST PRACTICES
1. Understand your customers and operating environment
2. Prioritize deployment of BYOD services
3. Make support processes simple and clear
4. Communicate!
9
TECHNOLOGY AND BYOD AT MODIS
• How similar is Modis to your business?
• Our workforce is technology driven and a large segment is comfortable
with minimal technology support – a good starting point for BYOD
services
10
43%
60%
67%
0% 20% 40% 60% 80%
I'm comfortable using technology
with little or no help
I like technology
Technology is important to me
UNDERSTAND YOUR CUSTOMERS AND
OPERATING ENVIRONMENT
• What populations of IT consumers exist in your business?
• Where do they work? How technology savvy are they?
• What applications do they use? What type of data do they
access?
• What does it cost to support them?
• What BYOD capabilities do your IT enterprise management tools
have?
• What corporate policies are relevant?
11
WHERE TO START – WHAT’S HOT WITH YOUR
CUSTOMERS?
• In the Modis environment, Tablets and Phones account for majority of
BYOD devices, which is where our current strategy is focused
• The complexity of desktop applications and security requirements has
made widespread laptop and desktop BYOD too costly
• Consider Tiered services, rather than “One Size Fits All”
• Products like Citrix and
Web delivery methods
are making application
portability more viable
on common computing
devices
12
91%
79%
12%
8%
1%
7%
9%
4%
3%
3%
2%
2%
84%
89%
96%
Desktop
Laptop/Notebook
Smartphone
Standard Mobile
Phone
Tablet
Company Device Ownership
Company Company &Personal Personal
MAKING BYOD WORK: WHAT APPLICATIONS DO
YOUR EMPLOYEES NEED?
• Not all applications work well across all BYOD devices
• Ensure the applications your employees need will meet performance and
ease of use expectations
• Consider starting with basics: Email, Calendar, Web
• Modis workforce relies heavily on
collaboration applications, most
of which run well on mobile,
tablet, and laptop devices
• Now is the time to start planning for
future applications can be used with BYOD
13
51%
53%
54%
59%
96%
99%
0% 20% 40% 60% 80% 100% 120%
Presentations
Web Meetings
Instant Messaging
Social Media
Calendar
Email
PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS
• Consider value vs. cost / effort / risk for different BYOD features
o Trap: Supporting BYOD like traditional internal IT systems
o Check: Most modern solutions include web access. Upgrading an old
application might get you BYOD access out of the box
• Engage your Legal, Risk Management, and Sourcing /
Procurement function(s) for guidance
• Think incrementally as you deploy features
• Test the most widely use device / technologies and VIPs
• Stick to mainstream BYOD-friendly applications if you can
• Expect challenges14
• Get right level of business and management sponsorship for
success
• Make BYOD program clear and align support methods with self-
service tenants
• Include BYOD survey items in your IT satisfaction surveys and IT
cost metrics
• Create employee Evangelist teams with access to news on
“what’s next” to drive demand
15
COMMUNICATE!
DOWNSIDE OF BYOD FOR COMPANIES
16
• Employee owned devices doesn’t translate to no cost for companies
Ensure you consider TCO – total cost of ownership
• Device types change almost daily
Identify essential version and interface requirements
• Sensitive and protected data can pose a security risk
Have this discussion with your Risk, Legal, or Data Protection resource prior to
BYOD implementation
• For IT leaders it’s difficult to explain the time, effort and expense issues
surrounding BYOD to business leaders
If you are already doing IT cost tracking, include BYOD from day one
DOWNSIDE OF BYOD FOR EMPLOYEES
17
• It can be costly to own and maintain a device
 Consider an exception policy for employees who are unable to get a
device, but need one
• It may be necessary to purchase a more expensive data plan to
accommodate the larger volume of communications
 Think through how you’ll break out person vs. company data use
• Employees may have difficulty “disconnecting” and having
downtime
 Work – Life balance is a key satisfaction point for most employees
• When accessing the company’s network an employee may be
unwittingly exposing personal information, passwords and browsing
history
 Acceptable use policy
• In some situations an employee may be forced to relinquish the
device so that it may be cleaned of company data
 Communicate and help VIPs
THE BOTTOM LINE ON BYOD
• Understand what problem(s) you’re solving
• Consider the total cost of BYOD, including a reimbursement policy
• Plan comprehensively; it’s hard to “put the genie back in the bottle”
• Be incremental in your approach to features and services to limit
deployment risk and help users adjust to support
• Communicate!
• Review or update your security incident response processes
18
QUESTIONS ?

More Related Content

What's hot

Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
Cloud computing presentation.pdf
Cloud computing presentation.pdfCloud computing presentation.pdf
Cloud computing presentation.pdfMdEasin19
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesAl Sabawi
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloudsagaroceanic11
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGTanmoy Barman
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptPravesh ARYA
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything pptLavanya Sharma
 

What's hot (20)

Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Cloud computing presentation.pdf
Cloud computing presentation.pdfCloud computing presentation.pdf
Cloud computing presentation.pdf
 
Data Security
Data SecurityData Security
Data Security
 
cloud computing models
cloud computing modelscloud computing models
cloud computing models
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
 
Data warehouse physical design
Data warehouse physical designData warehouse physical design
Data warehouse physical design
 

Viewers also liked

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
IT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingIT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingModis
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Modis CEO Survey 2014
Modis CEO Survey 2014Modis CEO Survey 2014
Modis CEO Survey 2014Modis
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Clever Consulting
 
Modis Survey: America's View of Tech
Modis Survey: America's View of TechModis Survey: America's View of Tech
Modis Survey: America's View of TechModis
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliaripaolarduini
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...HEC Paris
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPEAvocatsMathias
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyrCLDEM
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Microsoft Technet France
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolasticirobertomartorana
 
Modis IT Staffing And Talent Management
Modis IT Staffing And Talent ManagementModis IT Staffing And Talent Management
Modis IT Staffing And Talent ManagementModis
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYODSwitchup srl
 
Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Design Didattico
 

Viewers also liked (20)

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
IT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingIT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from Outsourcing
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
09 età di_pericle
09 età di_pericle09 età di_pericle
09 età di_pericle
 
Il pnsd a scuola
Il pnsd a scuolaIl pnsd a scuola
Il pnsd a scuola
 
Modis CEO Survey 2014
Modis CEO Survey 2014Modis CEO Survey 2014
Modis CEO Survey 2014
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Modis Survey: America's View of Tech
Modis Survey: America's View of TechModis Survey: America's View of Tech
Modis Survey: America's View of Tech
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
 
BYOD
BYOD BYOD
BYOD
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyr
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolastici
 
Modis IT Staffing And Talent Management
Modis IT Staffing And Talent ManagementModis IT Staffing And Talent Management
Modis IT Staffing And Talent Management
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYOD
 
Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.
 

Similar to BYOD (Bring Your Own Device) Risks And Benefits

Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITNavin Chaddha
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Dawn Simpson
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
How to build an it transformation roadmap
How to build an it transformation roadmapHow to build an it transformation roadmap
How to build an it transformation roadmapInnesGerrard
 

Similar to BYOD (Bring Your Own Device) Risks And Benefits (20)

Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to IT
 
BYOD
BYODBYOD
BYOD
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
How to build an it transformation roadmap
How to build an it transformation roadmapHow to build an it transformation roadmap
How to build an it transformation roadmap
 

More from Modis

Modis National Jobs Report June 2018
Modis National Jobs Report June 2018Modis National Jobs Report June 2018
Modis National Jobs Report June 2018Modis
 
Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018Modis
 
National Jobs Report - March 2018
National Jobs Report - March 2018National Jobs Report - March 2018
National Jobs Report - March 2018Modis
 
Modis National Jobs Report February 2018
Modis National Jobs Report February 2018Modis National Jobs Report February 2018
Modis National Jobs Report February 2018Modis
 
Modis National Jobs Report December 2017
Modis National Jobs Report  December 2017Modis National Jobs Report  December 2017
Modis National Jobs Report December 2017Modis
 
National Jobs Report - November 2017
National Jobs Report - November 2017National Jobs Report - November 2017
National Jobs Report - November 2017Modis
 
Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017Modis
 
Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017Modis
 
Modis National Jobs Report July 2017
Modis National Jobs Report July 2017Modis National Jobs Report July 2017
Modis National Jobs Report July 2017Modis
 
National Jobs Report - June 2017
National Jobs Report - June 2017National Jobs Report - June 2017
National Jobs Report - June 2017Modis
 
National Jobs Report - May 2017
National Jobs Report - May 2017National Jobs Report - May 2017
National Jobs Report - May 2017Modis
 
National Jobs Report - April 2017
National Jobs Report - April 2017National Jobs Report - April 2017
National Jobs Report - April 2017Modis
 
National Jobs Report - March 2017
National Jobs Report - March 2017National Jobs Report - March 2017
National Jobs Report - March 2017Modis
 
National Jobs Report - February 2017
National Jobs Report - February 2017National Jobs Report - February 2017
National Jobs Report - February 2017Modis
 
National Jobs Report - January 2017
National Jobs Report - January 2017National Jobs Report - January 2017
National Jobs Report - January 2017Modis
 
BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016Modis
 
National Jobs Report - December 2016
National Jobs Report - December 2016National Jobs Report - December 2016
National Jobs Report - December 2016Modis
 
National Jobs Report - November 2016
National Jobs Report - November 2016National Jobs Report - November 2016
National Jobs Report - November 2016Modis
 
Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016Modis
 
National Jobs Report - October 2016
National Jobs Report - October 2016National Jobs Report - October 2016
National Jobs Report - October 2016Modis
 

More from Modis (20)

Modis National Jobs Report June 2018
Modis National Jobs Report June 2018Modis National Jobs Report June 2018
Modis National Jobs Report June 2018
 
Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018
 
National Jobs Report - March 2018
National Jobs Report - March 2018National Jobs Report - March 2018
National Jobs Report - March 2018
 
Modis National Jobs Report February 2018
Modis National Jobs Report February 2018Modis National Jobs Report February 2018
Modis National Jobs Report February 2018
 
Modis National Jobs Report December 2017
Modis National Jobs Report  December 2017Modis National Jobs Report  December 2017
Modis National Jobs Report December 2017
 
National Jobs Report - November 2017
National Jobs Report - November 2017National Jobs Report - November 2017
National Jobs Report - November 2017
 
Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017
 
Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017
 
Modis National Jobs Report July 2017
Modis National Jobs Report July 2017Modis National Jobs Report July 2017
Modis National Jobs Report July 2017
 
National Jobs Report - June 2017
National Jobs Report - June 2017National Jobs Report - June 2017
National Jobs Report - June 2017
 
National Jobs Report - May 2017
National Jobs Report - May 2017National Jobs Report - May 2017
National Jobs Report - May 2017
 
National Jobs Report - April 2017
National Jobs Report - April 2017National Jobs Report - April 2017
National Jobs Report - April 2017
 
National Jobs Report - March 2017
National Jobs Report - March 2017National Jobs Report - March 2017
National Jobs Report - March 2017
 
National Jobs Report - February 2017
National Jobs Report - February 2017National Jobs Report - February 2017
National Jobs Report - February 2017
 
National Jobs Report - January 2017
National Jobs Report - January 2017National Jobs Report - January 2017
National Jobs Report - January 2017
 
BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016
 
National Jobs Report - December 2016
National Jobs Report - December 2016National Jobs Report - December 2016
National Jobs Report - December 2016
 
National Jobs Report - November 2016
National Jobs Report - November 2016National Jobs Report - November 2016
National Jobs Report - November 2016
 
Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016
 
National Jobs Report - October 2016
National Jobs Report - October 2016National Jobs Report - October 2016
National Jobs Report - October 2016
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

BYOD (Bring Your Own Device) Risks And Benefits

  • 1. CLIENT LOGO HERE The Debate Over BYOD 10.16.2012
  • 2. INTRODUCTION Eric Alfaro is the Chief Information Officer of Modis, and Modis’s parent company, Adecco Group North America. Adecco Group is the world’s largest recruitment and workforce solutions provider. Eric’s team in North America delivers technology enabled business solutions and services to over 800 Adecco locations and 8000 Adecco employees in North America. 2
  • 3. AGENDA • Definition: BYOD • BYOD – More Than a Trend, It’s a Shift • Why implement a BYOD strategy? • Best Practices in a Successful BYOD Program • Downsides to BYOD and solutions 3
  • 4. WHAT IS BYOD? BYOD or Bring Your Own Device is becoming the norm among employees and employers alike. It refers to the policy of allowing employees to purchase and integrate their own devices into a corporate operating environment. The most common devices are laptops, smartphones and tablets. While businesses benefit by having up-to-date and connected employees, IT departments often find it difficult to balance changing technology landscapes with requirements to manage and support a homogenous environment. BYOD also means dealing with new security concerns and a shift to empowered employee computing. 4
  • 5. HOW BIG IS BYOD? • BYOD is a prominent component of the “Consumerization of IT” and is rapidly changing the way IT delivers services and support. • Client virtualization products (e.g. Citrix) are mainstream solutions for securely deploying business applications to multiple end user devices, and Internet standards (HTML5) mean multi-device support is closer. • In a 2012 survey of 600 businesses, Cisco found that 95 percent allowed their employees to BYOD in some form. An example of this would be secure access to corporate email services from a BYOD, which is the most common service provided. • Of those companies, many also provided technical support for the devices. • 36% of respondents provided support across all devices and platforms. 5 Source: 2012 Cisco IBSG Horizons Study
  • 6. BYOD TOUCHES IT, HR, SOURCING, … Empowered Employees 6 Security of Business Data User Requirements and Populations IT Support Capabilities Cost Management Continuous Mobile Device Technology Evolution HR and Business Policies Employee IT Procurement HR Sourcing Sourcing
  • 7. THE BENEFITS OF BYOD FOR COMPANIES 7 • BYOD enhances employee productivity. It allows for immediate access to work when away from the office, during commutes, while traveling, and during down-time. The costs of delivering a solution should be measured against increase in employee productivity. Industry reports an average $300 to $1,300, which would depend on your measurement. • Employees are much more likely to protect and care for their own devices. This equates to decreased expenditures due to damaged or stolen devices and data loss. • Device ownership costs such as initial set-up, maintenance, insurance, and data plans are shifted to the employee rather than the employer. • For Gens Y and Z, 50% are using these technologies at home (and expecting them in the office).
  • 8. BENEFITS OF BYOD FOR EMPLOYEES • Efficiency: Carrying a single device is preferable to carrying multiple devices. • An employee’s device can be used for personal purposes so they’ll be able to save settings and documents on a single phone, laptop, or tablet. • Employees can control which devices they want. This allows them to choose the technology that best suits their needs while also guaranteeing them the freedom to upgrade and purchase devices on their own timeline.
  • 9. IMPLEMENTING – BEST PRACTICES 1. Understand your customers and operating environment 2. Prioritize deployment of BYOD services 3. Make support processes simple and clear 4. Communicate! 9
  • 10. TECHNOLOGY AND BYOD AT MODIS • How similar is Modis to your business? • Our workforce is technology driven and a large segment is comfortable with minimal technology support – a good starting point for BYOD services 10 43% 60% 67% 0% 20% 40% 60% 80% I'm comfortable using technology with little or no help I like technology Technology is important to me
  • 11. UNDERSTAND YOUR CUSTOMERS AND OPERATING ENVIRONMENT • What populations of IT consumers exist in your business? • Where do they work? How technology savvy are they? • What applications do they use? What type of data do they access? • What does it cost to support them? • What BYOD capabilities do your IT enterprise management tools have? • What corporate policies are relevant? 11
  • 12. WHERE TO START – WHAT’S HOT WITH YOUR CUSTOMERS? • In the Modis environment, Tablets and Phones account for majority of BYOD devices, which is where our current strategy is focused • The complexity of desktop applications and security requirements has made widespread laptop and desktop BYOD too costly • Consider Tiered services, rather than “One Size Fits All” • Products like Citrix and Web delivery methods are making application portability more viable on common computing devices 12 91% 79% 12% 8% 1% 7% 9% 4% 3% 3% 2% 2% 84% 89% 96% Desktop Laptop/Notebook Smartphone Standard Mobile Phone Tablet Company Device Ownership Company Company &Personal Personal
  • 13. MAKING BYOD WORK: WHAT APPLICATIONS DO YOUR EMPLOYEES NEED? • Not all applications work well across all BYOD devices • Ensure the applications your employees need will meet performance and ease of use expectations • Consider starting with basics: Email, Calendar, Web • Modis workforce relies heavily on collaboration applications, most of which run well on mobile, tablet, and laptop devices • Now is the time to start planning for future applications can be used with BYOD 13 51% 53% 54% 59% 96% 99% 0% 20% 40% 60% 80% 100% 120% Presentations Web Meetings Instant Messaging Social Media Calendar Email
  • 14. PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS • Consider value vs. cost / effort / risk for different BYOD features o Trap: Supporting BYOD like traditional internal IT systems o Check: Most modern solutions include web access. Upgrading an old application might get you BYOD access out of the box • Engage your Legal, Risk Management, and Sourcing / Procurement function(s) for guidance • Think incrementally as you deploy features • Test the most widely use device / technologies and VIPs • Stick to mainstream BYOD-friendly applications if you can • Expect challenges14
  • 15. • Get right level of business and management sponsorship for success • Make BYOD program clear and align support methods with self- service tenants • Include BYOD survey items in your IT satisfaction surveys and IT cost metrics • Create employee Evangelist teams with access to news on “what’s next” to drive demand 15 COMMUNICATE!
  • 16. DOWNSIDE OF BYOD FOR COMPANIES 16 • Employee owned devices doesn’t translate to no cost for companies Ensure you consider TCO – total cost of ownership • Device types change almost daily Identify essential version and interface requirements • Sensitive and protected data can pose a security risk Have this discussion with your Risk, Legal, or Data Protection resource prior to BYOD implementation • For IT leaders it’s difficult to explain the time, effort and expense issues surrounding BYOD to business leaders If you are already doing IT cost tracking, include BYOD from day one
  • 17. DOWNSIDE OF BYOD FOR EMPLOYEES 17 • It can be costly to own and maintain a device  Consider an exception policy for employees who are unable to get a device, but need one • It may be necessary to purchase a more expensive data plan to accommodate the larger volume of communications  Think through how you’ll break out person vs. company data use • Employees may have difficulty “disconnecting” and having downtime  Work – Life balance is a key satisfaction point for most employees • When accessing the company’s network an employee may be unwittingly exposing personal information, passwords and browsing history  Acceptable use policy • In some situations an employee may be forced to relinquish the device so that it may be cleaned of company data  Communicate and help VIPs
  • 18. THE BOTTOM LINE ON BYOD • Understand what problem(s) you’re solving • Consider the total cost of BYOD, including a reimbursement policy • Plan comprehensively; it’s hard to “put the genie back in the bottle” • Be incremental in your approach to features and services to limit deployment risk and help users adjust to support • Communicate! • Review or update your security incident response processes 18

Editor's Notes

  1. Contact info is only available for 1st level connections. This includes an email address and a phone number if it’s been entered in the “Contact Settings”ORFor members who have posted contact info in their profiles aka “open networkers”