SlideShare a Scribd company logo
1 of 29
Consumerization of IT and BYOD
Bring Your Own Device

Martin Perry
Why Now?
The Demand
The Demand
The Demand
BYOD is happening
Every CIO is trying to understand how this trend impacts the organization

An
88%
Unstoppable
Shift

Globally, 88% of
executives report
employees are using
their personal
computing
technologies for
business purposes
today*

62%
Globally, 62% of
executives say they are
now have or are
planning to have a BYOD
program for
smartphones and
tablets*

3.3

Information workers wil
have 3.3 connected
devices in 2014 – up
18% from 2.8 in 2012^

6

6

* Gartner: Using Peer-to-Peer communities to Drive BYOD self-support; Aug 3, 2012

^ Cisco: The Everywhere Employee: Increase of Business Devices
Business users are making the choice in what devices, applications, and services they use to get their
work done

7
NEW USAGE MODELS IN THE NEW
WORKSPACE
Companion devices: In this usage model, people use tablets and smartphones
as companion devices to augment the functionality delivered by their primary
device, such as a PC. This is the category where the BYOD trend is most
prevalent.
Presentation devices: Particularly common in sales environments; for example
in retail, a sales assistant in a clothing store may use a tablet or a smartphone
to check if an item is in stock or to even photograph people in-store and
superimpose images of clothes on them to save them a trip to the fitting room.
Digital workflow devices: In paper-based workflows, we are seeing increasing
digitisation. To illustrate, nurses may have previously relied on clipboards to
keep track of medication records. In some hospitals they are now given tablets
to connect this process to the rest of the IT system, increasing efficiencies.
Context-aware devices: This future-orientated usage model is characterised
by the adoption of emerging technologies that have traditionally been used by
consumers in business class devices. For example, an estate agent might use an
augmented reality application to give prospective house buyers a tour of an
empty property to demonstrate a possible furniture layout or to show where the
nearest train stations and schools are located in relation to the property
WHAT ARE THE BENEFITS
• Cost savings – BYOD can shift the upfront cost of device purchases and connectivity to the users,
moving you from full service payments to a predictable monthly mobile allowance for your users.
• Enhance users’ experience, productivity and satisfaction – Let your users work on their preferred,
familiar personal devices (often superior to the corporate-liable counterpart) and carry less by
consolidating to a single device for work and personal use.
• Increase personal responsibility - BYOD leads users to be more aware of excessive usage and savvy
employees are more willing to troubleshoot their own devices as a first resort, before calling for IT
support.
• Speed up the rate of technology adoption - By allowing users to dictate technology choice, there is
more innovation throughout the organisation. This can lead to new ways of working
BYOD Top Priorities

Consumerization of IT is driving new devices and access requests

Companies need to address consumerization of IT and implications to BYOD

People expect to work on multiple devices and from anywhere

Companies need to provide access to applications and data from any device

IT to manage the devices in a cohesive manner, taking security into consideration

10
Challanges
“Aberdeen Group found that a company with
1,000 mobile devices spends an extra
$170,000 per year, on average, when they use
a BYOD approach.” (CIO magazine, 27 August)
“Many of the 200 ANZ ICT decision makers
surveyed believe their business are at
increased risk because of BYOD programs
…only 37% felt they were well prepared for
it” (IT Wire, 20 Aug)
“47% of the large enterprises surveyed are
not expanding their BYOD

program…reasons for this include increased
cost, complexity, administrative overheads,
additional security concerns and a common
perception of immature solutions.” (ARN, 20
Aug)
“67% of IT Directors admitted that supporting the
CEO‟s latest toys is behind many current BYOD
agendas!”
UK Survey
“73% of IT Directors say BYOD will lead to
uncontrolled costs, not savings”

UK Survey
“69% of IT Directors say cost savings through
lower support costs are „non-existent‟ despite
the perception that personal devices will
reduce the workload of IT staff”
UK survey
“The use of personal devices continues to be
driven by employees rather than a defined
business strategy”
UK Survey
Top 5 Threats with BYOD
The deployment of a BYOD solution brings new challenges, one of the most critical
being security.

Category
Data Leakage

Threat ID

Threat Description
Data loss from lost, stolen or decommissioned devices

T2 (T#2 CSA)

Information stealing malware

T3 (RD1
ENISA)

Loss of corporate data due to unauthorized sharing of information, services or sharing of
devices

T4 (RD2
ENISA)
Device
Security

T1 (T#1 CSA)

Potential loss of corporate data as a result of access by unknown users and unmanaged
devices to enterprise networks

T5 (T#4 CSA)

Vulnerability in hardware, OS, application and third party apps.
Device compromise (malware attack, jailbreak).
Additional Considerations and Hurdles for BYOD

40%

of devices used to access business
applications are personal devices

Security

Privacy

New Types of
Apps

HR

Support

Data Retention

Systems
Management

Device theft &
Data Breach

Cost Savings

Usage Policies

Malware

Compliance

of identity theft is by Friends and family

27%
36%
33%

said they would try to get around an IT
policy that forbade them from using a
personal device at work.
higher costs for BYOD, on average, than
a company-owned policy - The
Aberdeen Group
Solutions
Building a BYOD strategy
BYOD is gathering momentum and is a current issue for all
organisations
Not clear what the policies, security aspects, benefits and
infrastructure will look like.
A broad spectrum of approaches, each organisation must define
their own path to deal with a mixed-ownership mobile
environment.
Even if BYOD is not embraced, it needs to be dealt with
3 different approaches are proposed here to tackling BYOD:
– The liberal approach – Bring your own device
– The hybrid approach – Choose your own device
– The zero tolerance approach – Get what you’re given
The Liberal Approach- Actual BYOD
Let staff buy the device and pay for the contract. Employees will

– buy the device of their choice
– own the SIM and the number
– the organisation will compensate with a monthly allowance (similar to a car
allowance).

IT will need to take the necessary measures to secure the corporate
data, applications and network on these devices

Pros:
Simple to implement – users pay for their own contracts from a
monthly allowance and use their own personal devices, removing the
burden of procurement, billing and administration from the company.
Potential cost savings – transfer the upfront cost burden to the
employees and replace full service and hardware costs with a
predictable monthly spend.
Superior, familiar and more productive user experience –
allowing users to work on their preferred devices can increase
satisfaction and productivity, by giving them the tools they want to use
for the work they need to do.
The Liberal Approach- Actual BYOD
Cons:
Cost savings can be less than expected – most businesses currently purchase their
hardware and tariffs at highly subsidised rates from the vendors. Full consumer prices
expensive verses a standard business contract
Excessive calls costs – with no central corporate tariffs and consumer contracts
spread across multiple mobile networks
Acceptable usage and liability issues. Distinguishing between personal data usage
and calls can be difficult
–

legally the users don’t have to disclose this information if the contract is in their name

Securing the unsecure – people use personal devices differently from business
devices, falling foul of compliance - privacy vs security.

– Lost Device what data can be remotely wiped in this scenario?

Security Issues

– All devices must have the fundamental security features required to be viable for corporate use, if
security features prove too restrictive, the users’ experience may be damaged and make the
whole concept of BYOD unappealing.
– secure the corporate network against these BYOD devices accessing it

Support and suitability – can IT support customer preference which tend to shift
rapidly?
Level of support is offered. Do BYOD devices get

– full support,
– best effort
– no support
The Hybrid Approach- Choose Your Own Device
CYOD
Use the device of choice for work purposes, but with the organisation retaining
ownership of the SIM and contract.
CYOD still offers the flexibility to select their preferred device, while allowing the
organisation to manage data security and have greater visibility and control around
mobile costs.
Pros:
Supports device choice – select the device which offers high user experience and
functionality.

– A policy that doesn’t support the devices users’ desire – or that has extensive usage restrictions
will have limited appeal and impact.
– A variant might be to offer a recommended list of devices to users, but sourced through the
company, possibly with varying levels of subsidy based upon job roles.

IT retains greater control

– by owning the SIM, IT can exert much greater control over expenditure, contract negotiation,
compliance, security requirements and costs.
– retaining control of the SIM eliminates several grey areas around the disclosure of usage
information, and also allows the company to retain number control if the employee leaves the
business.

Reduce mobile call costs

– calls cost are still one of the most significant areas of mobile spend.

Easier to manage - centralised billing from the primary network provider enables
billing interrogation which offers greater visibility of tariff costs and operating
efficiency.
Single mobile network eases the support burden and offers user familiarity.
The Hybrid Approach- Choose Your Own Device
CYOD
Cons:
Personal vs corporate conflicts–

– steps to secure corporate data,
– users are equally protective of their privacy and the integrity of their personal
data.
– if the device is lost can it be fully or selectively wiped?
– user policies must be in place before allowing devices to access the network.

personal calls versus work usage.

– ensure compliance with VAT rules around personal call costs
– control and reduce your mobile call costs.
– clear policy on personal use policy that outlines guidelines for acceptable
personal usage and the ramifications for breaching these.

Need IT resources who are experts on the range of devices and
operating systems (iOS, Android, BlackBerry etc.) that are supported.
Device refresh - users will want regular upgrades to their devices,
similar to the yearly upgrades they are used to from consumer
contracts. How will these be funded and paid for?
stringent security requirements and restrictions on personal usage
can damage the user experience and satisfaction.
THE ZERO TOLERANCE APPROACH - GET
WHAT YOU‟RE GIVEN (GWYG)
This strategy is to discourage rather than embrace BYOD

– prioritising protecting your network and data over user experience and satisfaction.

Employees will be issued business owned devices, SIMs and contracts

– will be discouraged from using personal devices.

This doesn’t mean they can’t be issued the latest and greatest devices,

– those decisions will be driven by the business and personal usage will be strictly regulated.

Pros:
it eliminates

– concerns around supporting and securing personal devices
– securing the corporate network against these devices.

It also sidesteps several potential concerns around

– personal vs corporate liability
– procurement.

Cons:
This approach can seem to be ignoring rather than addressing the challenge.

– Tech savvy users may well still try to circumvent your restrictions and connect to the network
anyway,
– could easily result in a damaging data breach.

Poor user experience and satisfaction

– business-led decisions around devices and usage will inevitably lean towards the conservative,
offering a lack of user satisfaction as they can’t work in the way they want to, where they want to
and on the technology they prefer.
Conclusions - Do the pros outweigh the
cons?
BYOD schemes can help businesses
– gain access to a more mobile, connected and engaged workforce.
– Workforce members can use their smartphones and tablets to work more
effectively and boost productivity rates,
– little outlay other than to tweak their security procedures to account for
the use of external devices.

There are potential risks associated with the use of personal mobile
devices in a professional setting.
– the required security safeguards must be put in place
– employees fully understand the boundaries and buy in to the
organisation's mobile culture.

If businesses focus on the advantages of BYOD
– there is a compelling case for allowing employees to use their own
laptops, smartphones and tablets in-house
– firms which turn a blind eye to BYOD, management may have difficulties
explaining to their workers why they need to use a business-owned
smartphone or laptop, when they can work more effectively on their
personal device.
Thank
You

More Related Content

What's hot

Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
2014 - Mobile device management - mdm - case study - news agency
2014 - Mobile device management - mdm - case study - news agency2014 - Mobile device management - mdm - case study - news agency
2014 - Mobile device management - mdm - case study - news agencyPulkit Bhatnagar
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case studyManageEngine
 
Resilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineResilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineCognizant
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Enterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the EnterpriseEnterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the Enterprise[x]cube LABS
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail StoreConsumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store- Mark - Fullbright
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaborationSvetlana Belyaeva
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...eSAT Publishing House
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wpraghuvamsiuriti
 
Ericsson ConsumerLab: Business users go mobile
Ericsson ConsumerLab: Business users go mobileEricsson ConsumerLab: Business users go mobile
Ericsson ConsumerLab: Business users go mobileEricsson
 

What's hot (20)

Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
2014 - Mobile device management - mdm - case study - news agency
2014 - Mobile device management - mdm - case study - news agency2014 - Mobile device management - mdm - case study - news agency
2014 - Mobile device management - mdm - case study - news agency
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case study
 
Resilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineResilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural Discipline
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
MIS Case Study
MIS Case StudyMIS Case Study
MIS Case Study
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Enterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the EnterpriseEnterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the Enterprise
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail StoreConsumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Case study 1
Case study 1Case study 1
Case study 1
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wp
 
Ericsson ConsumerLab: Business users go mobile
Ericsson ConsumerLab: Business users go mobileEricsson ConsumerLab: Business users go mobile
Ericsson ConsumerLab: Business users go mobile
 
Ahmed Banafa EMM
Ahmed Banafa EMMAhmed Banafa EMM
Ahmed Banafa EMM
 

Similar to Bring Your Own Device is a disruptive phenomenon that is a significant IT trend

Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick SnapshotLinson Kolanchery
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices Vishwa Raj
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD or not to BYOD
BYOD or not to BYODBYOD or not to BYOD
BYOD or not to BYODValicom
 
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODIan Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODGlobal Business Events
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 

Similar to Bring Your Own Device is a disruptive phenomenon that is a significant IT trend (20)

Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD
BYODBYOD
BYOD
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Byod
ByodByod
Byod
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD or not to BYOD
BYOD or not to BYODBYOD or not to BYOD
BYOD or not to BYOD
 
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODIan Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 

Recently uploaded

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend

  • 1. Consumerization of IT and BYOD Bring Your Own Device Martin Perry
  • 6. BYOD is happening Every CIO is trying to understand how this trend impacts the organization An 88% Unstoppable Shift Globally, 88% of executives report employees are using their personal computing technologies for business purposes today* 62% Globally, 62% of executives say they are now have or are planning to have a BYOD program for smartphones and tablets* 3.3 Information workers wil have 3.3 connected devices in 2014 – up 18% from 2.8 in 2012^ 6 6 * Gartner: Using Peer-to-Peer communities to Drive BYOD self-support; Aug 3, 2012 ^ Cisco: The Everywhere Employee: Increase of Business Devices
  • 7. Business users are making the choice in what devices, applications, and services they use to get their work done 7
  • 8. NEW USAGE MODELS IN THE NEW WORKSPACE Companion devices: In this usage model, people use tablets and smartphones as companion devices to augment the functionality delivered by their primary device, such as a PC. This is the category where the BYOD trend is most prevalent. Presentation devices: Particularly common in sales environments; for example in retail, a sales assistant in a clothing store may use a tablet or a smartphone to check if an item is in stock or to even photograph people in-store and superimpose images of clothes on them to save them a trip to the fitting room. Digital workflow devices: In paper-based workflows, we are seeing increasing digitisation. To illustrate, nurses may have previously relied on clipboards to keep track of medication records. In some hospitals they are now given tablets to connect this process to the rest of the IT system, increasing efficiencies. Context-aware devices: This future-orientated usage model is characterised by the adoption of emerging technologies that have traditionally been used by consumers in business class devices. For example, an estate agent might use an augmented reality application to give prospective house buyers a tour of an empty property to demonstrate a possible furniture layout or to show where the nearest train stations and schools are located in relation to the property
  • 9. WHAT ARE THE BENEFITS • Cost savings – BYOD can shift the upfront cost of device purchases and connectivity to the users, moving you from full service payments to a predictable monthly mobile allowance for your users. • Enhance users’ experience, productivity and satisfaction – Let your users work on their preferred, familiar personal devices (often superior to the corporate-liable counterpart) and carry less by consolidating to a single device for work and personal use. • Increase personal responsibility - BYOD leads users to be more aware of excessive usage and savvy employees are more willing to troubleshoot their own devices as a first resort, before calling for IT support. • Speed up the rate of technology adoption - By allowing users to dictate technology choice, there is more innovation throughout the organisation. This can lead to new ways of working
  • 10. BYOD Top Priorities Consumerization of IT is driving new devices and access requests Companies need to address consumerization of IT and implications to BYOD People expect to work on multiple devices and from anywhere Companies need to provide access to applications and data from any device IT to manage the devices in a cohesive manner, taking security into consideration 10
  • 12. “Aberdeen Group found that a company with 1,000 mobile devices spends an extra $170,000 per year, on average, when they use a BYOD approach.” (CIO magazine, 27 August)
  • 13. “Many of the 200 ANZ ICT decision makers surveyed believe their business are at increased risk because of BYOD programs …only 37% felt they were well prepared for it” (IT Wire, 20 Aug)
  • 14. “47% of the large enterprises surveyed are not expanding their BYOD program…reasons for this include increased cost, complexity, administrative overheads, additional security concerns and a common perception of immature solutions.” (ARN, 20 Aug)
  • 15. “67% of IT Directors admitted that supporting the CEO‟s latest toys is behind many current BYOD agendas!” UK Survey
  • 16. “73% of IT Directors say BYOD will lead to uncontrolled costs, not savings” UK Survey
  • 17. “69% of IT Directors say cost savings through lower support costs are „non-existent‟ despite the perception that personal devices will reduce the workload of IT staff” UK survey
  • 18. “The use of personal devices continues to be driven by employees rather than a defined business strategy” UK Survey
  • 19. Top 5 Threats with BYOD The deployment of a BYOD solution brings new challenges, one of the most critical being security. Category Data Leakage Threat ID Threat Description Data loss from lost, stolen or decommissioned devices T2 (T#2 CSA) Information stealing malware T3 (RD1 ENISA) Loss of corporate data due to unauthorized sharing of information, services or sharing of devices T4 (RD2 ENISA) Device Security T1 (T#1 CSA) Potential loss of corporate data as a result of access by unknown users and unmanaged devices to enterprise networks T5 (T#4 CSA) Vulnerability in hardware, OS, application and third party apps. Device compromise (malware attack, jailbreak).
  • 20. Additional Considerations and Hurdles for BYOD 40% of devices used to access business applications are personal devices Security Privacy New Types of Apps HR Support Data Retention Systems Management Device theft & Data Breach Cost Savings Usage Policies Malware Compliance of identity theft is by Friends and family 27% 36% 33% said they would try to get around an IT policy that forbade them from using a personal device at work. higher costs for BYOD, on average, than a company-owned policy - The Aberdeen Group
  • 22. Building a BYOD strategy BYOD is gathering momentum and is a current issue for all organisations Not clear what the policies, security aspects, benefits and infrastructure will look like. A broad spectrum of approaches, each organisation must define their own path to deal with a mixed-ownership mobile environment. Even if BYOD is not embraced, it needs to be dealt with 3 different approaches are proposed here to tackling BYOD: – The liberal approach – Bring your own device – The hybrid approach – Choose your own device – The zero tolerance approach – Get what you’re given
  • 23. The Liberal Approach- Actual BYOD Let staff buy the device and pay for the contract. Employees will – buy the device of their choice – own the SIM and the number – the organisation will compensate with a monthly allowance (similar to a car allowance). IT will need to take the necessary measures to secure the corporate data, applications and network on these devices Pros: Simple to implement – users pay for their own contracts from a monthly allowance and use their own personal devices, removing the burden of procurement, billing and administration from the company. Potential cost savings – transfer the upfront cost burden to the employees and replace full service and hardware costs with a predictable monthly spend. Superior, familiar and more productive user experience – allowing users to work on their preferred devices can increase satisfaction and productivity, by giving them the tools they want to use for the work they need to do.
  • 24. The Liberal Approach- Actual BYOD Cons: Cost savings can be less than expected – most businesses currently purchase their hardware and tariffs at highly subsidised rates from the vendors. Full consumer prices expensive verses a standard business contract Excessive calls costs – with no central corporate tariffs and consumer contracts spread across multiple mobile networks Acceptable usage and liability issues. Distinguishing between personal data usage and calls can be difficult – legally the users don’t have to disclose this information if the contract is in their name Securing the unsecure – people use personal devices differently from business devices, falling foul of compliance - privacy vs security. – Lost Device what data can be remotely wiped in this scenario? Security Issues – All devices must have the fundamental security features required to be viable for corporate use, if security features prove too restrictive, the users’ experience may be damaged and make the whole concept of BYOD unappealing. – secure the corporate network against these BYOD devices accessing it Support and suitability – can IT support customer preference which tend to shift rapidly? Level of support is offered. Do BYOD devices get – full support, – best effort – no support
  • 25. The Hybrid Approach- Choose Your Own Device CYOD Use the device of choice for work purposes, but with the organisation retaining ownership of the SIM and contract. CYOD still offers the flexibility to select their preferred device, while allowing the organisation to manage data security and have greater visibility and control around mobile costs. Pros: Supports device choice – select the device which offers high user experience and functionality. – A policy that doesn’t support the devices users’ desire – or that has extensive usage restrictions will have limited appeal and impact. – A variant might be to offer a recommended list of devices to users, but sourced through the company, possibly with varying levels of subsidy based upon job roles. IT retains greater control – by owning the SIM, IT can exert much greater control over expenditure, contract negotiation, compliance, security requirements and costs. – retaining control of the SIM eliminates several grey areas around the disclosure of usage information, and also allows the company to retain number control if the employee leaves the business. Reduce mobile call costs – calls cost are still one of the most significant areas of mobile spend. Easier to manage - centralised billing from the primary network provider enables billing interrogation which offers greater visibility of tariff costs and operating efficiency. Single mobile network eases the support burden and offers user familiarity.
  • 26. The Hybrid Approach- Choose Your Own Device CYOD Cons: Personal vs corporate conflicts– – steps to secure corporate data, – users are equally protective of their privacy and the integrity of their personal data. – if the device is lost can it be fully or selectively wiped? – user policies must be in place before allowing devices to access the network. personal calls versus work usage. – ensure compliance with VAT rules around personal call costs – control and reduce your mobile call costs. – clear policy on personal use policy that outlines guidelines for acceptable personal usage and the ramifications for breaching these. Need IT resources who are experts on the range of devices and operating systems (iOS, Android, BlackBerry etc.) that are supported. Device refresh - users will want regular upgrades to their devices, similar to the yearly upgrades they are used to from consumer contracts. How will these be funded and paid for? stringent security requirements and restrictions on personal usage can damage the user experience and satisfaction.
  • 27. THE ZERO TOLERANCE APPROACH - GET WHAT YOU‟RE GIVEN (GWYG) This strategy is to discourage rather than embrace BYOD – prioritising protecting your network and data over user experience and satisfaction. Employees will be issued business owned devices, SIMs and contracts – will be discouraged from using personal devices. This doesn’t mean they can’t be issued the latest and greatest devices, – those decisions will be driven by the business and personal usage will be strictly regulated. Pros: it eliminates – concerns around supporting and securing personal devices – securing the corporate network against these devices. It also sidesteps several potential concerns around – personal vs corporate liability – procurement. Cons: This approach can seem to be ignoring rather than addressing the challenge. – Tech savvy users may well still try to circumvent your restrictions and connect to the network anyway, – could easily result in a damaging data breach. Poor user experience and satisfaction – business-led decisions around devices and usage will inevitably lean towards the conservative, offering a lack of user satisfaction as they can’t work in the way they want to, where they want to and on the technology they prefer.
  • 28. Conclusions - Do the pros outweigh the cons? BYOD schemes can help businesses – gain access to a more mobile, connected and engaged workforce. – Workforce members can use their smartphones and tablets to work more effectively and boost productivity rates, – little outlay other than to tweak their security procedures to account for the use of external devices. There are potential risks associated with the use of personal mobile devices in a professional setting. – the required security safeguards must be put in place – employees fully understand the boundaries and buy in to the organisation's mobile culture. If businesses focus on the advantages of BYOD – there is a compelling case for allowing employees to use their own laptops, smartphones and tablets in-house – firms which turn a blind eye to BYOD, management may have difficulties explaining to their workers why they need to use a business-owned smartphone or laptop, when they can work more effectively on their personal device.

Editor's Notes

  1. Sources:34/69% data point - Microsoft Customer Survey 201188% employees using personal computing technologies - Gartner: Using Peer-to-Peer communities to Drive BYOD self-support; Aug 3, 20123.3 Connected devices - Cisco: The Everywhere Employee: Increase of Business Devices
  2. Sources:34/69% data point - Microsoft Customer Survey 201188% employees using personal computing technologies - Gartner: Using Peer-to-Peer communities to Drive BYOD self-support; Aug 3, 20123.3 Connected devices - Cisco: The Everywhere Employee: Increase of Business Devices
  3. Sources:34/69% data point - Microsoft Customer Survey 201188% employees using personal computing technologies - Gartner: Using Peer-to-Peer communities to Drive BYOD self-support; Aug 3, 20123.3 Connected devices - Cisco: The Everywhere Employee: Increase of Business Devices