Published on

Ready for some practical guidance on the consumerization of IT? Although many see consumerization as a growing trend, it’s fast becoming a permanent fixture in the enterprise environment. Chances are, it’s already happening in your own organization.

To minimize the risks associated with unsecured and unmanaged technologies in the enterprise, it’s important to take a proactive approach. This practical guide to the consumerization of IT explains how IT managers can adopt a user-centered strategy—one designed to optimize the computing experience and keep the user productive on any device—all while maintaining the performance, security, and manageability that IT demands. Moreover, this new approach gives IT a powerful opportunity to retain the organization’s reputation as a technology innovator—especially when it comes to Bring Your Own Device (BYOD) programs. This guide also includes insights and best practices for supporting employee-owned devices and selecting the right employer-provided tools for diverse roles and responsibilities and a range of technology needs.

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Five Steps to Consumerization Intel’s Guide to Embracing the Inevitable
  2. 2. Intel’s Definition Consumerization: The technology we use in our personal lives—applications, hardware, and even Internet services—has a distinct impact on the technology experience we expect at work. Extends beyond devices to include the entire computing experience—much broader than Bring Your Own (BYO)2
  3. 3. Rethink Your Approach By better aligning employees’ at-work technology experience and their at-home experience, you can: Increase Retain your Gain greater IT productivity and organization’s security and control improve employee reputation as a over employee- morale technology owned devices innovator—especially when it comes to Bring Your Own Device programs3
  4. 4. Manage Consumerization in Five Steps 1 Understand the powerful forces driving consumerization. 2 Rethink user computing with a user-centered strategy. 3 Create an inclusive approach by creating a two-way communication channel with users. 4 Support employee-owned devices with known best IT practices. 5 Find the right employer-provided tool for the job to give employees what they need: One size does not fit all.4
  5. 5. Step 1. Understand the Forces at Work Traditional IT Requirements Standardization Compliance = Manageability Security IT Innovation + Emerging IT must balance traditional IT requirements with emerging end-user needs. End-User Needs Freedom Flexibility Individuality DRIVERS Device Innovation Increasing Mobility Cloud Services Increased Data Availability Natural Interaction with Technology Evolution of the User5
  6. 6. Step 2. Rethink User Computing Rethink the Maintain the Use centralized compute comprehensive management experience to security, to securely give users the automated deliver the right freedom and management, resources. flexibility they compatibility, want. and compliance that IT requires.6
  7. 7. Step 3. Create an Inclusive Approach Communication Security Adopt a two-way Improve job satisfaction communication channel vs. while you gain stronger the traditional IT-to-user security and control. model.7
  8. 8. Step 4. Support Employee-Owned Devices Ensure Success with Best Practices: Engage Update Decide on Plan Stay stakeholders your security OS and deployment current with model devices technology 1 2 3 4 5 • Engage key stakeholders. • Enable the technology and plan • Update your security model. deployment. • Choose which operating systems and • Stay current with technologies and devices you will support. trends.8
  9. 9. Step 5. Find the Right Tool for the Job OPTIMIZED FOR BATTERY LIFE OPTIMIZED FOR PERFORMANCE CONTENT CONSUMPTION CONTENT CREATION TABLET ULTRABOOK™ ULTRABOOK™ CONVERTIBLE1 Information at your fingertips. A versatile two-in-one device An outstanding mobile Enables stand-up computing, that seamlessly adapts to your computing experience in sleek data snacking, and usages that needs. and responsive designs, with need lighter weight, long great performance and battery battery life, and an always life. connected experience. HIGHLY MOBILE WORKER TASK WORKER KNOWLEDGE WORKER 1 Ultrabook products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook manufacturer. For more information and details, visit
  10. 10. Innovation for Business Ultrabook™, Inspired by Intel 1 Available as a two-in-one device with a detachable touch screen that converts to a tablet Also available in convertible models that offer swivel capabilities and slide and flip screens for standing use Offers built-in security2 for greater protection with the 3rd generation Intel® Core™ vPro™ processor3 1 Ultrabook products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook manufacturer. For more information and details, visit 2 No computer system can provide absolute security under all conditions. Built-in security features available on select Intel Core processors may require additional software, hardware, services, and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details. For more information, visit 3 Intel vPro technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more about the breadth of security features, visit
  11. 11. Learn More • Read the full planning guide, Five Steps to Consumerization: Intel’s Guide to Embracing the Inevitable. • Find out more about managing consumerization from Intel at • For more information about Ultrabook™ products, visit
  12. 12. Visit the Intel® IT Center
  13. 13. Legal The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance. This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Copyright © 2012 Intel Corporation. Intel, Intel Core, the Intel logo, Intel Sponsors of Tomorrow., the Intel Sponsors of Tomorrow. logo, Intel vPro, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries.13