Preparing an Effective BYOD or Mobility Strategy

Like this? Share it with your network

Share

Preparing an Effective BYOD or Mobility Strategy

  • 2,404 views
Uploaded on

How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems......

How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,404
On Slideshare
2,396
From Embeds
8
Number of Embeds
2

Actions

Shares
Downloads
32
Comments
0
Likes
2

Embeds 8

https://twitter.com 6
http://byodstrategy.com 2

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Customers are wanting to provide choice in end-point devices – moving away from SOE. This allows people to work in new waysA simple definition of BYOD - any device, with any ownership, used anywhere – mobility is key to thisTraditional boundaries of an organisation are being blurred – both physically (where people work) and who (contractors, part time workers)These new workflows bring new challenges
  • Above is a snapshot of a large enterprise customer – typical of many large organisations(Above is a poll of devices on the customer’s enterprise network over two years)Note the almost exponential growth of iOS and Android devices
  • There are many benefits to enabling BYOD or having a mobility policy, including productivity and employee retention.
  • Employees are looking to work anywhere, on any device… The implications is that we now have corporate data on personal devices and a significantly higher number of potential attack vectors (or vulnerabilities/malware) into an organisation.
  • There are a range of organisational responses – in some case “no” may be the BYOD policy (for example Defence or specific applications). A more liberal approach is more common, with some degree of guest access or limited access to BYO devices or the use of MDM and VDI to securely bring BYO devices into the corporate environment. At the other end of the spectrum organisations will provide a choice of end device (COPE policy) and actively support mobility (for example, in the retail and often professional services sectors).
  • What steps do we recommend you consider – it is a high-level framework and1) develop a business case (or why are you doing it?)2) what are your current workflows3) look at the requirements for each of the categories in Step 24) what policies are required to enable 5) how do you support this new strategy?
  • Review the “current state” of the existing desktop/phone fleet, including support and “hidden” costs. Understand the costs of implementing a BYOD environment with the appropriate level of security (technology and operational costs)Estimate the potential savings that can be realised – retiring old devices, self-support models, reduced CapEx on corporate devices
  • How do staff need to – and want to – work? Identify common work styles or “use cases” that can apply to sets of users.
  • What kind of connectivity and devices best support each type of worker? These need to be mapped out – typically these can be grouped into 4-6 roles or working styles.
  • All departments are stakeholders in making this change, and a consultative approach is required in developing a policylegal implications / risksHRAn important aspect is “rules of use” – clear expectations must be set and all employees must understands these. Write them in plain English and ensure they are communicated at all levels of the organisation.
  • Some basic “rules” are:Acceptance that the business can remotely wipe data if requiredMinimum password length/complexityReporting of any device loss/theft
  • Set clear policies around what is acceptable: what are the employee entitlements and responsibilities
  • A sensible user support model is critical – BYOD can increase the workload (without an increase in the IT support budget), but self-support models and creating a community of knowledge / corporate wiki have been proven to offset this additional complexity
  • So,in summary: BYOD is happening or not – so you need to position IT as an enabler and develop an appropriate strategy for your organisation. Once you have a strategy, there are many tools that can help you effectively implement the right balance of security and mobility – Logicalis has done this for a number of organisations and can assist with all aspects of developi

Transcript

  • 1. Preparing an Effective BYOD or Mobility Strategy Martin Lindeman Solution Architect
  • 2. Agenda 1. Intro - What Are The Benefits? 2. Do You Need a Strategy? 3. Creating a BYOD Strategy 4. Questions 2
  • 3. What is ‘Bring Your Own Device’? 3  Bring Your Own Device enables end users to securely use devices they choose to increase their productivity and mobility  These can be devices purchased by the employer, the employee, contractors, suppliers “BYOD means any device, with any ownership, used anywhere”
  • 4. BYOD Mobility Landscape 4 Smartphones and Tablets Two year mobile device growth rate is 102% Platform June 2010 June 2011 June 2012 iPhone 3,554 16,857 23,258 iPad 150 5,418 10,779 BlackBerry 14,802 14,233 9,724 Android 40 3,526 6,592 Others 7,005 1,406 1,010 Total 25,401 41,440 51,363 19% 45% 21% 13%
  • 5. Win – Win BYOD Delivers Benefits to Employees and the Enterprise 5  Employees get greater control of their work experience through choice of device  75% of IT execs report that allowing employees to bring consumer devices to work has increased employee morale 1  Employers get a more productive workforce and lower costs  72% of IT execs say that employees who bring consumer devices into the workplace are more productive 1  Annual benefits from BYOD to enterprises ranges from $300 to $1,300 per employee depending on job role 2 1. 2011 IDC Consumerization of IT Study 2. 2012 Cisco IBSG Horizons Study
  • 6. Do You Need a Strategy?
  • 7. This is What We are Facing 7 Reduce Security Risk Improve End-User Productivity Increase Operation Efficiencies  Over 15 billion devices by 2015, with average worker with 3 devices  New workspace: anywhere, anytime  71% of Gen Y workforce do not obey policies  60% will download sensitive data on a personal device End – User Behaviours IT Trends  Must control the multiple devices and guests  Security: Top concern for BYOD  Mobile malware quadrupled (from 2010 to 2012)  IT consumed with network fragmentation
  • 8. The BYOD Spectrum 8 Denied or Restricted Allowed Encouraged Mandated Environment requires tight control: Corp Only Device Mfg Environment Trading Floor Classified Gov Networks Traditional Enterprise Focus on basic services, easy access, almost anybody Broader Device Types But Internet Only Edu Environment Public Institutions Simple Guest Enable differentiated services, on-boarding with security but no ownership Multiple Device Types + Access Methods, VDI Healthcare Early BYOD Enterprise Adopters Contractors Corp native apps, new services, full control Multiple Device Types Corp Issued, MDM Innovative Enterprises Retail on Demand Mobile Sales Service (Video, Collaboration, etc)
  • 9. Creating a Desktop BYOD Strategy
  • 10. Five Steps to Create a BYOD Strategy 10 Step 1 Develop a Business Plan Step 2 Segment the Workforce Step 3 Create a Service Strategy Step 4 Define the Policy Step 5 Develop User Support Model
  • 11. Step 1: Developing a Business Case Calculate an ROI for multiple scenarios 11 Operating Cost Potential Savings Return on Investment Current TCO Upfront Investment  Calculate the Total Cost of Ownership for existing fleet  Include OS, Software, Hardware, Security, Asset Management, Support, Storage, Lost & Stolen Devices  Add the upfront investment required to move to BYOD  Include VDI, licensing, software & content virtualisation, infrastructure, resource costs  Add the ongoing costs of a BYOD program  Include all incremental costs to deliver BYOD  Include tax implications of any employee allowance  Subtract the savings that can be generated in each TCO line item through BYOD  Include savings generated by retiring old services  Calculate potential ROI then adjust the elements of your strategy to model multiple scenarios  Model different scope, timing, employee entitlements
  • 12. Step 2: Workforce Segmentation 12 Work Styles Workstation Anchored Local Collaborator Remote WorkerHighly Mobile Offsite External  Select some key dimensions to segment the workforce (e.g. 'need for mobility‟ & „need for support‟)  Group users based on common “work styles” regardless of role and department  Identify common use cases that apply to each set of users
  • 13. Step 3: Creating a Service Strategy Map Workforce Segments to Planned Service Offerings 13 Corporate Laptop VDI End Point Mobile Device Non-Corp Laptop Workstation Anchored Local Collaborator Remote Worker Highly Mobile Offsite External Prioritise Use Cases for Implementation
  • 14. Step 4: Defining the Policy BYOD Policy Design 14  Designing the right policies is critical to controlling costs - 86% of BYOD costs are non-device- related 1  IT should drive the policy design however buy-in needed from HR, Finance, Tax, Legal, and Corporate Security  Policy must define minimum acceptable standards for Hardware, Operating System, and Security software  A clear entitlement policy is necessary to ensure the right tools and services are offered to the right users for the right cost  Rules of Use are necessary to set clear expectations around user behaviours
  • 15. 15 Corporate Rules of Use 1) Allows Business to remotely wipe the device 2) Requires an acceptable password and 10 minute timeout 3) Require users to immediately report a lost or stolen device.  All users must accept rules of use when signing up for service  Trade off between employee trust and IT control  There is no IT jargon – the rules are simple for end- users to understand Step 4: Defining the Policy BYOD Rules of Use
  • 16. 16 Corporate Policies  Service Entitlement  Rules of Use  Device Purchase Local Directives • Geography • Business Functions Approvals  MD for Policy Variations  Manager for Individual Liable  Employee for Self Support Agreement Step 4: Defining the Policy BYOD Policy Implementation
  • 17. 17  BYOD without a corresponding strategy generates more work for IT – 80% of IT respondents had increased support workloads from consumerisation 1  IT budgets are not scaling at the same rate  A new support model is required:  IT supports connectivity problems and issues with the corporate applications and the operating system  Hardware support provided by device manufacture or user  Community support forums for knowledge sharing and best practices Step 5: Developing a User Support Model Designing a Support Model 1. 2011 IDC Consumerization of IT Study
  • 18. Conclusions Key Takeaways 18 1. BYOD is happening - with or without IT 2. Position IT as an enabler - not a barrier 3. Leverage the BYOD trend and target high value use cases 4. Test the waters first before wide-scale deployment 5. Find your right balance between security and client experience 6. Leverage the latest tools out there: eg) MDM and Posture Assessment