• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Considering a BYOD Infrastructure
 

Considering a BYOD Infrastructure

on

  • 819 views

Accompanying Executive Summary

Accompanying Executive Summary
http://melissamandrews.blogspot.com/2013/05/executive-summary-considering-byod.html

Statistics

Views

Total Views
819
Views on SlideShare
818
Embed Views
1

Actions

Likes
0
Downloads
21
Comments
0

1 Embed 1

http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Overview of what BYOD is
  • Explain overall approach of the presentation
  • Most common cons citedBYOD can increase security and can lessen costsMore important business benefits: Productivity and InnovationAdds to bottom line and competitive advantage
  • Prevent Rogue Devices / Minimize Data LeakageReduce Capital Expenditures / Reallocate Technical ResourcesOptimize Electronic Devices / Facilitate Unrestricted MobilityElevate Workforce Composition / Leverage Technical Advances Create Infrastructure Versatility / Embrace the FutureWe will see that BYOD Becomes a Must
  • On a daily basis, employees are attempting to utilize their own devices. The implementation of a Mobile Device Management system will control what devices can access the networkSource 1: Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. .
  • No data touches the devices eliminating need for device encryptionCan prevent download of data to USB and other devicesCentralized data makes it easier to secure, audit and recover.Source 2: Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013. .Source 3: Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. .
  • BYOD can eliminate the capital expenditure of replacement hardware. A cost-effective BYOD requires the cloud on the back end otherwise costs of maintaining security will quickly negate capital savings.With VDI in the back end standard end-point patch management and anti-virus costs can be eliminated. A BYOD model doesn’t need to be all or nothing. A certain subset of users can be allowed into the BYOD model. Reimbursements or stipends can be offered. Source 4: Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013. .
  • A BYOD model can require that employees, not IT support, to select, provision and maintain their equipment. In the case of cell phones, almost all employees are savvy enough to call their wireless provider for assistance. In terms of laptop support, hardware recommendation and subsidized helpdesk support can be offered. It is important that the BYOD policy clearly delineate the support responsibilities. When done well, IT staff get out of the “hardware” business and can focus on more strategic goals. Source 5: "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov. Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. .
  • Employees are burned with carrying multiple devices and using sub-optimal equipmentBYOD allows employees to rely on one set of devices they are comfortable withBYOD allows employees to utilize equipment that meets their individual needs (size, battery life, weight)BYOD prevents employees from having to transfer data between devicesSource 6: Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. .Source 7: Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass." IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. .
  • A BYOD model supports secure anytime, anywhere access to electronic resources.Source 8: Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. .
  • 2012 Gov Loop Study of 103 public sector employeesForward-thinking policies such as BYOD help attract and retain a forward-thinking workforceA BYOD model increases employee satisfactionThe implementation of a BYOD model suggests a cutting-edge mindset that is attractive to new talentSource 9: Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public Sector." Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013..
  • Source . JayanthaPrabhu, CTO, Essar GroupManufacturing Sector – Case Study of BYOD implementationEmployees will introduce new ways of leveraging technology Employees will introduce new technology faster than IT can test and standardize devicesIT staff are available to focus on strategic projects rather than operational tasksSource 8:Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. .
  • There will be increased pressure from employees to bring their own devicesThere will be increased pressure to support a variety of devicesEven if a BYOD program is optional rather than mandatory, the number of employees seeking it will continue to growSource 10:"BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. .
  • This informative infographic on the State of BYOD in 2013 by Magic Software shows how the move to BYOD environments is affecting devices, employees, and IT staffs in 2013. It provides many interesting statistics gathered from a variety of sources such as Gartner and Ovum to cover all the need-to-know facts about the state of BYOD and it’s expected growth.The BYOD model will become a standard infrastructure modelVDI interfaces will continue to advance in order to support the BYOD modelMDM technology will also advanceThe concept of a device having a manageable dual-persona, private versus business, will further the BYOD push. Source 11:Wainwright, Ashley. "IT Solutions Blog." How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. .Source 10: "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. .
  • Review each of these points.Adds to bottom line and competitive advantageLeading companies will embrace it now rather play “catch-up”

Considering a BYOD Infrastructure Considering a BYOD Infrastructure Presentation Transcript

  • Considering a BYODInfrastructurePresented By: Melissa AndrewsApril 10, 2013
  • ControversyPosition and Argument SummaryArgument DetailConclusionPresentation Agenda
  • Suggested ConsThreatens SecurityEscalates CostsProven ProsCreates ProductivityFosters InnovationShould We Implement a Bring YourOwn Device (BYOD) Infrastructure?
  • Tighten Security ControlsOptimize Technical CostsIncrease Employee ProductivityFoster Technical InnovationImplement Pioneering StrategyWe Should Implement a BYODInfrastructure
  • Although 55% of the federal employees who usesmartphones or tablets for work bring their own, just11% of them say their agency has an official BYODpolicy at all.Source: (1)Prevent Rogue DevicesTighten Security Controls
  • With hosted VDI, no data ever leaves the data center.Through the use of security policies, administrators of client-hosted VDI can have virtual machines expire after a specifiedtime, helping to prevent data leakage.Source (2)Source (3)Minimize Data LeakageTighten Security ControlsVirtual Desktop Environment
  • Virginia Bank VP of IT, Sharon Moynihan credits the cloudcomponent of the bank’s BYOD model for delivering the costsavings…. Virginia Commerce Bank stands to save roughly$1,500 per [BYOD] device.Source (4)Reduce Capital ExpendituresOptimize Technical Costs
  • The State of Delaware has begun “a two year transitionplan to migrate all users off of the existing infrastructureby June 30, 2013 and move them to either a personaldevice through a proposed reimbursement program”“By doing so, the state stands to save up to $2.5 milliondollars annually through the reimbursement program butalso would save $75K in lifecycle costs and $120K inongoing support. “Source (5)Reallocate Technical ResourcesOptimize Technical Costs
  • “One of the strong drivers of BYOD activity is that people wantto use a single device for both work and personal purposes”Source (6)In 2011 Mobile Workers carried on average 2.7 devices (spanningtablets, laptops, smartphones, netbooks, etc.). In 2012 thatjumped to 3.5 devices. For the Q1 2013 report that dropped to 3devices (2.95). This recent drop is directly attributed to BYOD.Source (7)Optimize Electronic DevicesIncrease Employee Productivity
  • “According to a 2010 IDC-Unisys report, consumer-powered IT isbeing touted as the principal driver behind the fourth wave ofcorporate productivity. The first wave was inspired by Henry Fordsinvention of the assembly line (between 1908 and 1915). TheJapanese collaborative model, Kaizen, was the second wave. Thethird was driven by the Chinese model of mass production, lowprices and global domination.”“Today, the fourth wave is driven by a network of constantlyconnected workers. A network connected by mobiles, laptops,smartphones and the like.”Source (8)Facilitate Unrestricted MobilityIncrease Employee Productivity
  • Elevate Workforce CompositionFoster Technical Innovation“It is especially true for Millennialsand teleworkers.”“Increased flexibility is attractive.”“It shows your office is forwardthinking, savvy, and efficient.”Source (9)
  • “In an organization where the average age of employees rangesbetween 28 to 30 years…. Prabhu realized that this squad of powerusers was far ahead of their peers when it came to adopting whiz-bang technology.“[BYOD] would allow the IT team to focus on strategic innovationinstead of fixing IT issues. Keeping the IT team enthused is animperative at a time when attrition is rampant and work pressure ismounting.”“[BYOD] would free my IT resources from managing non-strategicassets and help me focus on high business value initiatives.”Source (8)Leverage Technical AdvancesFoster Technical Innovation
  • “Groups like Gartner … claim that BYOD will rise to become amajor technology trend in 2013, largely based on the hugeamount of iPads streaming into employees’ hands. These tabletsin the workplace are expected to reach 250 million by 2016,according to findings by Forrester Research.”Source (10)Create Infrastructure VersatilityImplement Pioneering Strategy
  • S Source (11)Embrace the FutureImplement Pioneering StrategyVirtual DesktopInfrastructureMobile DeviceManagement SystemsDual-Persona DevicesSource (10)
  •  Prevent Rogue Devices Minimize Data Leakage Reduce Capital Expenditures Reallocate Technical Resources Optimize Electronic Devices Facilitate Unrestricted Mobility Elevate Workforce Composition Leverage Technical Advances Create Infrastructure Versatility Embrace the FutureA BYOD Infrastructure is a Must!
  • 1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013.<http://www.networkworld.com/news/2013/012213-federal-byod-266032.html?page=1>.2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013.<http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>.3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. <http://vdi.co.nz/category/vdi/>.4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013.<http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-savings/?fp=16&fpid=1>.5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov. Federal Chief Information Officers Council, n.d. Web.19 Feb. 2013. <https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf>.6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. <Source 6:http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>.7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass." IPass Q1 2013 Mobile Workforce Report BYOD and Costs ImpactProductivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. <http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>.8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-study/bring-it-essar>.9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public Sector." Api.ning.com. Api.ning.com, n.d. Web. 19Feb. 2013.<http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0pKqqZKcURsbISzQ__/BYODfinal_1.pdf>.10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013.<http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx>.11. Wainwright, Ashley. "IT Solutions Blog." How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013.<http://www.securedgenetworks.com/secure-edge-networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>.12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC, 10 Apr. 2013. Web. 16 Apr. 2013.<http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-support-it-infographic>.Bibliography