SlideShare a Scribd company logo
1 of 3
Considering a BYOD Infrastructure
Melissa Andrews April 16, 2013
Introduction
Over the last few years the discussion points surrounding Bring Your Own Device infrastructure models
have revolved around cost, security and productivity. Many experts have written articles warning CIO’s
that the benefit of such an implementation did not warrant the cost or security concerns. BYOD was
touted as nothing but a trend that would soon fizzle. However, as reported on April 10, 2013 by
BizTechMagazine in its article “BYOD is Growing but Needs More Support from IT” 82 percent of
companies surveyed in 2013 allowed some or all workers to use their own devices on the job. At the
same time only 38 percent of CIO’s were prepared to support a BYOD model. (12) This information
proves that the implementation of a BYOD-ready infrastructure is no longer a luxury but a necessity for
companies seeking continued growth and advancement. Embracing this model is a necessity in terms of
cost, security, productivity, innovation and sustainability.
Security and Costs
The BYOD naysayers cite security and costs as the primary reasons BYOD models should not be
implemented. However, upon a closer look, a strategic BYOD model can actually significantly reduce
security threats and will likely reduce costs over time. A BYOD model that leverages Virtual Desktop
Technology (VDI) at its core ensures that no data will ever be stored on an end users device. (2)
Additionally, the utilization of a Mobile Device Management (MDM) system controls which devices can
have access to corporate networks. Given that workers are already bringing personal devices into the
corporate network whether a formal BYOD policy exists or not, unmediated security holes already exist.
(1) Therefore, the implementation of a solid BYOD infrastructure will close security gaps not create
them. In regards to costs, as discussed some of the major costs associated with BYOD such as VDI and
MDM systems are soon to be required infrastructure investments even without BYOD in place. Yet, by
supporting BYOD, companies stand to save in terms of both capital hardware expenditures and technical
support costs. According to the Sharon Moynihan, Vice President of Virginia Bank, the bank’s recent
implementation of a BYOD model positioned the bank to save roughly $1,500 per BYOD device. (4) By
placing the onus of device procurement, maintenance and support on the end user, with or without a
reimbursement or stipend program, companies can reallocate critical funds and resources to strategic
initiatives. Given these facts it is clear that a BYOD model does not present an unconquerable challenge
in terms of costs and security. In fact, implemented well, a BYOD model can alleviate these pressures.
Productivity and Innovation
Aside from the riddance of cost and security concerns, companies stand to gain far more from a BYOD
program in terms of productivity and innovation. According to the infographic presented in the
aforementioned Biz Tech Magazine article, Intel estimated that its workers recaptured 57 minutes per
work day due to its BYOD program. (12) Considering, the average work day is 8 hours that computes to
a 12.5% productivity gain. Some of that gain can be attributed to the fact that workers aren’t being
forced to juggle multiple devices and can now utilize those that are best suited for their skillsets and
particular equipment requirements. (7) Moreover, a BYOD infrastructure by its very nature facilities
unrestricted mobility. Workers are able to access network resources from anywhere, anytime allowing
them to work when needed or so inspired. According to a 2010 IDC-Unisys report, workforce
mobilization is slated to be the fourth wave of corporate productivity in terms of historical production
models. (8) Unrestricted mobility is an absolute requirement for competitive companies. Remaining
innovated is another. A BYOD model can support this key business initiative in two ways. One, a BYOD
program can be leveraged to attract and retain an innovative, forward-thinking workforce. According to
a survey cited in the paper "Exploring Bring Your Own Device in the Public Sector", the 56% of
respondents who believe this statement propose that this is especially true for teleworkers and
millenniums. (9) Additionally, according to JayanthaPrabhu, CIO of the Essar Group, it is these
millenniums that are bringing “whiz-bang technology” to the workplace. (8) Workers that are given the
capability to utilize non-standard equipment will consequently discover news ways to leverage those
technologies in meeting company goals. Likewise, workers will introduce new technologies into the
workplace far faster than an IT department can test, standardize and distribute them. Clearly, the
productivity and innovative gains of a BYOD program cannot be dismissed.
Conclusion
In summary, the implementation of a BYOD infrastructure will alleviate security concerns, reduce costs,
create productivity gains and foster innovation. Considering each of these factors, companies that
leverage a BYOD model now are essentially creating a versatile and sustainable infrastructure properly
positioned to support the continued growth and advancement of the company it services. In the article
titled “BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies” it is stated that
Gartner predicts that BYOD will rise to become a major technology trend in 2013. (10) Yet it is arguable
that BYOD is no longer a trend at all. Given the precedent that has been set by major companies such as
Intel and government agencies such as Department of Treasury, both of which support comprehensive
BYOD programs, BYOD is here to stay and will be considered standard practice. (5) Noted investments
and enhancements in BYOD supportive technologies such as VDI, MDM and dual-persona devices only
bolster this fact. Therefore, by implementing a solid yet strategic BYOD program companies will be
properly positioned to leverage future technical advances. Otherwise, as stated in the initially quoted
Biz Tech Magazine article, “if your business doesn’t want to be left up a creek without a paddle, it’s time
to start rowing in the right direction.” (12)
Bibliography
1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network
World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. <http://www.networkworld.com/news/2013/012213-federal-byod-
266032.html?page=1>.
2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013.
<http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>.
3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013.
<http://vdi.co.nz/category/vdi/>.
4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar.
2012. Web. 1 Apr. 2013. <http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-
savings/?fp=16&fpid=1>.
5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov.
Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. <https://cio.gov/wp-
content/uploads/downloads/2012/09/byod-toolkit.pdf>.
6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6
Nov. 2012. Web. 1 Apr. 2013. <Source 6:
http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>.
7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass."IPass Q1 2013
Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013.
<http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>.
8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-
study/bring-it-essar>.
9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public
Sector." Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013.
<http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0
pKqqZKcURsbISzQ__/BYODfinal_1.pdf>.
10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com.
Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. <http://www.ucstrategies.com/unified-communications-
newsroom/byod-here-to-stay-or-doomed.aspx>.
11. Wainwright, Ashley. "IT Solutions Blog."How BYOD Will Impact 2013 and the Years to Come: Infographic.
Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. <http://www.securedgenetworks.com/secure-edge-
networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>.
12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC,
10 Apr. 2013. Web. 16 Apr. 2013. <http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-
support-it-infographic>.

More Related Content

What's hot

Internet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyInternet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyCisco Services
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019Merry D'souza
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Datafield
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
BC Broker February 2021
BC Broker February 2021 BC Broker February 2021
BC Broker February 2021 Maria Novelia
 
200806 inn poised-forinnovation
200806 inn poised-forinnovation200806 inn poised-forinnovation
200806 inn poised-forinnovationSteven Callahan
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insuranceminorifh
 
An electric future is a resilient one
An electric future is a resilient oneAn electric future is a resilient one
An electric future is a resilient oneaccenture
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationAVI-SPL
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCarms8586
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineHector Hoyos
 
IoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneursIoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneursDr. Shivananda Koteshwar
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White PaperHector Hoyos
 

What's hot (19)

Internet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyInternet of Everything (IoE) Economy
Internet of Everything (IoE) Economy
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
Techtalk March 2018
Techtalk March 2018Techtalk March 2018
Techtalk March 2018
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928
 
Technology news
Technology newsTechnology news
Technology news
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
BC Broker February 2021
BC Broker February 2021 BC Broker February 2021
BC Broker February 2021
 
200806 inn poised-forinnovation
200806 inn poised-forinnovation200806 inn poised-forinnovation
200806 inn poised-forinnovation
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insurance
 
An electric future is a resilient one
An electric future is a resilient oneAn electric future is a resilient one
An electric future is a resilient one
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDC
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
 
IoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneursIoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneurs
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White Paper
 

Similar to Executive Summary: Considering a BYOD Infrastructure

Considering a BYOD Infrastructure
Considering a BYOD InfrastructureConsidering a BYOD Infrastructure
Considering a BYOD InfrastructureMelissa Andrews
 
Finding the value in byod capgemini consulting - digital transformation
Finding the value in byod   capgemini consulting - digital transformationFinding the value in byod   capgemini consulting - digital transformation
Finding the value in byod capgemini consulting - digital transformationRick Bouter
 
The Financial Impact of BYOD
The Financial Impact of BYODThe Financial Impact of BYOD
The Financial Impact of BYODCisco Services
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
Finding the value in BYOD
Finding the value in BYODFinding the value in BYOD
Finding the value in BYODCapgemini
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’John Davis
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 

Similar to Executive Summary: Considering a BYOD Infrastructure (20)

Considering a BYOD Infrastructure
Considering a BYOD InfrastructureConsidering a BYOD Infrastructure
Considering a BYOD Infrastructure
 
Finding the value in byod capgemini consulting - digital transformation
Finding the value in byod   capgemini consulting - digital transformationFinding the value in byod   capgemini consulting - digital transformation
Finding the value in byod capgemini consulting - digital transformation
 
The Financial Impact of BYOD
The Financial Impact of BYODThe Financial Impact of BYOD
The Financial Impact of BYOD
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Finding the value in BYOD
Finding the value in BYODFinding the value in BYOD
Finding the value in BYOD
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
BYOD
BYODBYOD
BYOD
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
IOT in Bangladesh
IOT in BangladeshIOT in Bangladesh
IOT in Bangladesh
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Executive Summary: Considering a BYOD Infrastructure

  • 1. Considering a BYOD Infrastructure Melissa Andrews April 16, 2013 Introduction Over the last few years the discussion points surrounding Bring Your Own Device infrastructure models have revolved around cost, security and productivity. Many experts have written articles warning CIO’s that the benefit of such an implementation did not warrant the cost or security concerns. BYOD was touted as nothing but a trend that would soon fizzle. However, as reported on April 10, 2013 by BizTechMagazine in its article “BYOD is Growing but Needs More Support from IT” 82 percent of companies surveyed in 2013 allowed some or all workers to use their own devices on the job. At the same time only 38 percent of CIO’s were prepared to support a BYOD model. (12) This information proves that the implementation of a BYOD-ready infrastructure is no longer a luxury but a necessity for companies seeking continued growth and advancement. Embracing this model is a necessity in terms of cost, security, productivity, innovation and sustainability. Security and Costs The BYOD naysayers cite security and costs as the primary reasons BYOD models should not be implemented. However, upon a closer look, a strategic BYOD model can actually significantly reduce security threats and will likely reduce costs over time. A BYOD model that leverages Virtual Desktop Technology (VDI) at its core ensures that no data will ever be stored on an end users device. (2) Additionally, the utilization of a Mobile Device Management (MDM) system controls which devices can have access to corporate networks. Given that workers are already bringing personal devices into the corporate network whether a formal BYOD policy exists or not, unmediated security holes already exist. (1) Therefore, the implementation of a solid BYOD infrastructure will close security gaps not create them. In regards to costs, as discussed some of the major costs associated with BYOD such as VDI and MDM systems are soon to be required infrastructure investments even without BYOD in place. Yet, by supporting BYOD, companies stand to save in terms of both capital hardware expenditures and technical support costs. According to the Sharon Moynihan, Vice President of Virginia Bank, the bank’s recent implementation of a BYOD model positioned the bank to save roughly $1,500 per BYOD device. (4) By placing the onus of device procurement, maintenance and support on the end user, with or without a reimbursement or stipend program, companies can reallocate critical funds and resources to strategic initiatives. Given these facts it is clear that a BYOD model does not present an unconquerable challenge in terms of costs and security. In fact, implemented well, a BYOD model can alleviate these pressures. Productivity and Innovation
  • 2. Aside from the riddance of cost and security concerns, companies stand to gain far more from a BYOD program in terms of productivity and innovation. According to the infographic presented in the aforementioned Biz Tech Magazine article, Intel estimated that its workers recaptured 57 minutes per work day due to its BYOD program. (12) Considering, the average work day is 8 hours that computes to a 12.5% productivity gain. Some of that gain can be attributed to the fact that workers aren’t being forced to juggle multiple devices and can now utilize those that are best suited for their skillsets and particular equipment requirements. (7) Moreover, a BYOD infrastructure by its very nature facilities unrestricted mobility. Workers are able to access network resources from anywhere, anytime allowing them to work when needed or so inspired. According to a 2010 IDC-Unisys report, workforce mobilization is slated to be the fourth wave of corporate productivity in terms of historical production models. (8) Unrestricted mobility is an absolute requirement for competitive companies. Remaining innovated is another. A BYOD model can support this key business initiative in two ways. One, a BYOD program can be leveraged to attract and retain an innovative, forward-thinking workforce. According to a survey cited in the paper "Exploring Bring Your Own Device in the Public Sector", the 56% of respondents who believe this statement propose that this is especially true for teleworkers and millenniums. (9) Additionally, according to JayanthaPrabhu, CIO of the Essar Group, it is these millenniums that are bringing “whiz-bang technology” to the workplace. (8) Workers that are given the capability to utilize non-standard equipment will consequently discover news ways to leverage those technologies in meeting company goals. Likewise, workers will introduce new technologies into the workplace far faster than an IT department can test, standardize and distribute them. Clearly, the productivity and innovative gains of a BYOD program cannot be dismissed. Conclusion In summary, the implementation of a BYOD infrastructure will alleviate security concerns, reduce costs, create productivity gains and foster innovation. Considering each of these factors, companies that leverage a BYOD model now are essentially creating a versatile and sustainable infrastructure properly positioned to support the continued growth and advancement of the company it services. In the article titled “BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies” it is stated that Gartner predicts that BYOD will rise to become a major technology trend in 2013. (10) Yet it is arguable that BYOD is no longer a trend at all. Given the precedent that has been set by major companies such as Intel and government agencies such as Department of Treasury, both of which support comprehensive BYOD programs, BYOD is here to stay and will be considered standard practice. (5) Noted investments and enhancements in BYOD supportive technologies such as VDI, MDM and dual-persona devices only bolster this fact. Therefore, by implementing a solid yet strategic BYOD program companies will be properly positioned to leverage future technical advances. Otherwise, as stated in the initially quoted Biz Tech Magazine article, “if your business doesn’t want to be left up a creek without a paddle, it’s time to start rowing in the right direction.” (12)
  • 3. Bibliography 1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. <http://www.networkworld.com/news/2013/012213-federal-byod- 266032.html?page=1>. 2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013. <http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>. 3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. <http://vdi.co.nz/category/vdi/>. 4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013. <http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost- savings/?fp=16&fpid=1>. 5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov. Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. <https://cio.gov/wp- content/uploads/downloads/2012/09/byod-toolkit.pdf>. 6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. <Source 6: http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>. 7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass."IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. <http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>. 8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case- study/bring-it-essar>. 9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public Sector." Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013. <http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0 pKqqZKcURsbISzQ__/BYODfinal_1.pdf>. 10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. <http://www.ucstrategies.com/unified-communications- newsroom/byod-here-to-stay-or-doomed.aspx>. 11. Wainwright, Ashley. "IT Solutions Blog."How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. <http://www.securedgenetworks.com/secure-edge- networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>. 12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC, 10 Apr. 2013. Web. 16 Apr. 2013. <http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more- support-it-infographic>.