SlideShare a Scribd company logo
1 of 19
CLIENT LOGO HERE
The Debate Over BYOD
10.16.2012
INTRODUCTION
Eric Alfaro is the Chief Information Officer
of Modis, and Modis’s parent company,
Adecco Group North America.
Adecco Group is the world’s largest
recruitment and workforce solutions
provider. Eric’s team in North America
delivers technology enabled business
solutions and services to over 800 Adecco
locations and 8000 Adecco employees in
North America.
2
AGENDA
• Definition: BYOD
• BYOD – More Than a Trend, It’s a Shift
• Why implement a BYOD strategy?
• Best Practices in a Successful BYOD Program
• Downsides to BYOD and solutions
3
WHAT IS BYOD?
BYOD or Bring Your Own Device is becoming the norm among employees
and employers alike. It refers to the policy of allowing employees to
purchase and integrate their own devices into a corporate operating
environment. The most common devices are laptops, smartphones and
tablets.
While businesses benefit by having up-to-date and connected employees,
IT departments often find it difficult to balance changing technology
landscapes with requirements to manage and support a homogenous
environment.
BYOD also means dealing with new security concerns and a shift to
empowered employee computing.
4
HOW BIG IS BYOD?
• BYOD is a prominent component of the “Consumerization of IT” and
is rapidly changing the way IT delivers services and support.
• Client virtualization products (e.g. Citrix) are mainstream solutions for
securely deploying business applications to multiple end user devices,
and Internet standards (HTML5) mean multi-device support is closer.
• In a 2012 survey of 600 businesses, Cisco found that 95 percent
allowed their employees to BYOD in some form. An example of this
would be secure access to corporate email services from a BYOD,
which is the most common service provided.
• Of those companies, many also provided technical support for the
devices.
• 36% of respondents provided support across all devices and
platforms.
5
Source: 2012 Cisco IBSG Horizons Study
BYOD TOUCHES IT, HR, SOURCING, …
Empowered
Employees
6
Security of Business
Data
User Requirements
and Populations
IT Support
Capabilities
Cost Management
Continuous Mobile
Device Technology
Evolution
HR and Business
Policies
Employee IT
Procurement
HR
Sourcing
Sourcing
THE BENEFITS OF BYOD FOR COMPANIES
7
• BYOD enhances employee productivity. It allows for immediate access
to work when away from the office, during commutes, while traveling,
and during down-time. The costs of delivering a solution should be
measured against increase in employee productivity. Industry reports an
average $300 to $1,300, which would depend on your measurement.
• Employees are much more likely to protect and care for their own
devices. This equates to decreased expenditures due to damaged or
stolen devices and data loss.
• Device ownership costs such as initial set-up, maintenance, insurance,
and data plans are shifted to the employee rather than the employer.
• For Gens Y and Z, 50% are using these technologies at home (and
expecting them in the office).
BENEFITS OF BYOD FOR EMPLOYEES
• Efficiency: Carrying a single device is preferable to carrying
multiple devices.
• An employee’s device can be used for personal purposes so they’ll
be able to save settings and documents on a single phone, laptop,
or tablet.
• Employees can control which devices they want. This allows them
to choose the technology that best suits their needs while also
guaranteeing them the freedom to upgrade and purchase devices
on their own timeline.
IMPLEMENTING – BEST PRACTICES
1. Understand your customers and operating environment
2. Prioritize deployment of BYOD services
3. Make support processes simple and clear
4. Communicate!
9
TECHNOLOGY AND BYOD AT MODIS
• How similar is Modis to your business?
• Our workforce is technology driven and a large segment is comfortable
with minimal technology support – a good starting point for BYOD
services
10
43%
60%
67%
0% 20% 40% 60% 80%
I'm comfortable using technology
with little or no help
I like technology
Technology is important to me
UNDERSTAND YOUR CUSTOMERS AND
OPERATING ENVIRONMENT
• What populations of IT consumers exist in your business?
• Where do they work? How technology savvy are they?
• What applications do they use? What type of data do they
access?
• What does it cost to support them?
• What BYOD capabilities do your IT enterprise management tools
have?
• What corporate policies are relevant?
11
WHERE TO START – WHAT’S HOT WITH YOUR
CUSTOMERS?
• In the Modis environment, Tablets and Phones account for majority of
BYOD devices, which is where our current strategy is focused
• The complexity of desktop applications and security requirements has
made widespread laptop and desktop BYOD too costly
• Consider Tiered services, rather than “One Size Fits All”
• Products like Citrix and
Web delivery methods
are making application
portability more viable
on common computing
devices
12
91%
79%
12%
8%
1%
7%
9%
4%
3%
3%
2%
2%
84%
89%
96%
Desktop
Laptop/Notebook
Smartphone
Standard Mobile
Phone
Tablet
Company Device Ownership
Company Company &Personal Personal
MAKING BYOD WORK: WHAT APPLICATIONS DO
YOUR EMPLOYEES NEED?
• Not all applications work well across all BYOD devices
• Ensure the applications your employees need will meet performance and
ease of use expectations
• Consider starting with basics: Email, Calendar, Web
• Modis workforce relies heavily on
collaboration applications, most
of which run well on mobile,
tablet, and laptop devices
• Now is the time to start planning for
future applications can be used with BYOD
13
51%
53%
54%
59%
96%
99%
0% 20% 40% 60% 80% 100% 120%
Presentations
Web Meetings
Instant Messaging
Social Media
Calendar
Email
PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS
• Consider value vs. cost / effort / risk for different BYOD features
o Trap: Supporting BYOD like traditional internal IT systems
o Check: Most modern solutions include web access. Upgrading an old
application might get you BYOD access out of the box
• Engage your Legal, Risk Management, and Sourcing /
Procurement function(s) for guidance
• Think incrementally as you deploy features
• Test the most widely use device / technologies and VIPs
• Stick to mainstream BYOD-friendly applications if you can
• Expect challenges14
• Get right level of business and management sponsorship for
success
• Make BYOD program clear and align support methods with self-
service tenants
• Include BYOD survey items in your IT satisfaction surveys and IT
cost metrics
• Create employee Evangelist teams with access to news on
“what’s next” to drive demand
15
COMMUNICATE!
DOWNSIDE OF BYOD FOR COMPANIES
16
• Employee owned devices doesn’t translate to no cost for companies
Ensure you consider TCO – total cost of ownership
• Device types change almost daily
Identify essential version and interface requirements
• Sensitive and protected data can pose a security risk
Have this discussion with your Risk, Legal, or Data Protection resource prior to
BYOD implementation
• For IT leaders it’s difficult to explain the time, effort and expense issues
surrounding BYOD to business leaders
If you are already doing IT cost tracking, include BYOD from day one
DOWNSIDE OF BYOD FOR EMPLOYEES
17
• It can be costly to own and maintain a device
 Consider an exception policy for employees who are unable to get a
device, but need one
• It may be necessary to purchase a more expensive data plan to
accommodate the larger volume of communications
 Think through how you’ll break out person vs. company data use
• Employees may have difficulty “disconnecting” and having
downtime
 Work – Life balance is a key satisfaction point for most employees
• When accessing the company’s network an employee may be
unwittingly exposing personal information, passwords and browsing
history
 Acceptable use policy
• In some situations an employee may be forced to relinquish the
device so that it may be cleaned of company data
 Communicate and help VIPs
THE BOTTOM LINE ON BYOD
• Understand what problem(s) you’re solving
• Consider the total cost of BYOD, including a reimbursement policy
• Plan comprehensively; it’s hard to “put the genie back in the bottle”
• Be incremental in your approach to features and services to limit
deployment risk and help users adjust to support
• Communicate!
• Review or update your security incident response processes
18
QUESTIONS ?

More Related Content

What's hot

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 

What's hot (20)

Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of Things
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
AWS Manufacturing Day Philadelphia-Boston-April 2019
AWS Manufacturing Day Philadelphia-Boston-April 2019AWS Manufacturing Day Philadelphia-Boston-April 2019
AWS Manufacturing Day Philadelphia-Boston-April 2019
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Internet safety
Internet safetyInternet safety
Internet safety
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Information security
Information securityInformation security
Information security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Data Security
Data SecurityData Security
Data Security
 

Viewers also liked

IT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingIT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from Outsourcing
Modis
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Microsoft Technet France
 

Viewers also liked (20)

BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
IT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingIT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from Outsourcing
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
09 età di_pericle
09 età di_pericle09 età di_pericle
09 età di_pericle
 
Il pnsd a scuola
Il pnsd a scuolaIl pnsd a scuola
Il pnsd a scuola
 
Modis CEO Survey 2014
Modis CEO Survey 2014Modis CEO Survey 2014
Modis CEO Survey 2014
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Modis Survey: America's View of Tech
Modis Survey: America's View of TechModis Survey: America's View of Tech
Modis Survey: America's View of Tech
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
 
BYOD
BYOD BYOD
BYOD
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyr
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolastici
 
Modis IT Staffing And Talent Management
Modis IT Staffing And Talent ManagementModis IT Staffing And Talent Management
Modis IT Staffing And Talent Management
 

Similar to BYOD (Bring Your Own Device) Risks And Benefits

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 

Similar to BYOD (Bring Your Own Device) Risks And Benefits (20)

Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to IT
 
BYOD
BYODBYOD
BYOD
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Byod
ByodByod
Byod
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 

More from Modis

More from Modis (20)

Modis National Jobs Report June 2018
Modis National Jobs Report June 2018Modis National Jobs Report June 2018
Modis National Jobs Report June 2018
 
Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018
 
National Jobs Report - March 2018
National Jobs Report - March 2018National Jobs Report - March 2018
National Jobs Report - March 2018
 
Modis National Jobs Report February 2018
Modis National Jobs Report February 2018Modis National Jobs Report February 2018
Modis National Jobs Report February 2018
 
Modis National Jobs Report December 2017
Modis National Jobs Report  December 2017Modis National Jobs Report  December 2017
Modis National Jobs Report December 2017
 
National Jobs Report - November 2017
National Jobs Report - November 2017National Jobs Report - November 2017
National Jobs Report - November 2017
 
Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017
 
Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017
 
Modis National Jobs Report July 2017
Modis National Jobs Report July 2017Modis National Jobs Report July 2017
Modis National Jobs Report July 2017
 
National Jobs Report - June 2017
National Jobs Report - June 2017National Jobs Report - June 2017
National Jobs Report - June 2017
 
National Jobs Report - May 2017
National Jobs Report - May 2017National Jobs Report - May 2017
National Jobs Report - May 2017
 
National Jobs Report - April 2017
National Jobs Report - April 2017National Jobs Report - April 2017
National Jobs Report - April 2017
 
National Jobs Report - March 2017
National Jobs Report - March 2017National Jobs Report - March 2017
National Jobs Report - March 2017
 
National Jobs Report - February 2017
National Jobs Report - February 2017National Jobs Report - February 2017
National Jobs Report - February 2017
 
National Jobs Report - January 2017
National Jobs Report - January 2017National Jobs Report - January 2017
National Jobs Report - January 2017
 
BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016
 
National Jobs Report - December 2016
National Jobs Report - December 2016National Jobs Report - December 2016
National Jobs Report - December 2016
 
National Jobs Report - November 2016
National Jobs Report - November 2016National Jobs Report - November 2016
National Jobs Report - November 2016
 
Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016
 
National Jobs Report - October 2016
National Jobs Report - October 2016National Jobs Report - October 2016
National Jobs Report - October 2016
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

BYOD (Bring Your Own Device) Risks And Benefits

  • 1. CLIENT LOGO HERE The Debate Over BYOD 10.16.2012
  • 2. INTRODUCTION Eric Alfaro is the Chief Information Officer of Modis, and Modis’s parent company, Adecco Group North America. Adecco Group is the world’s largest recruitment and workforce solutions provider. Eric’s team in North America delivers technology enabled business solutions and services to over 800 Adecco locations and 8000 Adecco employees in North America. 2
  • 3. AGENDA • Definition: BYOD • BYOD – More Than a Trend, It’s a Shift • Why implement a BYOD strategy? • Best Practices in a Successful BYOD Program • Downsides to BYOD and solutions 3
  • 4. WHAT IS BYOD? BYOD or Bring Your Own Device is becoming the norm among employees and employers alike. It refers to the policy of allowing employees to purchase and integrate their own devices into a corporate operating environment. The most common devices are laptops, smartphones and tablets. While businesses benefit by having up-to-date and connected employees, IT departments often find it difficult to balance changing technology landscapes with requirements to manage and support a homogenous environment. BYOD also means dealing with new security concerns and a shift to empowered employee computing. 4
  • 5. HOW BIG IS BYOD? • BYOD is a prominent component of the “Consumerization of IT” and is rapidly changing the way IT delivers services and support. • Client virtualization products (e.g. Citrix) are mainstream solutions for securely deploying business applications to multiple end user devices, and Internet standards (HTML5) mean multi-device support is closer. • In a 2012 survey of 600 businesses, Cisco found that 95 percent allowed their employees to BYOD in some form. An example of this would be secure access to corporate email services from a BYOD, which is the most common service provided. • Of those companies, many also provided technical support for the devices. • 36% of respondents provided support across all devices and platforms. 5 Source: 2012 Cisco IBSG Horizons Study
  • 6. BYOD TOUCHES IT, HR, SOURCING, … Empowered Employees 6 Security of Business Data User Requirements and Populations IT Support Capabilities Cost Management Continuous Mobile Device Technology Evolution HR and Business Policies Employee IT Procurement HR Sourcing Sourcing
  • 7. THE BENEFITS OF BYOD FOR COMPANIES 7 • BYOD enhances employee productivity. It allows for immediate access to work when away from the office, during commutes, while traveling, and during down-time. The costs of delivering a solution should be measured against increase in employee productivity. Industry reports an average $300 to $1,300, which would depend on your measurement. • Employees are much more likely to protect and care for their own devices. This equates to decreased expenditures due to damaged or stolen devices and data loss. • Device ownership costs such as initial set-up, maintenance, insurance, and data plans are shifted to the employee rather than the employer. • For Gens Y and Z, 50% are using these technologies at home (and expecting them in the office).
  • 8. BENEFITS OF BYOD FOR EMPLOYEES • Efficiency: Carrying a single device is preferable to carrying multiple devices. • An employee’s device can be used for personal purposes so they’ll be able to save settings and documents on a single phone, laptop, or tablet. • Employees can control which devices they want. This allows them to choose the technology that best suits their needs while also guaranteeing them the freedom to upgrade and purchase devices on their own timeline.
  • 9. IMPLEMENTING – BEST PRACTICES 1. Understand your customers and operating environment 2. Prioritize deployment of BYOD services 3. Make support processes simple and clear 4. Communicate! 9
  • 10. TECHNOLOGY AND BYOD AT MODIS • How similar is Modis to your business? • Our workforce is technology driven and a large segment is comfortable with minimal technology support – a good starting point for BYOD services 10 43% 60% 67% 0% 20% 40% 60% 80% I'm comfortable using technology with little or no help I like technology Technology is important to me
  • 11. UNDERSTAND YOUR CUSTOMERS AND OPERATING ENVIRONMENT • What populations of IT consumers exist in your business? • Where do they work? How technology savvy are they? • What applications do they use? What type of data do they access? • What does it cost to support them? • What BYOD capabilities do your IT enterprise management tools have? • What corporate policies are relevant? 11
  • 12. WHERE TO START – WHAT’S HOT WITH YOUR CUSTOMERS? • In the Modis environment, Tablets and Phones account for majority of BYOD devices, which is where our current strategy is focused • The complexity of desktop applications and security requirements has made widespread laptop and desktop BYOD too costly • Consider Tiered services, rather than “One Size Fits All” • Products like Citrix and Web delivery methods are making application portability more viable on common computing devices 12 91% 79% 12% 8% 1% 7% 9% 4% 3% 3% 2% 2% 84% 89% 96% Desktop Laptop/Notebook Smartphone Standard Mobile Phone Tablet Company Device Ownership Company Company &Personal Personal
  • 13. MAKING BYOD WORK: WHAT APPLICATIONS DO YOUR EMPLOYEES NEED? • Not all applications work well across all BYOD devices • Ensure the applications your employees need will meet performance and ease of use expectations • Consider starting with basics: Email, Calendar, Web • Modis workforce relies heavily on collaboration applications, most of which run well on mobile, tablet, and laptop devices • Now is the time to start planning for future applications can be used with BYOD 13 51% 53% 54% 59% 96% 99% 0% 20% 40% 60% 80% 100% 120% Presentations Web Meetings Instant Messaging Social Media Calendar Email
  • 14. PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS • Consider value vs. cost / effort / risk for different BYOD features o Trap: Supporting BYOD like traditional internal IT systems o Check: Most modern solutions include web access. Upgrading an old application might get you BYOD access out of the box • Engage your Legal, Risk Management, and Sourcing / Procurement function(s) for guidance • Think incrementally as you deploy features • Test the most widely use device / technologies and VIPs • Stick to mainstream BYOD-friendly applications if you can • Expect challenges14
  • 15. • Get right level of business and management sponsorship for success • Make BYOD program clear and align support methods with self- service tenants • Include BYOD survey items in your IT satisfaction surveys and IT cost metrics • Create employee Evangelist teams with access to news on “what’s next” to drive demand 15 COMMUNICATE!
  • 16. DOWNSIDE OF BYOD FOR COMPANIES 16 • Employee owned devices doesn’t translate to no cost for companies Ensure you consider TCO – total cost of ownership • Device types change almost daily Identify essential version and interface requirements • Sensitive and protected data can pose a security risk Have this discussion with your Risk, Legal, or Data Protection resource prior to BYOD implementation • For IT leaders it’s difficult to explain the time, effort and expense issues surrounding BYOD to business leaders If you are already doing IT cost tracking, include BYOD from day one
  • 17. DOWNSIDE OF BYOD FOR EMPLOYEES 17 • It can be costly to own and maintain a device  Consider an exception policy for employees who are unable to get a device, but need one • It may be necessary to purchase a more expensive data plan to accommodate the larger volume of communications  Think through how you’ll break out person vs. company data use • Employees may have difficulty “disconnecting” and having downtime  Work – Life balance is a key satisfaction point for most employees • When accessing the company’s network an employee may be unwittingly exposing personal information, passwords and browsing history  Acceptable use policy • In some situations an employee may be forced to relinquish the device so that it may be cleaned of company data  Communicate and help VIPs
  • 18. THE BOTTOM LINE ON BYOD • Understand what problem(s) you’re solving • Consider the total cost of BYOD, including a reimbursement policy • Plan comprehensively; it’s hard to “put the genie back in the bottle” • Be incremental in your approach to features and services to limit deployment risk and help users adjust to support • Communicate! • Review or update your security incident response processes 18

Editor's Notes

  1. Contact info is only available for 1st level connections. This includes an email address and a phone number if it’s been entered in the “Contact Settings”ORFor members who have posted contact info in their profiles aka “open networkers”