Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Making BYOD Work for Your Organization

2,364
views

Published on

There is no escaping the "bring your own device" trend, but organizations need to chart a middle path to strike a balance between employee freedom and corporate control over technology.

There is no escaping the "bring your own device" trend, but organizations need to chart a middle path to strike a balance between employee freedom and corporate control over technology.

Published in: Business, Technology

1 Comment
4 Likes
Statistics
Notes
  • Adopting BYOD is a no brainer... yet platform choice that is- Choosing between solutions that are labelled as MDM vs. those labelled as Dual-persona and go/no go as regards to Integration with your VDI is the most critical aspect....

    Employee retention as a benefit may not be an exactly correct... as this is not the exact solution for giving flexibility in work location..

    Please write to me, at sambit.dash@sams-school.com to know which solution really will help in employee retention..
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
2,364
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
1
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Bring Your Own Device (BYOD) Making It Work for Your Organization Cognizant Research Center | June 2012©2012, Cognizant
  • 2. Executive Summary• BYOD Drivers• BYOD Benefits• Implementation Challenges• Overcoming BYOD Barriers• Creating A Holistic BYOD Strategy and Policy• Transitioning to BYOD• BYOD’s Future 2 | ©2012, Cognizant
  • 3. Primary BYOD DriversEmployees are increasingly using personal devices to access business applications. Devices Used to Access Business Applications 2010 2011 30.7% 40.7% Personal PC, Personal PC, smartphone smartphone, 59.3% tablet Business PC, 69.3% smartphone, Business PC, tablet smartphone Personally-owned Company-ownedBase for 2010: 2,820 responses from enterprises with Base for 2011: Over 3,000 Information workers and500 or more employees from 10 countries. business executives from nine countries.Source: IDC Information Worker Custom Survey, May 2011 and May 2010. 3 | ©2012, Cognizant
  • 4. Primary BYOD DriversFinancial services, insurance, healthcare and professional services are leading BYOD demand andadoption. BYOD Support By IndustrySource: Good Technology 4 | ©2012, Cognizant
  • 5. BYOD BenefitsEmployees and organizations benefit from BYODBase: 700 IT professionals in seven countries, including Australia, Percent of respondentsCanada, Germany, India, Netherlands, U.S. and UK.Source: Citrix Global BYO Index 5 | ©2012, Cognizant
  • 6. BYOD BenefitsEasy to attract, retain and support new talent Business Staff Will Expect To Be More Self-Sufficient And Empowered By 2020, 45% of your workforce will be Millennials.† 34% of Millennials say they have better 22% of your technology employees at home have used a than they Empowered, service have at tech-savvy Millennials delivered work.* employees in the 39% of over the Web workforce Millennials to help them get their job select their done.* own mobile phone - 66% of your regardless of employees what IT select their support.* own mobile phone. * * Source: Forrsights Workforce Employee Survey, Q3 2010, † Source: Bureau of Labor Statistics and Forrester ResearchSource: Forrester Research, Inc. 6 | ©2012, Cognizant
  • 7. Implementation ChallengesBYOD creates complexities that overwhelmsmany organizations:• Protecting Data• Ensuring Security• Providing Support• BYOD Costs• Compliance Requirements 7 | ©2012, Cognizant
  • 8. Overcoming BYOD BarriersHave a robust, scalable, platform- andOS-agnostic BYOD infrastructure to limit•Security breaches•Minimize organization support to andmanagement of employee-owned devices 8 | ©2012, Cognizant
  • 9. Overcoming BYOD Barriers• Manage the complexity of a BYOD environment through intelligent provisioning of infrastructure.• Use virtualization • Provide access to corporate data and enterprise applications from a centralized location. • Eliminate the IT and business costs of customizing apps and creating access mechanisms. 9 | ©2012, Cognizant
  • 10. Overcoming BYOD BarriersUse “containerization”• Separate corporate data into secure “container” structures on devices to have full control over them.• Monitor the corporate applications and data effectively and securely. 10 | ©2012, Cognizant
  • 11. Overcoming BYOD BarriersUse encryption• Provide a strong layer of security for devices, applications and data.• Make it difficult for anyone to view and obtain data from lost devices without the encryption key. 11 | ©2012, Cognizant
  • 12. Overcoming BYOD BarriersEmbrace a limited BYOD model• Evaluate the device requirements of employees based on their roles and limit device support.• Alleviate concerns over security, support issues and costs by allowing only secure and compliant personal devices for work. 12 | ©2012, Cognizant
  • 13. Creating A Holistic BYOD Strategy and PolicyBYOD Strategy Essentials• Understand employee roles and how they relate to the use of mobile devices at work.• Create broad categories of users based on the kind of work they do and IT infrastructure to support them.• Specify the kind of device configurations, preferred vendors and brands that support your business needs.• Provide the right mix of enablement and control to employees and the company over personal devices and their usage.• Balance enablement with control using mobile device management, mobile application management and mobile application development platform solutions.• Customize, develop and update applications to work with personal devices. 13 | ©2012, Cognizant
  • 14. Creating A Holistic BYOD Strategy and Policy Key Takeaway The BYOD strategy needs to be all-inclusive and balance the risks and rewards for employees and employers.14 | ©2012, Cognizant
  • 15. Creating A Holistic BYOD Strategy and Policy Understand Liability Employee vs. Company • Better control over devices Corporate Corporate • Reduced IT overhead can be applied (blocking of Liable, Liable, Complete marketplace applications, Capped • Reduced device Expenses etc.) Expense Paid procurement cost (Cap-Ex) • Better security • Better choice of device • Comparatively easier for Individual Individual enforcing policy and Liable, • Challenges in deploying Liable, compliance Complete corporate applications No/Capped Expenses Expense due to non- Paid • Need for application license standardization of OS management • Better control over expenditure • Reduced device running cost (direct Op-Ex cost) Corporate liable devices are recommended for environments with higher data security risks (e.g., financial services); individual liable devices are recommended for environments with lower data risks (e.g., education).Source: Cognizant 15 | ©2012, Cognizant
  • 16. Creating A Holistic BYOD Strategy and PolicyBalance risks and rewards for employees and employers•Transition to BYOD only after your organization assesses thenet benefits it expects to realize from the initiative.•Determine the liability your organization is willing to assume aswell as the tax and legal implications of allowing BYOD. 16 | ©2012, Cognizant
  • 17. Creating A Holistic BYOD Strategy and PolicyBalance risks and rewards for employees andemployers•Put in place a robust BYOD support model. Usea mix of sourcing, automation and strongtechnical customer support•Take a middle path between the two extremesof the complete freedom that employeesdesire and the full control that organizations seekover usage of personal devices for work. 17 | ©2012, Cognizant
  • 18. Creating A Holistic BYOD Strategy and PolicyDefine and understand factors such as:•Which devices and operating systems to support.•Security requirements based on employee role and designation.•The level of risk organizations are willing to tolerate.•Employee privacy concerns.•Understand the altering IT environment. 18 | ©2012, Cognizant
  • 19. Creating A Holistic BYOD Strategy and PolicyDefining BYOD Policies TraditionalPolicy Element IT Policy BYOD PolicyDevices, device Standardized. Complex and heterogeneous.configurations andoperating systemsMobile applications Full command and control over Limited control over corporateand data data and apps. partitions, data and apps.Device tracking and Full IT control over evaluating how Clarification of how devices aremonitoring devices are used, with no express tracked and monitored, as well as permission required from users. which portion of the devices and data will fall under the policy’s purview.Cost reimbursement No provision for reimbursement of Definition of who pays for what, company-owned device costs. based on an understanding between employees and employer.19 | ©2012, Cognizant
  • 20. Creating A Holistic BYOD Strategy and PolicyA comprehensive BYOD policy framework covers:Devices Users• Scalability of devices • Eligibility• Device criteria • Acceptable usage• Supported configurations • Compliance and governance and platforms • Ownership and liability• Device certification • Reimbursement considerations• Device support • Policy violations• Security20 | ©2012, Cognizant
  • 21. Transitioning to BYODProvide employees with what they seek but with controls:•Ensure employees have the right virtual workspace.•Ensure effective security for corporate information and easeof access.•Categorize employees into broad pools based on their workand IT requirements.•Stream the right set of user profile, data and applicationson-demand, at the right performance levels and on any device,securely.•Implement a BYOD pilot to establish the reference architecture. 21 | ©2012, Cognizant
  • 22. Transitioning to BYODDefining User Profiles and Their Needs Examples Typical Work Pattern IT Requirements Knowledge Scientists, designers, • Rich user experience, with • Data security and compliance Workers statisticians multiple computer applications • Flexibility to access multiple desktop computers and tools running locally • Application-specific security and regulatory compliance efforts Office Workers Admins, HR, finance • Routine workflows, with multiple • Data security and compliance computer applications and tools • PC integrity running locally • Application-specific security and regulatory compliance efforts Executive & Function heads, sales • Similar to knowledge/ office • Data security and compliance Mobile Workers reps workers • PC integrity • Offline computing • Application-specific security and regulatory • Anytime, anywhere access compliance efforts • Offline access to files and data Task Workers Call center reps, • Simplified and streamlined user • Data security and compliance retail agents, factory experience • PC integrity workers • No requirements to save data • Highly controlled environment locally • Low-cost hardware solution that maintains high user productivity Contract Workers External contractors, • Local and remote access • Data privacy and confidentiality third-party • Low-cost hardware solution that maintains collaborators high user productivitySource: Cognizant 22 | ©2012, Cognizant
  • 23. Transitioning to BYOD Embrace BYOD in a phased manner Investment New Setup Implementation Employee Onboarding ROI Analysis Process •Build enabling •Baseline current TCO infrastructure for solution •Define trigger •Identify one-time identified for onboarding investments •Finalize sourcing options •Define policies •Assess ongoing cost with •Define new support model •Create implementation new model checklist •Go/no-go •Create communication plansCreate a compliance audit framework to ensure successSource: Cognizant 23 | ©2012, Cognizant
  • 24. Transitioning to BYODEmbrace BYOD in a phased manner•Measure the ROI – A better yardstick is to analyze the long termreturns and the possible value-additions from investments madeto enable and support BYOD.•Include costs of setting up the required infrastructure to support theprogram and reimbursements for device purchases.•Examine and bolster the current infrastructure with the additionalcapabilities required to support BYOD programs.•A critical step – ensure that the employee onboarding process issmooth and simple. 24 | ©2012, Cognizant
  • 25. BYOD’s FutureAn opportunity with significant benefits, both tangible and intangible:• Approach BYOD in a holistic fashion.• The role of IT will transform from a support function to a strategic, business-enabling function.• Take a proactive approach to embracing and molding your strategy.25 | ©2012, Cognizant
  • 26. BYOD’s FutureImplemented with the right strategy, BYOD can:• Empower employees to improve their productivity through their choice of devices and collaboration styles.• Ensure security of corporate data while complying with corporate mandates on compliance, risk management and privacy.• Deliver cost savings with minimal IT support for employee-owned devices.• Simplify IT by running any app, anywhere, on any device.26 | ©2012, Cognizant
  • 27. Thank You Author and Analyst Aala Santhosh Reddy, Senior Research Analyst, Cognizant Research Center Subject Matter Experts Jeff Wallace, Assistant Vice President and Cognizant Mobility Practice Leader Tim Rose, Associate Director, Cognizant IT Infrastructure Services Product Management Anindo Sengupta, Associate Director, Cognizant IT Infrastructure Services For more information / downloading the report, please visit http://www.cognizant.com/InsightsWhitepapers/Making-BYOD-Work-for-Your-Organization.pdf©2012, Cognizant