Your SlideShare is downloading. ×
BYOD and Mobility: The Unique Opportunities and Challenges of Each
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

BYOD and Mobility: The Unique Opportunities and Challenges of Each

2,885
views

Published on

With the workforce push towards increased mobility and BYOD, there are a number of unique challenges each poses. Learn what they are and see how you can overcome these challenges with help from Dell. …

With the workforce push towards increased mobility and BYOD, there are a number of unique challenges each poses. Learn what they are and see how you can overcome these challenges with help from Dell. To learn more, visit us here at Dell Mobility: http://del.ly/DellMobility

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,885
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • End Users: Mobility is about empowerment for end users. They have evolving skill sets that IT should be taking advantage of for increased productivity.Business leaders: needs tools to go enable their group (productivity), using shadow IT – they’re getting productivity tools, but not in an approved, effective way. They want to meet branding/corporate standards, but they can’t wait for IT. And when IT is fast, it’s not up to par.IT: thinks it’s about wrestling the unknown – how do you handle new devices, OSs, form factors, and emerging technology? Secure your business to deal with the unknown. End users need to be able to have the freedom to go do their work.Any solution must comply with HR and legal policies
  • Businesses must be flexible, and that means your mobility business model may change over time. Whether your organization currently owns all the mobile devices, some of them, or none of them, you need solutions that work now as well as in the future, regardless of any shift in your mobile strategy.Currently there are four business models around BYOD.Corporate issued: The company owns and issues all the devices used for business purposes.Corporate owned, personally enabled (COPE): this model is mostly seen in Europe where you can’t wipe data off a device that’s not yours, so they created this hybrid model where the organization provides employees the devices/data they desire, but employees have to personally enable it.Choose your own: This model is an attempt by IT to minimize the chaos by saying you can bring your own device, as long as it’s one of from a list that we’ve approved.Bring your own: Employees bring their personal devices (laptops, tablets, smartphones) into the organization for access to data and apps.
  • Because you need to find the best way to enable mobility/BYOD for your organization, we recommend these best practices to help you define your strategy.
  • BYOD is a very complicated and broad topic. Because your business is unique, it’s important to truly understand what mobility/BYOD capabilities you need so that you can find a solution that best fits you, then to select a partner who offers everything you’ll need both now and in the future. Here are the critical mobility/BYODcapabilities that Dell addresses. (Most vendors fall into just one of these boxes.)Manage devices and workspaces – we help you enable, identify and track devices, from thin clients to smartphones, and centralize control (MobileIron fits here).Easily identify and track all mobile endpointsaccessing networkWorkstationsThin clientsNotebooksTabletsSmartphonesManage corporate and BYO devices—and the workspaces on them—from a central locationOptimize infrastructure – we help you manage complexity, increase efficiency, and plan for an increase in users or devices (Cisco fits here)Manage complexity and increase efficiencyAdjust bandwidth capacity and coverage for growthProvide secure remote accessAccommodate multiple user groupsFuture-proof your infrastructureDevelop & modernize apps – we help you create the apps you need, with mobile-optimized user interfaces, that enable and encourage your end users to be productiveIncrease usage of apps that enable employees to improve the way they work and be more productiveCreate apps with an optimized user interface for mobile platformsSupport mobile or desktop apps on a variety of mobile environments Secure data – we help you protect your data from the endpoint to data center, secure it in transit and at rest, and control it no matter what device end users bringDeploy secure remote access solutions to protect data access and data in transitEncrypt data on remote workspacesUse virtualization to keep data in the data centerWipe data from lost/stolen devicesInspect network trafficOnce you solve all these needs, you get to enjoy the productivity benefits.
  • Today, you’re using IT point solutions to meet your changing mobility/BYOD needs as they come up. So far, you’ve got PC and mobile device management handled, but you’re investigating or have recently deployed solutions to help you enable BYOD for mobile devices as well. You may even be dabbling in the idea of enabling employees to bring their own computers. But every time you purchase a new point solution, you’re also getting a new cost structure – support, infrastructure, learning, etc. It also keeps you from fully taking advantage of the opportunity—each of these device and PC support quadrants has common technology, but you’re buying solutions that aren’t integrated, which just adds to your complexity. The technology shift toward BYOD is going to continue; the only things that haven’t supported a complete transformation to BYOD are business phone service on personal smartphones/tablets and Windows image on personal laptops (our Keystone offers). Now, these solutions here. When you’re ready to make that all-BYOD shift, will you be prepared?
  • According to Novell, 88% of employees say they need remote access to work documents and66% of employees use free file-sharing platforms. (Source:  Novell Mobile Life Tour 2013) OK,..so what are these numbers really telling you? They’re telling you your employees will do what it takes to get their work done. Securing your IT infrastructure used to be pretty straightforward. Your employees were working on PC’s, and accessing yourservers behind asecure firewall. And as the world changed around you – you responded. As corporate issued laptops became the norm, you simply extended your security beyond your firewall by wrapping security around each machine. As corporate-issued mobile devices became the new norm, again,..you simply wrapped your security around those devices. And this was very practical, because after all,you own these machines and devices. Today, more and more employees own their own Android , IOS, or other personal device,…and giving them the freedom to work the way they want to work – on the device they want to work on – isn’t as easy as it used to be. In fact, you’re met with some pretty strong resistance. Your employees want to work on the device they’re most comfortable with, so they can be as productive as possible, and yet they also want privacy. They want a clear line drawn between their work life and personal life. And what happens when you try to impose security policies that limit your employees’ freedom to use the applications and devices they need to be successful?They go around your security measures. And that means your employees are inviting risk into your organization. Too often, executives view this as a “device problem”, when in reality, this is truly a “people problem”. And if you want to solve for this “people problem”, you need to address the root of employee pushback – productivity and privacy. What if you could eliminate employee resistance? Only with DELL will you leverage breakthrough containerization to draw clear, secure separation between business and personal device usage. And so what does this solution look and feel like to both you and your employees?  For your employees, it means they’ll simply download and use an “app” – something they’re accustomed to doing every day. And because this “app” works on their own personal device,..and is completely partitioned from their “personal workspace” on the device, your employees will be able to work most effectively in their native environment –using the applications they need to get their work done.  And for your IT team, you’ll put a highly secure container on every device that you can control and manage. That means you’ll give line of business leaders the freedom to drive greater productivity without exposing your business to risk.  When you remove employee privacy concerns, and make it easy for your employees to work on whatever device is most convenient, you’re able to finally solve for the “people problem”, and free your employees to be more productive without compromising your IT security.          
  • And while meeting the demands of your line of business executives by freeing your employees to work on their own personal devices is a huge win,..you and your team must manage some core tasks in a consistent manner across a complex landscape of PCs, devices, and operating systems.  According to Novell, 58% of mobile workers remain frustrated that corporate applications aren’t yet optimized for mobile deliver. Users are increasingly doing their work across a variety of devices and are demanding a more consistent experience from device to device. Today, across your corporate issued devices and BYO devices, you’ve got to be able to manage the assets,deploy and enforce policy (HR / finance / procurement, etc), deliver applications that improve productivity, and do it in a way that provides secure network access. And if you’re like most companies, you’re doing some of this (or perhaps even a lot of this) today around your corporate-issued devices,..yet it’s a real challenge to deliver all of this across an even wider spectrum of BYO devices and PC’s -- with any degree of consistency. What if you could replicate the core processes used for corporate-issued devices -- across all BYO devices and PC’s? With encryption and containerization from DELL, you’ll manage policy, applications, and assets with a consistently high degree of oversight and security across both corporate-owned and employee-owned devices. And that means your employees will be free to work on their device-of-choice, anytime, anywhere,..and you’ll have the control you need to manage all devices across your entire employee population – regardless of who owns them.And ultimately, that’s why companies are choosing DELL’s Enterprise Mobility Management solution. You must simplify your approach to mobility management through a best-in-breed, unified solution -- without sacrificing innovation, eliminate user resistance by delivering a solution that addresses end user productivity and privacy concerns and organizational security requirements, and replicate administrative and control functions across corporate issued and BYO devices and PC’s in a consistent manner. And no other company does this better than DELL.
  • Dell EMM is a mobile enablement solution built from industry-leading technology that securely manages endpoints and containers—for corporate or BYO devices. This integrated, end-to-end solution adapts to your organization’s unique challenges, enabling you to manage smartphones, tablets, cloud clients, laptops and desktops; secure enterprise data; manage complexity; and increase workforce productivity.Dell EMM integrates into your existing IT environment to help you manage complexity. This end-to-end solution eases the adoption of mobility/BYOD, maximizes end-user productivity, is quick to implement and deploy, helps to reduce cost and frees up IT resources so you can focus on being a true business partner for your organization. EMM benefitsProvide comprehensive, secure endpoint management Deploy and manage a secure enterprise workspace on all devicesProvide secure access to enterprise dataIncrease efficiency with integrated console managementOffload IT support and improve employee experience via user self-service Manage identity accessImprove employees’ productivity with exactly the business apps and services they needEasily adapt to new technologies such as machine-to-machine management (like Dell Cloud Connect)Future-proof your IT infrastructure
  • We understand the importance of simplifying complexity; we built a solution to provide the security you need—with encryption and policy management—while integrating all of these common functions: Endpoint systems management (ESM)Mobile device management (MDM)Mobile applications management (MAM)Mobile content management (MCM)Secure access to corporate resourcesUser self-service portalReal-time reporting and alertsEMM differentiatorsOur unified Dell EMM solution is different from those offered by other point solution vendors; with Dell as your strategic partner, you gain:Breadth and choice of management—you can manage everything from smartphones and containers to cloud clients and desktops—regardless of who owns the endpoint—and you can choose how you manage each endpoint, whether that’s by user identity or use case.Integration of our proven technologies—Dell has industry-leading IP in management and security, and we are integrating these elements into our solution. Dell EMM is not a “new” solution—it has proven strength. Industry-leading security –this is woven into everything we do, and you can control it all from your management console, including setting up configurations, policies, data loss protection (DLP), secure remote access, encryption and passwords.Professional services—we offer image engineering to help you create and manage the image deployed to your BYOPCs, Client Mobility and BYOD Consulting to help you analyze customer needs and define the roadmap for mobility technologies, EMM migration to help you migrate from your current management service to EMM and a Center of Excellence to help you become a mobility expert and be the best possible partner for your line-of-business owners and end users.
  • Dell EMM is sold as four distinct, annual subscription licenses for mobile management, systems management, a secure mobile workspace, and a secure Windows workspace. This solution also has a variety of upgrades to help increase productivity and support your transition.Image engineering: Helps you create and manage the image deployed to your BYOPCs. EMM Migration Consulting:  Dell mobility experts can help with strategy, requirements definition, EMM configuration and user migration.Mobile Center of Excellence: Dell providessubject matter expertise and guides your overall app strategy & development process. Custom Mobile App Dev:Increases productivity and customer engagement by providing custom applications developed with industry best practicesClient Mobility and BYOD Consulting: Provides modular mobility consulting services to analyze customer needs and help define the roadmap for mobility technologies.
  • Transcript

    • 1. BYOD and mobility: The unique opportunities and challenges of each Marcus Lane Marketing Manager, Dell Enterprise Mobility Manager Chris Garcia Portfolio Manager, BYOD 2013
    • 2. Different mobility needs for different people End users • Work anywhere, any way, any time • Connect & collaborate more effectively 2013 Business leaders • Enable greater team productivity • Deliver the right tools for the job IT leaders • Support new OS, form factors & technologies • Manage and secure any and all new devices
    • 3. Multiple mobile enablement models that need to adapt as your business grows Determining the business model for accessing enterprise content is a critical factor in your data and app access strategy Corporate-owned devices Corporate issued Corporate owned, personally enabled Personally-owned devices Choose your own (from enterprise-approved product list) Bring your own Most organizations have needs across these tiers 2013
    • 4. Dell’s point of view and best practices for mobility and BYOD 2013 Dell - Internal Use - Confidential
    • 5. 1 Identify the critical mobility/BYOD capabilities your organization needs Involve the key company stakeholders to plan for current and future possibilities Manage devices and workspaces Optimize infrastructure Develop and modernize apps End-to-end security from the device to the data center 2013
    • 6. 2 Deploy a solution that simplifies IT complexity end-to-end Each one-off solution increases complexity Choose one strategic partner who can provide unified support ? Disconnected back ends Too many vendors to choose from Vendor complexity IT decision maker Small vendors bought out 2013 $$ Disparate support teams One strategic partner
    • 7. 3 Increase adoption and compliance End users create risk when they resist IT security measures on their personal devices Provide productivity and collaboration tools your end users will want and need End users need productivity tools that work for them They want to use their personal devices Laptops They want privacy and data-wipe assurance Mobile devices IT 88% of users need remote access 2013 66% use free file sharing tools
    • 8. 4 Make security consistent Regardless of what you’re managing—endpoints or containers Provide security capabilities that work across everything you manage Secure remote access Encryption Identity access management Data loss protection Policy management Endpoints Desktop Laptops 2013 Remote wipe Compliance reporting Containers Mobile devices Laptops Tablets Mobile devices
    • 9. Introducing Dell Enterprise Mobility Management 2013
    • 10. Meet the new Dell Enterprise Mobility Management (EMM) solution “With Dell Mobile Workspace, Dell is innovatively providing full collaboration—including integrated messaging, documents, and real-time communication—to secure, containerized workspaces.” – Mike Loftus, VP Workspace Services, TD Bank • Complete, secure endpoint management • Secure enterprise workspace on all devices • Secure access to enterprise data • Integrated console management • User self-service Comprehensive mobile enablement Endpoint management Container management Smartphones Tablets Cloud clients M2M Smartphones Tablets Laptops Desktops Laptops • Identity management • Business apps and services you need • Flexibility for future-proofing 2013
    • 11. Unified solution with common functions for all your endpoints Endpoint management Container management Dell EMM functions Systems, device, app and content management Secure access to corporate resources User self-service Real-time reporting and alerts 2013 Dell EMM
    • 12. Dell EMM offer structure Simplified annual subscription licenses for each of the four components Secure mobile workspace Mobile management Services • Image engineering • Migration • Mobile Center of Excellence • Mobile app dev Management & security • Client Mobility and BYOD Consulting • Support (up to 24x7) Systems management 2013 Secure Windows workspace
    • 13. Next steps Meet with Dell mobility subject matter experts in the software area of the Solutions Showcase Gain hands on experience—see mobility product and solution demonstrations at the Solutions Showcase Schedule a post-event Whiteboard Session to address your specific requirements. Contact your account team for details. Visit a Dell Solution Center near you: Austin • New York City • Washington D.C. Chicago • Santa Clara • Mexico City • Sao Paolo Visit: www.Dell.com/mobility 2013
    • 14. Q&A 2013
    • 15. 2013