Bring Your Own Device:   don’t be afraidSteve Lalla, VP & GM, DellNeil Hand, VP, Product Development, Dell
It’s really about the evolving workforce                                            1. Policy of allowing employees to use...
The BYOD perfect stormExplosion of data, devices and anytime, anywhere connectivity 200 million                    50%    ...
BYOD raises questions across the businessLine-of-business owners  What are the security and liability risks to my business...
Don’t let it just happen.Create a BYOD programthat’s right for you.
Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce         1                     ...
Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce         1                     ...
Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforceDefine policiesand acceptable  ...
Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce         1                 Prot...
Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce         1                     ...
That was a look atwhat you should do.Let’s look at howyou can do it.
Four critical elements should be addressed     Manage            Secure data                     Optimize           Develo...
Idea exchange   How are you addressing BYOD?   What do you need to help enable BYOD?   Are you allowing access to company ...
Dell offers a broad set of solutions to enable BYOD  Allowing access to corporate email, apps and desktop on smartphones, ...
How Dell can enable BYOD: Phones                                                       Value: increases security and      ...
How Dell can enable BYOD: Tablets                                                       Value: increases IT efficiency and...
How Dell can enable BYOD: PCs                                                          Value: centralize control of data a...
Dell’s Member Purchase Program encouragesemployees to buy devices you prefer   Latitude 10               XPS 10           ...
Summary1   Embrace BYOD and don’t let it just happen2   Start with segmenting the end users and determine what    they can...
Engage with experts at the Solutions ExpoLet’s get   • Talk to our BYOD expertsstarted     • Experience our tablets and Ul...
Please help Dell meet your needsby filling out the Session Evaluation Surveys    On paper    Content                      ...
Bring Your Own Device: Don’t Be Afraid - Steve Lalla, VP & GM, Dell - Neil Hand, VP, Product Development, Dell
Upcoming SlideShare
Loading in …5
×

Bring Your Own Device: Don’t Be Afraid - Steve Lalla, VP & GM, Dell - Neil Hand, VP, Product Development, Dell

1,619 views
1,455 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,619
On SlideShare
0
From Embeds
0
Number of Embeds
44
Actions
Shares
0
Downloads
16
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • dfd
  • Turn this into a build.Dell is the only IT solutions providerthat enables you to implement a BYOD program in which you manage all devices in your environment, can protect data from the edge to the data center, can develop and deliver applications for improved end user productivity & optimize your infrastructure for a dynamic, seamless and user experience.Unlike the competition, Dell provides more solutionchoice for our customers. Dell believes that BYOD is about more than just the device. We provide networking and security solutions designed specifically for BYOD programs, management and desktop virtualization appliances to support multiple platforms and operating systems. Dell Services can develop custom applications for smartphones & tablets including Dell XPS notebooks, Ultrabooks and tablets with full S&P ecosystem. Through XPS, we offer a comprehensive platform and allow organizations to partner with Dell for everything. Apple can’t provide security from the data center to the device. We have encryption on the end point, we have network security and we can secure through virtualization. We can even virtualize so the data is never physically on the device. Unlike Apple, Dell XPS doesn’t require special or extensive network configuration, as it is enabled with Bitlocker Data Encryption with TPM (Trusted Platform Module) for secure credential storage and authentication. Companies who purchase XPS can take advantage of Dell configuration services: static imaging, BIOS settings, asset tagging & reporting. And we offer our award winning Dell ProSupport which includes accidental damage and extended battery coverage (up to three years). Dell PocketCloud lets people enroll their various devices (phones, tablets, home PCs) into a cloud application so they can view, organize and share the content from wherever the are. Dell SonicWALL VPN Clients offer a flexible easy-to-use, easy-to-manage Virtual Private Network (VPN) solution that provides distributed and mobile users with secure, reliable remote access to corporate assets via broadband, wireless and dial-up connections.And your applications developed on Windows 7 will run on Windows 8 (XPS 12 and XPS 13).Examples of Dellsolutions include the following:Manage DevicesKACE 1000, 2000, 3000:Systems Management deployed as an applianceCloud Client Manager: Systems Management deployed as SaaSSecure DataSonicWALL Mobile Connect: Secure access to intranet resource with secure SSL/VPN technologyDell Data Protection: Use DDP|E to manage encryption across all devicesSecureworks: Network threat protection monitoringDevelop/Modernize ApplicationsPocketcloud Remote Desktop & Explore: Remote access to data and apps on your other devicesWindows OS migration servicesAppDev ServicesOptimize Infrastructure SonicWALL Next-Gen Firewall & Secure Remote AccessSonicWALL WirelessPowerConnect WConsulting (Mobility, Networking, Infrastructure, and Management)Member Purchase ProgramAnd,Dell Services can help you think through and implement the device management approach that works best for your organization. Our mobility consulting and application services include Mobility Strategy Consulting and Application Management.
  • Each of these 3 steps should be built on a solid Foundation: the right solution depends on customer needs, their current infrastructure, risk tolerance, and overall business strategyBYOD is more than a trend, it is a reality heading into its next phase of adoption and end user integration. Today the conversation is moving from “is BYOD for me?” to “how do I implement BYOD, to leverage the power of consumerization in my business?”The answer to that question will be different for every company and depends on a number of associated factors. First, what needs are you trying to address? The solution for a company who is reactively looking to satisfy end-user demand for access to corporate email will look very different to the solution for an organization proactively looking to drive productivity by utilizing the latest devices to improve how they engage end-users and customers alike.Then what is your current infrastructure? Can it cope and scale with the increased network traffic or data storage needs coming from more devices and connected users?An organization’s tolerance to risk is a major consideration. Many face huge compliance and regulatory demands that will shape their decision on provision of access to corporate data.Ultimately every BYOD implementation should be based on the overall business and IT strategy.
  • Classify user types & then establish policies and procedures appropriate for each group.Access policy: are all employees eligible for mobile-access to company data and applications? Will you restrict access based on role, title, manager approval, geography, or other organizational considerations? Will you restrict access to particular company applications or data? If so, which apps and data?Payment policy: There are three common options on payment: no reimbursement; expensing of a portion of monthly usage costs; and one-time or on-going stipends. Companies may even offer different plans for different employee roles, with some getting full reimbursement, for instance, and others partial. Decide whether users are entitled to reimbursement? If so, for which services and under what conditions (e.g., voice usage, data usage, Wi-Fi hotspot usage, roaming usage; business vs. personal usage; manager approval, etc.)? Are any services not eligible for reimbursement (e.g., SMS/MMS, ringtone downloads, 411 calls, any service not explicitly identified as eligible for reimbursement) Are there any caps on reimbursement (e.g., in form of fixed monthly stipend, or maximum expense back limits, irrespective of charges incurred)? Usage policy: Policies will differ on what is allowed and forbidden on mobile devices. Common restrictions include rules against downloading company documents; limiting network or application access; using device features like cameras and USB ports; jailbreaking the device; and whitelisting and blacklisting of apps and websites. Will you require individually liable device users to conform to acceptable use guidelines on all internet usage, even if not enabled through corporate infrastructure and/or for personal reasons (e.g., as a condition of receiving stipend, reimbursement, or access to company apps or data)?Security policy: What is your policy and process for handling lost/stolen/de-commissioning devices? Will your company wipe the “whole device,” “corporate data and apps only,” both? Will you allow user to initiate wipe action(s) themselves (e.g., through self-service portal)? Will your company require limits on the use of cameras, browsers, Bluetooth, or other applications and services? What is your anti-malware policy, user defined or set corporate standard? Set expectations clearly. IT may have to radically change people’s current mind-set. Yes, security adds additional layers to wade through, but what havoc would a security breach cause?Support policy: Some companies decide that if employees own the device, they shoulder responsibility when it malfunctions. But time spent on support equals lost productivity. You may take away a half-hour IT call, but the company may lose several hundred dollars as a result. Decide if you will provide any end user support? If so, for what applications, services, or scenarios (e.g., lost / stolen device)?Acceptable devices: Not all devices will meet the security requirements of your organization. Set a clear policy in the in the interest of reducing support costs and applying security controls. At the very least consider tiering the policy by device type. For instance, BlackBerries can access enterprise applications; iPhones and iPads just email and the network; and Androids email only. Tell users why so they can make an informed decision about the device they choose.Policy violations: what should happen if a user violates policy? Write clear and concise policies for all employees who want to use their personal device. Have anyone participating in BYOD sign your terms of use. Those who choose not to follow your policies should not expect to use their devices.Only once policies are set, should you then determine the tools/technology you need to implement.
  • In the past security the typical approach to security has been focused on device and the network perimeter, which can be cumbersome and inefficient due to multiple layers required.A modern converged information security approach enables access to information outside the physical network to access mobile, social and cloud hosted applications by dissolving the perimeter.Dell recommends a 4 step approach to security:EMBED: security into devices and platforms with integrated securityPROTECT: your data from device to cloud through data encryption, Data & Server back-up and recovery, VPN, next gen firewall and application control, Identity & Access Management, Desktop virtualization, Patch Management, performance & availability managementDETECT: the ability to proactively see & stop risks before they impact your environment through threat intelligence, audit & assessmentsRESPOND: immediately to an information breach when every second counts
  • Empower workforce with access to data anytime, anywhereOnce you have set clear policies and are enabling your users to utilize approved devices in a secure and manageable way, the next step is to look at opportunities for further empowering your users. IT should look at making investments to make users more productive through anytime, anywhere access to applications and data. Any BYOD program should further any organization’s business and strategic objectives, and that’s going to mean more than access to email, contacts and calendar on a smartphone. How do you modernize business critical applications to run on modern user interfaces? Can you port your applications to run on the Web? Will your applications run in a virtual environment? These are all critical considerations for your program.Along with your application strategy, you need to consider access – both onsite and offsite. For employees and guests, you should consider wireless networks. If you’re providing email and applications to personal devices, you shouldn’t ask people to use personal data plans for work purposes. You should consider group policies and identity and access management for your onsite network to control who has access to certain resources; these policies, or course, should be incorporated as part of your broader security policies.When employees are offsite, they’ll need ways to securely access the corporate network, data and application. There are several options, ranging from VPNs to desktop virtualization solutions. There are also tools that allow users to remotely access their PCs from a smartphone or tablet.
  • Empower workforce with access to email/calendar/contacts anytime, anywhereOnce you have set clear policies and are enabling your users to utilize approved devices in a secure and manageable way, the next step is to look at opportunities for further empowering your users. We know that many of you are using EAS as a starting point for enabling your employees to access corporate email/calendar/contacts. However, you may already be facing some reporting and application management limitations from this solution. Mobile Management solutions can address those limitations by providing detailed endpoint reporting and enabling employee access to corporate apps from personal or corporate smartphones. With new reporting capabilities, you can find out how many and what types of devices are on your network, what kinds of applications are on those devices, and whether those application are on your white- or blacklists. You can also push new corporate apps to your employees, which enables you to increase their productivity outside of the office. Once you resolve your data access needs, you need to consider networkaccess – both onsite and offsite. For employees and guests, we recommend the use of guest networks. If you’re providing email and applications to personal devices, you shouldn’t ask people to use personal data plans for work purposes. You should consider group policies and identity and access management for your onsite network to control who has access to certain resources; these policies, or course, should be incorporated as part of your broader security policies.When employees are offsite, they’ll need ways to securely access the corporate network, data and application. There are several options, ranging from VPNs to desktop virtualization solutions. There are also tools that allow users to remotely access their PCs from a smartphone or tablet.84% of employees in Generation Y say they choose their own work devices without considering corporate policy. What’s more surprising, according to Forrester Research’s Matt Brown, fully two-thirds of Boomers responding to the company’s Forrsights survey say they, too, pick work devices with no regard for company policy. No respect for authority!Organizations are split on who takes responsibility for the security of BYOD devices: 37 percent indicated the corporation was responsible and 39 percent said the end users were responsibleBy 2017, 40 percent of enterprise contact information will have leaked into Facebook via employees' increased use of mobile device collaboration applications66% consider the responsibility for mobile device security to be personal as opposed to an IT function Solutions for the Evolving WorkforceDell is the leader in solutions for BYOD including MDM, security solutions, and a broad spectrum of commercial devices with consumer appeal
  • Empower workforce with access to data anytime, anywhereOnce you have set clear policies and are enabling your users to utilize approved devices in a secure and manageable way, the next step is to look at opportunities for further empowering your users. IT should look at making investments to make users more productive through anytime, anywhere access to applications and data. Any BYOD program should further any organization’s business and strategic objectives, and that’s going to mean more than access to email, contacts and calendar on a smartphone. How do you modernize business critical applications to run on modern user interfaces? Can you port your applications to run on the Web? Will your applications run in a virtual environment? These are all critical considerations for your program.Along with your application strategy, you need to consider access – both onsite and offsite. For employees and guests, you should consider wireless networks. If you’re providing email and applications to personal devices, you shouldn’t ask people to use personal data plans for work purposes. You should consider group policies and identity and access management for your onsite network to control who has access to certain resources; these policies, or course, should be incorporated as part of your broader security policies.When employees are offsite, they’ll need ways to securely access the corporate network, data and application. There are several options, ranging from VPNs to desktop virtualization solutions. There are also tools that allow users to remotely access their PCs from a smartphone or tablet.84% of employees in Generation Y say they choose their own work devices without considering corporate policy. What’s more surprising, according to Forrester Research’s Matt Brown, fully two-thirds of Boomers responding to the company’s Forrsights survey say they, too, pick work devices with no regard for company policy. No respect for authority!Organizations are split on who takes responsibility for the security of BYOD devices: 37 percent indicated the corporation was responsible and 39 percent said the end users were responsibleBy 2017, 40 percent of enterprise contact information will have leaked into Facebook via employees' increased use of mobile device collaboration applications66% consider the responsibility for mobile device security to be personal as opposed to an IT function Solutions for the Evolving WorkforceDell is the leader in solutions for BYOD including MDM, security solutions, and a broad spectrum of commercial devices with consumer appeal
  • Empower workforce with access to data anytime, anywhereOnce you have set clear policies and are enabling your users to utilize approved devices in a secure and manageable way, the next step is to look at opportunities for further empowering your users. IT should look at making investments to make users more productive through anytime, anywhere access to applications and data. Any BYOD program should further any organization’s business and strategic objectives, and that’s going to mean more than access to email, contacts and calendar on a smartphone. How do you modernize business critical applications to run on modern user interfaces? Can you port your applications to run on the Web? Will your applications run in a virtual environment? These are all critical considerations for your program.Along with your application strategy, you need to consider access – both onsite and offsite. For employees and guests, you should consider wireless networks. If you’re providing email and applications to personal devices, you shouldn’t ask people to use personal data plans for work purposes. You should consider group policies and identity and access management for your onsite network to control who has access to certain resources; these policies, or course, should be incorporated as part of your broader security policies.When employees are offsite, they’ll need ways to securely access the corporate network, data and application. There are several options, ranging from VPNs to desktop virtualization solutions. There are also tools that allow users to remotely access their PCs from a smartphone or tablet.84% of employees in Generation Y say they choose their own work devices without considering corporate policy. What’s more surprising, according to Forrester Research’s Matt Brown, fully two-thirds of Boomers responding to the company’s Forrsights survey say they, too, pick work devices with no regard for company policy. No respect for authority!Organizations are split on who takes responsibility for the security of BYOD devices: 37 percent indicated the corporation was responsible and 39 percent said the end users were responsibleBy 2017, 40 percent of enterprise contact information will have leaked into Facebook via employees' increased use of mobile device collaboration applications66% consider the responsibility for mobile device security to be personal as opposed to an IT function Solutions for the Evolving WorkforceDell is the leader in solutions for BYOD including MDM, security solutions, and a broad spectrum of commercial devices with consumer appeal
  • Latitude 10Enhanced security and manageability for enterprise-class control (with Windows Pro)Managed life cycles and transitions with global availability for predictability Integration into legacy applications and systems XPS 10All-day battery life and sleek portable design for on-the-go work and playMobile keyboard dock and bundled MS Office Home & Student 2013 RT Preview for enhanced productivity & collaboration Security/encryption and device drivers built in out-of-the-boxXPS 12Flip hinge design to transition from notebook to tablet usage12.5” full HD screen and Intel HD 4000 graphics Full size, backlit keyboard and the latest Intel® Ivy Bridge ULV processors
  • Bring Your Own Device: Don’t Be Afraid - Steve Lalla, VP & GM, Dell - Neil Hand, VP, Product Development, Dell

    1. 1. Bring Your Own Device: don’t be afraidSteve Lalla, VP & GM, DellNeil Hand, VP, Product Development, Dell
    2. 2. It’s really about the evolving workforce 1. Policy of allowing employees to use personally owned mobile devices in their place of work.bring·your-own-de-vice (BYOD) 2. Not to be confused with “consumerization,” [bring/yohr/ohn/ dih-vahys] which is the rapid movement of consumer noun devices and applications into business settings. Synonyms Confusion, disorder, upheaval, turmoil, messIt’s about more than just devices. That’s why Dell has dubbed it evolving workforce – it’s aboutworkers defining how, where and when they work. Confidential
    3. 3. The BYOD perfect stormExplosion of data, devices and anytime, anywhere connectivity 200 million 50% Nearly half employees bring their companies allowing number of millennials BYOD have experienced who will make up the own device to work workforce in eight years a security breach 182 billion 50% 1/3 mobile application of business mobile admit to breaking or downloads by 2015 devices to be personally would break policy to owned by 2015 use personal devices Confidential
    4. 4. BYOD raises questions across the businessLine-of-business owners What are the security and liability risks to my business? Will there really be cost reduction – or just cost reallocation?IT decision makers How do I ensure security on devices I don’t control? How do we provide our employees with access to the applications?End users Do I really get to choose my device? Who do I call for support if my device fails? Confidential
    5. 5. Don’t let it just happen.Create a BYOD programthat’s right for you.
    6. 6. Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce 1 2 3 Define Protect Empower Foundation
    7. 7. Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce 1 2 3 Define Protect Empower The right solution depends on customer needs, their current infrastructure, risk tolerance, and overall business strategy
    8. 8. Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforceDefine policiesand acceptable 2 3devices – it allstarts with the Protect Empowerend user Foundation
    9. 9. Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce 1 Protect data, secure and 3 manage the Define infrastructure Empower Foundation
    10. 10. Dell’s approach to Bring Your Own DeviceThree key elements to enable the evolving workforce 1 2 Empower workforce with access to data Define Protect anytime, anywhere Foundation
    11. 11. That was a look atwhat you should do.Let’s look at howyou can do it.
    12. 12. Four critical elements should be addressed Manage Secure data Optimize Develop & devices & users infrastructure modernize • Protect data applications • Control from end-point • Reduce facility personal mobile to data center cost • The apps they devices need on the • Secure data in • Decrease IT devices they • Manage transit and at management want personal PCs rest resources • Develop and • Control data no • Scale and deploy mobile matter what protect the apps device it is on network • Deploy virtual apps or desktops Confidential
    13. 13. Idea exchange How are you addressing BYOD? What do you need to help enable BYOD? Are you allowing access to company data? What are your end users asking for? Confidential
    14. 14. Dell offers a broad set of solutions to enable BYOD Allowing access to corporate email, apps and desktop on smartphones, tablets and PCs Member Purchase Programs Dell SonicWall Secure Remote Access & Next-Gen Firewalls Dell KACE Appliances Dell Data Protection & Encryption Dell Wyse Cloud Client Manager Quest One Identity ManagerDell Desktop Virtualization Solutions SonicWALL Next-Gen Firewalls PowerConnect W Wireless and ClearPass Dell App Development Services SonicWALL Clean Wireless Dell Wyse PocketCloud Dell Server and Storage Solutions Confidential
    15. 15. How Dell can enable BYOD: Phones Value: increases security and Scenario: access to corporate manageability through device email/calendar/contacts via Exchange management, data protection and ActiveSync on smartphones secure remote access Applications Manage devices Dell KACE Appliances and users Dell Wyse Cloud Client Manager Dell SonicWall Next-Gen Firewalls Optimize PowerConnect W Wireless and infrastructure ClearPass Desktop Email Confidential
    16. 16. How Dell can enable BYOD: Tablets Value: increases IT efficiency and Scenario: access to corporate data data security with streamlined device and applications on tablets and app management Applications Manage devices and Dell KACE Appliances users Dell Wyse Cloud Client Manager Develop and modernize Dell App Development Services applications Dell SonicWALL Secure Remote Secure data Access Email Desktop Confidential
    17. 17. How Dell can enable BYOD: PCs Value: centralize control of data and Scenario: access to corporate data, applications, through separation of apps and desktops on BYO-PCs the desktop from the device Applications SonicWALL Next-Gen Firewalls Optimize PowerConnect W Wireless and infrastructure ClearPass SonicWALL Clean Wireless Dell Server and Storage Solutions Dell Desktop Virtualization Solutions Application Dell App Development Services development Dell Wyse PocketCloud Email Desktop Confidential
    18. 18. Dell’s Member Purchase Program encouragesemployees to buy devices you prefer Latitude 10 XPS 10 XPS 12 Built-in productivity and collaboration capabilities Familiar IT integration and security across devices Broad range of business class services and accessories Confidential
    19. 19. Summary1 Embrace BYOD and don’t let it just happen2 Start with segmenting the end users and determine what they can do on each approved device3 Focus on the data and ensure it’s secured and managed4 Empower your end user with access to data and productivity apps, anywhere and anytime5 Consider Dell to help you navigate through the confusion and ensure BYOD works for you Confidential
    20. 20. Engage with experts at the Solutions ExpoLet’s get • Talk to our BYOD expertsstarted • Experience our tablets and Ultrabooks Envision a solution with a whiteboard session • Schedule a BYOD Whiteboard Consulting session • Schedule an Enterprise Mobility Consulting Workshop Gain hands on experience/demos in the Solution Center • Conduct a proof-of-concept • Request a seed unit from your Dell Account Executive Confidential
    21. 21. Please help Dell meet your needsby filling out the Session Evaluation Surveys On paper Content On the Dell World app style • Forms in room • Turn in on the way out guidelines 1. Select My Schedule Session Evaluation Survey 2. Select session to evaluate 3. Select Surveys 4. Select survey title Or 5. Simply complete the survey

    ×