SlideShare a Scribd company logo
1 of 12
Bring Your Own Device – Ifs, Buts and Mobiles
Richard Allgate – Mobile Services Specialist | 25 September 2013
• Introduction to InTechnology
• What is BYOD?
• The business drivers
• The employee drivers
• Is your business considering BYOD?
• So, you’re serious about implementing BYOD
• Implementing a BYOD policy?
• Mobile Device Management
• Summary
Webcast Overview
• Serving the UK IT market for nearly 30 years
• Unique position in the managed IT services market
• Full range of managed IT services delivered to over 800 UK businesses
Introduction to InTechnology
• Employees permitted to access corporate information using
personal devices
• Covers all mobiles devices – mobiles, tablets, smart phones
• Approximately 44% of employees use their own technology at work.
This figure is estimated to be higher in some countries
• More employers are turning to BYOD as they look to reduce costs at
the same time as increasing productivity
• Allows employees to use device of their choice
What is BYOD?
• Reducing cost while increasing productivity
• Improving business continuity
• Encouraging flexible working
• Keeping staff happy
• The desire to ‘consumerise IT’
Business Drivers
• No need for two devices
• No training needed
• Get to choose their own device, rather than being told to use a
specific ‘company device’
Employee Drivers
• Does your business have a mobile policy ?
• What are the financial implications of uninsured handsets ?
• How will you manage ‘personal contracts’ ?
• What support plan do you have in place for staff ?
• How will you keep up to date with the ever-changing array of
devices?
Is Your Business Considering BYOD?
• How safe is your data?
• What happens to client data when an employee leaves the company?
• What happens if a personal device is lost or stolen?
• Are you prepared for the endless OS/Software upgrades?
• How much do you know about the devices being used?
• How would you handle a data breach?
So, You’re Serious About BYOD?
• Limit the number and type of devices allowed
• Plan out your device security policy
- Screen locking
- Regular password changes
• Include employee exit plan as part of the BYOD policy
• Restrict which company applications are made available
• Plan your Mobile Device Management (MDM)…
Implementing Your BYOD Policy?
• Manage which devices see which applications
• Easier management of updates to devices
• Enabling mass-updates/installation of new applications
• Added protection for company data and applications should device
be lost/stolen or an employee leaves the company
– Locking devices to prevent access to data/applications
– Wiping devices to prevent unauthorised use of data
Mobile Device Management (MDM)
• If you are looking at a BYOD strategy, then ensure it is for the right
reasons
• When you deploy BYOD consider changing or updating your mobile
policy
• Try to keep it simple, and have measures in place to help prevent it
becoming too resource hungry
• Consider what data will be on the devices, and what if it was in the
wrong hands
• ABSOLUTELY deploy a MDM solution in tandem with BYOD
• Research the pros and cons of each MDM solution – try not to be
driven by price (as a breach could be much more expensive!)
Summary
Any Questions?
Thank You For Your Time
Email: contact@intechnology.com
Telephone: 0800 983 2522
Website: www.intechnology.com
Twitter: twitter.com/intechnology
Case Studies: www.intechnology.com/case-studies

More Related Content

What's hot

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 

What's hot (20)

Byod
ByodByod
Byod
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Wp byod
Wp byodWp byod
Wp byod
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 

Viewers also liked

Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology ProposalDana L. Miller
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingFAIZAL T H
 
Impacts on environment due to methane extraction in
Impacts on environment due to methane extraction inImpacts on environment due to methane extraction in
Impacts on environment due to methane extraction inPravinkumar Muthusamy
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementYole Developpement
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentationraj7
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Yole Developpement
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement Yole Developpement
 
Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016Luminary Labs
 

Viewers also liked (18)

Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology Proposal
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
 
Clothing for Biosensing
Clothing for BiosensingClothing for Biosensing
Clothing for Biosensing
 
Impacts on environment due to methane extraction in
Impacts on environment due to methane extraction inImpacts on environment due to methane extraction in
Impacts on environment due to methane extraction in
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
 
Human cloning
Human cloningHuman cloning
Human cloning
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
 
Biosensors
BiosensorsBiosensors
Biosensors
 
Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016
 

Similar to Bring Your Own Device

Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseRES
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...Michael Antinozzi
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Christopher Hunt
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front linesInductive Automation
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowKirill Bensonoff
 
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...Vijay Pullannagari
 

Similar to Bring Your Own Device (20)

BYOD
BYODBYOD
BYOD
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front lines
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To Know
 
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
IoT Technology: Why to Choose Internet of Things Services-Latest Technology u...
 

More from InTechnology Managed Services (part of Redcentric)

More from InTechnology Managed Services (part of Redcentric) (20)

Harrogate Data Centre Brochure
Harrogate Data Centre BrochureHarrogate Data Centre Brochure
Harrogate Data Centre Brochure
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 
PaySecure Connect: Introduction to PCI-certified payment routing infrastructure
PaySecure Connect: Introduction to PCI-certified payment routing infrastructurePaySecure Connect: Introduction to PCI-certified payment routing infrastructure
PaySecure Connect: Introduction to PCI-certified payment routing infrastructure
 
Telehealth: InTechnology’s new patient monitoring services for the NHS
Telehealth: InTechnology’s new patient monitoring services for the NHSTelehealth: InTechnology’s new patient monitoring services for the NHS
Telehealth: InTechnology’s new patient monitoring services for the NHS
 
Let the Cloud weather the storm
Let the Cloud weather the stormLet the Cloud weather the storm
Let the Cloud weather the storm
 
An overview of Hybrid Hosting
An overview of Hybrid HostingAn overview of Hybrid Hosting
An overview of Hybrid Hosting
 
Key areas to consider when evaluating a Data Centre
Key areas to consider when evaluating a Data CentreKey areas to consider when evaluating a Data Centre
Key areas to consider when evaluating a Data Centre
 
Delivering services over the N3 Network
Delivering services over the N3 NetworkDelivering services over the N3 Network
Delivering services over the N3 Network
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
10 key questions to ask your managed network provider
10 key questions to ask your managed network provider10 key questions to ask your managed network provider
10 key questions to ask your managed network provider
 
Cloud Circle Forum (Cloud State Of Play)
Cloud Circle Forum (Cloud State Of Play) Cloud Circle Forum (Cloud State Of Play)
Cloud Circle Forum (Cloud State Of Play)
 
Cloud Circle Forum - Changing Landscape - 19 May 2011
Cloud Circle Forum - Changing Landscape - 19 May 2011Cloud Circle Forum - Changing Landscape - 19 May 2011
Cloud Circle Forum - Changing Landscape - 19 May 2011
 
InTechnology - Polycom VoIP Phone Handsets
InTechnology - Polycom VoIP Phone HandsetsInTechnology - Polycom VoIP Phone Handsets
InTechnology - Polycom VoIP Phone Handsets
 
InTechnology Reading Data Centre
InTechnology Reading Data CentreInTechnology Reading Data Centre
InTechnology Reading Data Centre
 
Managed Network Services
Managed Network ServicesManaged Network Services
Managed Network Services
 
Managed Data Services
Managed Data ServicesManaged Data Services
Managed Data Services
 
InTechnology Overview
InTechnology OverviewInTechnology Overview
InTechnology Overview
 
Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS)Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS)
 
Hosted IP Telephony Services
Hosted IP Telephony ServicesHosted IP Telephony Services
Hosted IP Telephony Services
 
Data Centre Hosting Services
Data Centre Hosting ServicesData Centre Hosting Services
Data Centre Hosting Services
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Bring Your Own Device

  • 1. Bring Your Own Device – Ifs, Buts and Mobiles Richard Allgate – Mobile Services Specialist | 25 September 2013
  • 2. • Introduction to InTechnology • What is BYOD? • The business drivers • The employee drivers • Is your business considering BYOD? • So, you’re serious about implementing BYOD • Implementing a BYOD policy? • Mobile Device Management • Summary Webcast Overview
  • 3. • Serving the UK IT market for nearly 30 years • Unique position in the managed IT services market • Full range of managed IT services delivered to over 800 UK businesses Introduction to InTechnology
  • 4. • Employees permitted to access corporate information using personal devices • Covers all mobiles devices – mobiles, tablets, smart phones • Approximately 44% of employees use their own technology at work. This figure is estimated to be higher in some countries • More employers are turning to BYOD as they look to reduce costs at the same time as increasing productivity • Allows employees to use device of their choice What is BYOD?
  • 5. • Reducing cost while increasing productivity • Improving business continuity • Encouraging flexible working • Keeping staff happy • The desire to ‘consumerise IT’ Business Drivers
  • 6. • No need for two devices • No training needed • Get to choose their own device, rather than being told to use a specific ‘company device’ Employee Drivers
  • 7. • Does your business have a mobile policy ? • What are the financial implications of uninsured handsets ? • How will you manage ‘personal contracts’ ? • What support plan do you have in place for staff ? • How will you keep up to date with the ever-changing array of devices? Is Your Business Considering BYOD?
  • 8. • How safe is your data? • What happens to client data when an employee leaves the company? • What happens if a personal device is lost or stolen? • Are you prepared for the endless OS/Software upgrades? • How much do you know about the devices being used? • How would you handle a data breach? So, You’re Serious About BYOD?
  • 9. • Limit the number and type of devices allowed • Plan out your device security policy - Screen locking - Regular password changes • Include employee exit plan as part of the BYOD policy • Restrict which company applications are made available • Plan your Mobile Device Management (MDM)… Implementing Your BYOD Policy?
  • 10. • Manage which devices see which applications • Easier management of updates to devices • Enabling mass-updates/installation of new applications • Added protection for company data and applications should device be lost/stolen or an employee leaves the company – Locking devices to prevent access to data/applications – Wiping devices to prevent unauthorised use of data Mobile Device Management (MDM)
  • 11. • If you are looking at a BYOD strategy, then ensure it is for the right reasons • When you deploy BYOD consider changing or updating your mobile policy • Try to keep it simple, and have measures in place to help prevent it becoming too resource hungry • Consider what data will be on the devices, and what if it was in the wrong hands • ABSOLUTELY deploy a MDM solution in tandem with BYOD • Research the pros and cons of each MDM solution – try not to be driven by price (as a breach could be much more expensive!) Summary
  • 12. Any Questions? Thank You For Your Time Email: contact@intechnology.com Telephone: 0800 983 2522 Website: www.intechnology.com Twitter: twitter.com/intechnology Case Studies: www.intechnology.com/case-studies