Consider byoc as part of desktop as service strategy


Published on

A BYOC program enables the use of employee-owned smartphones, tablets, and laptops for business use. The growing popularity and use of personal devices, such as the iPad, is challenging IT to develop a position on their use in the workplace.

This storyboard explores:

•The objectives for a successful BYOC deployment: reducing cost and complexity of desktop management; improving agility and accessibility; and ensuring that security is not sacrificed in achieving those goals.
•Building out the four pillars of capability to prepare your environment for BYOC: infrastructure, security, operations & support, and policy development.
•Refocusing efforts in the last mile by developing a clear communications strategy to manage expectations and prepare for change.
Success in BYOC can be achieved. Rather than just saying no, focus on how to drive positive, secure change in the desktop environment.

Published in: Technology, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Consider byoc as part of desktop as service strategy

  1. 1. Consider BYOC as Part of a Desktop-as-a-Service Strategy
  2. 2. Introduction Info-Tech Research Group Info-Tech finds that Bring Your Own Computer (BYOC) policies and programs should only be considered by organizations that have developed specific capabilities in infrastructure, support, security architecture and end-user policies that support a strategic shift from desktop asset management to service management. For those who have made progress on this path, BYOC offers the potential to improve service and reduce cost. For others, understanding the BYOC end state allows necessary capability enhancements to be prioritized based on the incremental benefits each delivers. This research is designed for: This research will help you: <ul><li>IT managers in mid or large-sized organizations that have virtualized desktops and/or applications or that are actively exploring alternatives to traditional PC desktop management. </li></ul><ul><li>Organizations with a mandate to reduce asset management costs. </li></ul><ul><li>Organizations at the end of a PC lifecycle refresh. </li></ul><ul><li>Organizations that support mobile/global workforces as well as limited term or contract workers. </li></ul><ul><ul><li>Understand the components of a desktop-as-a-service strategy, including key planning principles, goals, and expected benefits of such a strategy. </li></ul></ul><ul><ul><li>Perform a capability assessment to benchmark your organization’s readiness to support delivery of desktops-as-a-service to various endpoints, including employee-owned devices. </li></ul></ul><ul><ul><li>Create a plan that covers key considerations, pitfalls, and actions for developing a BYO program for appropriate user groups. </li></ul></ul>The growing popularity and use of personal devices, from smartphones and iPods through tablets to laptops, is challenging IT to take a position on allowing – and even encouraging – the use of such devices in the workplace.
  3. 3. Executive Summary <ul><li>A BYOC program, enabling the use of employee-owned smartphones, tablets, and laptops, offers alternatives to traditional desktop delivery models, shifting the roles of both the end user and IT. </li></ul><ul><li>Interest is there, but BYOC is a polarizing issue. There are real benefits: lower cost for the business, more productivity for end users, and less break/fix for IT; there are also legitimate concerns: effective communication of new support agreements and ensuring the security of business information assets. </li></ul><ul><li>Those interested in moving forward must focus and build upon the four pillars of BYOC capability: infrastructure, security, support & operations, and policy. Together, these provide the basis for the desktop-as-a-service model that enables BYO initiatives. </li></ul><ul><li>Design your BYOC strategy around the goals of lowering cost and complexity of desktop management, increasing agility and flexibility of service delivery, and ensuring the security of the new program. These goals can pay dividends, even if full BYO isn’t being pursued. </li></ul><ul><li>Going full BYOC requires close attention to policy and communication. </li></ul>Info-Tech Research Group
  4. 4. Strategize Execute Understand <ul><li>This section will: </li></ul><ul><li>Outline benefits to end users, IT, and the business. </li></ul><ul><li>Explore the serious concerns expressed by IT about BYO programs and learn from where the interest is originating. </li></ul><ul><li>Define the three objectives of a desktop-as-a-service strategy. </li></ul><ul><ul><li>Understand where BYOC originated and why </li></ul></ul><ul><ul><li>you need to pay attention now </li></ul></ul><ul><ul><li>Managing BYOC Roadmap </li></ul></ul>1
  5. 5. BYOC is seen by many to be complex, expensive, and dangerous – especially for software support & security of business assets <ul><li>In traditional distributed processing, employee applications and data are installed on company owned and managed devices such as PCs. Management of these assets enables the organization to support the efficient use of the applications and protect the data from loss, damage, or theft. If employees are using their own devices, legitimate questions include: </li></ul><ul><li>How can IT protect the corporate data from corruption, misuse, or theft if there is no control over the device it is stored on? </li></ul><ul><li>How can efficient use of company-owned applications be supported if the application is on a device with non-standard configuration ? </li></ul><ul><li>How can the employee install and use a needed application if their device uses a different operating system or operating system version than what is required by the application? </li></ul><ul><li>The device owner is responsible for taking care of his or her asset ; however, if company owned (or licensed) software and data is on the device, won’t the device owner logically expect the organization to provide support? </li></ul><ul><li>How can the organization protect centrally located data if it can’t ensure that a device on the same network is properly secured ? </li></ul>Info-Tech Research Group 19% 23%
  6. 6. However, there is interest & real benefits available for those who want to take advantage of the opportunity IT Benefits Dealing with less break/fix and more infrastructure, security, and strategic initiatives – issues with a higher priority. Lowering costs through elimination of the function of acquiring, configuring, deploying, and maintaining end-user IT assets. Improved efficiency in application management and delivery through centralization means not having to manage applications across distributed assets. Business Benefits Incentive for recruiting and retention. Hire remote employees to reduce office real estate costs and maximize the available talent pool. In business continuity situations, employees can have their work with them outside the office in case of emergency. End-User Benefits Sense of ownership and greater end-user satisfaction. Employees can set their own preferences for their devices. Work flexibility and agility. Ability to use the tools that fit their needs and work style. 100% Laptops 12% 19% 17% Tablets 17% 13% 16% Smartphones 11% 16% 25% Very Interested Implementing Somewhat Interested Not at All Interested Interested Source: Info-Tech Research Group N=75
  7. 7. Interest in BYO has escalated because of advancements on both the IT and the consumer side Info-Tech Research Group Generation Y Millennials started entering the workforce in larger numbers and are often associated with the consumerization of IT. Many of the next generation employees don’t remember a world without the Internet and are used to having the latest PC or Mac at their fingertips. Some companies are using BYOC as an incentive program to attract new talent; however, most companies are not likely to look at this as a top driver for business decision-making. Tablets Bring Your Own Computer might more aptly be called BYO Device (BYOD), as much of the recent interest has been driven by iPad users and the proliferation of tablets and smartphones in the workplace. The pressure on IT began as a result of end users and C-level executives wanting to take advantage of their latest toy. As the number and capabilities of tablets on the market continue to grow, so too does pressure for BYOC programs. The Cloud Available SaaS options are almost unlimited – covering, for example, Payroll, Accounting, CRM, Project Management, and HR Management Systems. Online productivity suites are also maturing year over year: Google Apps , Zoho , and now Microsoft Office 365 all offer the potential to reduce application maintenance costs by placing responsibility for patching and upgrading in the hands of a third-party cloud vendor. Virtualization Desktop virtualization is continuing to take hold in organizations of all sizes. Desktop virtualization can range from the virtualization of individual applications to full desktops. Organizations that are farther along the virtualization path are looking for new ways to leverage this desktop-as-a-service delivery model to reduce hardware and support costs. IT Consumer
  8. 8. BYOC can be a hot topic for IT – both for and against it; a conversation is potentially confrontational but necessary Info-Tech Research Group In Info-Tech’s survey of trends to watch in 2011, BYOC came dead last. BYOC has established itself as a polarizing topic among IT professionals. Some are very optimistic while others are vehemently opposed to the idea. Interestingly, while BYOC is last, interest in and adoption of desktop virtualization (DV) is very high. DV is seen as a significant enabler of BYOC, and this may predict the future state of BYOC on this chart. I’d love to be the Dr. No, but that’s not a culture that I’ve ever promoted in my organization. We can’t say no to people. They’ll just work around you. These things will come in whether you like it or not. So you better figure out how you want to manage it.” - CISO, Government “ Bring Your Own Computer might more accurately be called BYO Device (BYOD), as it includes a full range of devices from smartphones to tablets to laptops, and whatever the future brings. “ I was talking to a major ISV that employs probably 10,000 people or something like that. And they ran a scan to see how many unmanaged devices they had. They called them cockroaches. And they had 3,000 unmanaged devices that were connected to the network, and they have no idea who owns them. And they definitely didn’t buy them. So whether you like it or not, it’s happening, and IT needs to get on top of it.” - From conversation with virtualization vendor The more IT resists, the more end users are going to push. It’s an age old problem that will only get worse with time: shadow devices on the network . High Low Adoption Interest Source: Info-Tech Research Group N = 254
  9. 9. Where this solution set fits: BYOC is enabled by desktop virtualization capabilities Those considering or already implementing BYOC can do so because they are developing capabilities that enable multi-device access and alternatives to traditional desktop PCs. Info-Tech Research Group Question BYOC is fraught with difficulties in a traditional distributed client PC environment. As organizations begin exploring alternative delivery methods, when is the best time to consider BYOC? Answer BYOC can be, and is being, considered by those who are moving away from the traditional distributed fat client model. Who would that be? Organizations that are exploring alternatives to desktop PCs for workers (laptops, thin clients, tablets, and smartphones) as well as alternative application delivery methods such as application presentation, cloud-based SaaS, and Web-enabled applications. Organizations that are invested in or interested in investing in desktop virtualization are better prepared for BYOC and willing to extend their capabilities to this service. Those who are not leveraging virtualization technologies to replace traditional desktops are less likely to be interested in BYOC. Related sets that address aspects of desktop virtualization: Develop a Desktop Virtualization Strategy Select a Desktop Virtualization Solution Build Steps to VDI Implementation
  10. 10. Take a device-agnostic approach, but recognize that different devices are used for different purposes Info-Tech Research Group Smartphones, tablets, and laptops are on a usage continuum which is characterized at one end by consumption of small chunks of information with little creation or manipulation; at the other end is broad data consumption and significant creation and manipulation. Tablets are somewhere in the middle and have attributes overlapping both ends of the spectrum. They can be used, for example, to access iPad apps but also full virtual desktops. It is no surprise that executives, who want ready access to small chunks of content in a highly mobile environment while being less likely to create or manipulate content, are more likely to pressure IT for smartphone BYOC policies. Data Consumption, Creation, and Manipulation Implementing 29% Interest 39% 61% 38% 62% 71% No Interest No Executive Pressure Executive Pressure Bring Your Own Smartphones Source: Info-Tech Research Group N = 71 % of Organizations
  11. 11. Critical Planning Principle: minimize the corporate presence on end-user devices, whether employee or company-owned Installation of company-owned or licensed data and applications on a device creates challenges for support, management, and protection of these assets. To meet the objective of reducing the complexity and cost of end-point device management, the company footprint must be minimized. Info-Tech Research Group We won’t give you wide open access to the network. We’ll just give you presentation layer access, browser-based access to the resources. So that’s the approach we’re starting to take more and more because it’s a recognition that we have absolutely no control over and governance over an employee-owned machine, be it an iPad or, frankly, a smartphone. It’s not going to matter.” - CISO, Government “ <ul><li>By installing nothing or very little on the endpoints, two things happen: </li></ul><ul><li>IT can reduce responsibility for the device. </li></ul><ul><li>With a traditional, distributed PC delivery model, IT is responsible for the applications installed on those devices, as well as the hardware. With a virtualized delivery model, the applications are centralized and can be maintained away from the endpoint. When that endpoint is no longer owned by the business, it becomes the responsibility of the end user. </li></ul><ul><li>The device doesn’t matter. </li></ul><ul><li>Centralized applications can be delivered to endpoint devices without a concern about what kind of device to which it’s being delivered. As one CISO pointed out: </li></ul>“ You can no longer look at this as an iPad issue or as the Chrome 3 or Android 3 devices start to come out. You’re going to choke on trying to keep up with any kind of platform.”
  12. 12. Lower costs and improve service using alternatives to traditional fat client PC deployment & management BYOC is the cart, not the horse. BYOC should not drive efforts such as replacement of traditional PCs with virtual desktops. Rather, those efforts make it possible to consider a BYOC policy. Info-Tech Research Group So if not BYOC exclusively, what is the overall goal? Why do it? Imagine a world where IT could focus on the delivery of the information services and applications that workers need to perform their jobs, while not having to spend time on the devices that workers use to access those services and applications. This world would be device agnostic; the type of device used to access applications and services wouldn’t matter. Access to applications and services on the devices would require the most basic, simple to use, and easy to support access clients possible . <ul><li>Getting to Value: Objectives of a Desktop-as-a-Service (DaaS) Strategy </li></ul><ul><li>Reduce the cost and complexity of deploying and managing end-user devices. </li></ul><ul><li>Improve agility of application deployment and accessibility to applications from multiple endpoints and device types. </li></ul><ul><li>Ensure that while objectives one and two are being achieved, business digital assets are protected from damage, misuse, or theft. </li></ul>Is this a return to dumb terminals? In a sense, yes. But these access terminals will provide a window to applications that are as feature-rich and powerful as anything that runs on a PC desktop. In fact, in certain cases, they will be the same applications as the desktop. For cases employing virtual desktop infrastructure, the PC desktop itself will be an accessible service from a range of devices. Info-Tech Insight:
  13. 13. Reduce business costs & IT complexity by minimizing desktop management requirements The Three Objectives of a Desktop-as-a-Service Strategy Info-Tech Research Group <ul><li>Reduce the cost and complexity of deploying and managing end-user devices. </li></ul><ul><li>The Goal </li></ul><ul><li>Endpoints that are as low maintenance as possible. Focus on zero or minimal install that leaves little to nothing on the endpoint that must be managed locally. </li></ul><ul><li>The Benefits </li></ul><ul><li>Zero and thin install endpoints require little to no intervention by the IT department, making the endpoints low impact. </li></ul><ul><li>This means that IT gets out of the break/fix cycle of managing desktop hardware and is able to focus on service delivery as well as other strategic IT initiatives. </li></ul><ul><li>Enabling Technology </li></ul><ul><li>App stores . iPad apps, for example, can be downloaded from a self-service store by the employee. A similar technology is found in the Citrix Receiver storefront (formerly known as Dazzle) which allows employees to download business apps sanctioned and supported by IT. </li></ul><ul><li>Web apps . The number of cloud-based productivity suites is increasing. Office 365, Microsoft’s cloud-based Office suite, joins Google Docs and Zoho among others. Productivity on the cloud means that no endpoint has a local productivity suite that must be supported by IT. </li></ul>1. Reduce Cost and Complexity
  14. 14. Move away from asset management toward service management to enable a more flexible work environment Info-Tech Research Group <ul><li>Improve agility of application deployment and accessibility to applications from multiple endpoints and device types. </li></ul><ul><li>The Goal </li></ul><ul><li>Applications that can be accessed from anywhere and on any device. </li></ul><ul><li>The Benefits </li></ul><ul><li>Increased end-user productivity and work flexibility. </li></ul><ul><li>This type of application agility is enabled by presentation and virtualization technologies which centralize apps in the data center. With centralized applications, IT is able to add, upgrade, and patch applications and services more easily. </li></ul><ul><li>The endpoint doesn’t matter. For example, rolling out a new OS does not require a PC refresh as it can be delivered as a virtual machine (VM). </li></ul>The Three Objectives of a Desktop-as-a-Service Strategy <ul><li>Enabling Technology </li></ul><ul><li>As indicated above, virtualization technology is a key enabler for achieving this goal. For more information on desktop virtualization strategy and selection, refer to Info-Tech’s solution sets: Develop a Desktop Virtualization Strategy and Select a Desktop Virtualization Solution . </li></ul><ul><li>Vendors who offer solutions for hosting and streaming applications and OSes include Citrix XenApp and XenDesktop , Microsoft App-V and Remote Desktop Services (formerly Terminal Services), VMware’s ThinApp and View . </li></ul>2. Improve Agility and Access
  15. 15. Strike a balance between reduced complexity, increased agility, and security concerns Info-Tech Research Group 3. Ensure Security and Integrity <ul><li>Ensure that while objectives 1 and 2 are being achieved, business digital assets are protected from damage, misuse, or theft. </li></ul><ul><li>The Goal </li></ul><ul><li>Protection of business information assets by preventing cross-contamination between business and personal functionality. </li></ul><ul><li>The Benefits </li></ul><ul><li>Meet compliance regulations more easily. Easier even than with traditional desktops. </li></ul><ul><li>Ultimately, it’s the ability to give the business what it wants while protecting them from themselves. </li></ul>37.5% Very Challenging 9.7% 44.4% Not at all Challenging 0.0% 4.2% 4.2% 81.9% of survey respondents said that security was challenging or very challenging. Source: Info-Tech Research Group N=72 <ul><li>Enabling Technology </li></ul><ul><li>Network Access Control (NAC) identifies devices as they connect, and applies tight network restrictions dynamically. Often includes anti-malware validation to limit potential attacks against internal resources by infected devices, and integration with multi-factor authentication solutions. </li></ul><ul><li>Multi-factor authentication strongly validates users and/or devices before allowing access. </li></ul><ul><li>IPSec and SSL VPN technologies enable secure access from BYO devices to otherwise inaccessible systems. </li></ul>The Three Objectives of a Desktop-as-a-Service Strategy
  16. 16. To meet the three objectives of a DaaS strategy, capabilities must be developed in infrastructure, ops, policy, and security Info-Tech Research Group <ul><li>Virtual Servers </li></ul><ul><li>Server Capacity </li></ul><ul><li>Storage </li></ul><ul><li>Bandwidth </li></ul><ul><li>First Line Support </li></ul><ul><li>Third Party Support </li></ul><ul><li>Self-Support </li></ul><ul><li>HR </li></ul><ul><li>Legal </li></ul><ul><li>Finance </li></ul><ul><li>IT </li></ul><ul><li>NAC </li></ul><ul><li>Multi-Factor Authentication </li></ul><ul><li>Encryption </li></ul>Infrastructure Security Operations Policy
  17. 17. Without proper capabilities, there is simply too much cost & effort required for a successful BYO program No-Go State BYOC would be difficult without a significant cost/effort investment. Currently, users are coming in to work with their iPads despite being discouraged to do so. Infrastructure Traditional, distributed PC environment with some server virtualization, but no desktop virtualization (DV). There are current budget restrictions that prohibit moving forward on DV. Security Early stages of determining what security controls are required to mitigate the risk of employee-owned devices. They use SSL VPN and are investigating ways to leverage this further. Operations/Support Haven’t been able to build a compelling business case to support consumer devices and do not see cost savings in outsourcing. Policies Current policy for contractors connecting to the business network is for IT to ensure the controls on the contractor machine meet or exceed those of the business. There is a user acceptance form in place. They would like to extend this policy to users, but unsure how to police it. Capability Maturity Policy Infrastructure Operations/Support Security Case Study
  18. 18. Organizations that have developed capabilities in desktop virtualization are better prepared for BYOC Info-Tech Research Group Can-Go State BYOC may not be desired but can be conceived. Currently, executives are coming to IT asking to bring their iPads into work as they see other businesses are enabling this. Infrastructure Have used presentation virtualization extensively for some users, but not all. Are exploring further virtualization of the desktop. Security Use multi-factor authentication to access the network, have fully encrypted hard drives on their assets, and have developed a plan to move towards a full, authenticated network in the near future. Operations/Support The CIO fully expects BYO to become par for the course and wants to leverage the internal skills achieved through their DV experience. There is some reluctance and concern about rolling out a new support model. Policy Have “secret sauce criteria” in place for dealing with different devices on the network, particularly with contractors. Can limit access for untrusted devices. Capability Maturity Policy Infrastructure Operations/Support Security Case Study
  19. 19. Development of capabilities in the four pillars will provide answers to these questions Info-Tech Research Group
  20. 20. Understand Strategize Execute <ul><li>This section will: </li></ul><ul><li>Define the four pillars of BYO capability and analyze remaining gaps. </li></ul><ul><li>Outline three BYO delivery models and their relation to the capability pillars. </li></ul><ul><li>Examine specific challenges and the key technologies that can securely enable BYO. </li></ul><ul><ul><li>Success in BYO relies on four main pillars </li></ul></ul><ul><ul><li>Managing BYOC Roadmap </li></ul></ul>2
  21. 21. As devices move from light data consumption to heavy data creation, new capabilities must develop Tablets occupy a middle ground where consumption and creation of data has a wide range. BYOC needs to be a consideration once interest enters this zone. There are two potential paths that can be followed at this point. Info-Tech Research Group - Light data consumption - Minimal data creation <ul><li>Heavy data consumption </li></ul><ul><li>Local data creation </li></ul><ul><li>Easier and more supportable </li></ul><ul><li>More flexible device capability </li></ul><ul><li>Full network </li></ul><ul><li>Harder to support (e.g. local rather than centralized apps) </li></ul><ul><li>Limited by device capabilities </li></ul>For more information on managing personal mobile devices, such as the iPhone, refer to the Info-Tech solution set, Manage the Invasion of Consumer Technology . <ul><li>Final steps : </li></ul><ul><li>Full BYOC policy created by all business groups. </li></ul><ul><li>TCO calculation in conjunction with Finance. </li></ul>Full BYOC BYOC Light Past this line, infrastructure, security, and operations pillars must be considered in order to support advanced data creation. Integration Virtualization Data Consumption and Creation Continuum
  22. 22. At one end of the BYO spectrum, there is emphasis on consuming small chunks of data with little to no data creation <ul><li>The Light Model </li></ul><ul><li>Details </li></ul><ul><li>BYOC Light allows access to small chunks of information, typically via e-mail and public-facing Web applications, primarily for consumption. </li></ul><ul><li>A Light Model usually involves access from personally-owned smartphones or tablets, though laptops, home PCs, and other Internet-connected devices may also be used. </li></ul><ul><li>Steps must be taken to restrict access to and storage of sensitive or regulated data, or to provide appropriate protections; however, the other pillars may not require as much work to get such a program off the ground. </li></ul><ul><li>Candidates </li></ul><ul><li>Many organizations are already supporting this type of environment, whether they call it BYOC or not. Allowing employees to bring their personal iPhone, Blackberry, or Android smartphones into the workplace and connect to the guest wireless is a form of BYOC that focuses on consumption of data. </li></ul>Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
  23. 23. Info-Tech recommends a virtualized model for increased security & ease of management <ul><li>The Virtualized Model </li></ul><ul><li>Details </li></ul><ul><li>This model relies heavily on desktop, application, and presentation virtualization and involves the highest level of investment in infrastructure. </li></ul><ul><li>In this model, the end-user device accesses a separate corporate virtual machine on a central server. The virtual machine, applications, and data remain secure and isolated in the data center while the employee is connected to the business network. </li></ul><ul><li>Increasingly, encrypted “offline” virtual desktops enable data security and isolation on the user system, while allowing for productivity when network connectivity is limited or absent. </li></ul><ul><li>Candidates </li></ul><ul><li>Regardless of the size of the organization, this model has clear security and manageability benefits over other models. However, it does not come free: organizations that have already invested in virtualization technology have a head start here. Even server virtualization is a step in the right direction, as competencies developed through server virtualization can be extended to desktop virtualization. </li></ul><ul><li>Advanced virtualization models may also include client-side hypervisors where the business virtual machine is partitioned and kept separate from the employee’s personal data. </li></ul>Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
  24. 24. Integrated models rely heavily on strong policies and require significantly more time & effort spent on support <ul><li>The Integrated Model </li></ul><ul><li>Details </li></ul><ul><li>Of the three full BYO models, this is probably the most challenging, and for many organizations, utterly unrealistic. </li></ul><ul><li>In this model, all applications are installed locally, and personal and business data sit together on the machine without separation. </li></ul><ul><li>The required level of security on the endpoint is high, and expectations must be explicitly stated in a comprehensive set of policies. </li></ul><ul><li>Candidates </li></ul><ul><li>Small businesses with low risk data assets or certain individuals within a larger organization are the best candidates. </li></ul><ul><li>There is a significant level of trust required for this kind of access to business IP. </li></ul><ul><li>Businesses with any kind of compliance requirements around data privacy and security will be unable to deploy this type of BYO model without significant company-controlled security capabilities on the system to contain risks and potential liability. </li></ul>Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
  25. 25. Organizations may look to hybridization to take advantage of the best of all worlds <ul><li>The Hybrid Model </li></ul><ul><li>Details </li></ul><ul><li>There are a number of ways a hybrid model can be deployed, depending on the applications in use. One example of this would be an organization that allows employees to use basic productivity apps on their end-user device and then delivers other applications virtually. </li></ul><ul><li>In another example, the organization may rely on a number of cloud applications for some of its application requirements, while other apps may be hosted in the data center, and still others may be installed locally on the client. </li></ul><ul><li>Candidates </li></ul><ul><li>A hybrid model applies to a much broader range of use cases. There are still security concerns about accessing business data for local applications, as well as for accessing central services – as such, the net result can be the worst of all worlds! </li></ul><ul><li>However, an increasing number of organizations are looking to and trusting the cloud with their business data, opening up additional possibilities. </li></ul>Info-Tech Research Group Least Effort Most Effort Least Effort Most Effort Least Effort Most Effort Infrastructure Operations/Support Policy Security Endpoint Central
  26. 26. Required infrastructure capabilities are much the same as those for virtual desktop environments Info-Tech Research Group <ul><li>Virtualized Servers. A capable IT infrastructure based on a solid foundation of virtualized servers will decrease implementation complexity and improve the business case for DV. </li></ul><ul><ul><li>Experience, skills, and tools gained through this initiative will transfer nicely to DV, and can be leveraged for deployment and management of virtual desktops. </li></ul></ul><ul><li>Server Capacity. There must be available server capacity to support the delivery technology required to offer a solid BYO strategy. Determine whether current capacity is sufficient to support DV and, when possible, use existing capacity to deploy the initial pilot to avoid purchasing a new server for DV. Calculate current IOPS on the storage media, as this is the current bottleneck in most environments. </li></ul><ul><li>Network Storage. An existing investment in network storage will not only provide capacity but will also enable higher availability/recovery of the BYO infrastructure. It will also enable higher availability/recovery of the virtual desktop infrastructure. Make sure your storage area network (SAN) is ready for the added burden of hosting virtual desktops. </li></ul><ul><li>Network Bandwidth. Consider typical use cases to determine bandwidth requirements as media streaming and delivery protocol can make or break a BYO program. </li></ul>Criticality of capacity planning, monitoring, and infrastructure support are magnified with desktop virtualization relative to traditional desktop PC setups. For more details on infrastructure requirements, refer to Info-Tech’s Develop a Desktop Virtualization Strategy . Focus on the following infrastructure enablers to minimize implementation pain
  27. 27. Truly mobile workers pose a challenge, but a virtualized infrastructure can help mitigate some pain points Info-Tech Research Group There may be some users that need a full functioning Windows desktop with all the applications, and these users may also be mobile and unable to connect to the network all the time. The challenge is how IT can provide flexibility and service to users who are not connected to the network. Below is a list of product solutions that can address these four technologies. It is for example only, and is not exhaustive . <ul><li>Citrix XenClient </li></ul><ul><li>Citrix XenVault </li></ul><ul><li>VMware MVP (Mobile Virtualization Platform) </li></ul><ul><li>Citrix XenDesktop </li></ul><ul><li>VMware View </li></ul><ul><li>Quest vWorkspace </li></ul><ul><li>Microsoft Desktop Virtualization </li></ul><ul><li>Citrix XenApp </li></ul><ul><li>VMware ThinApp </li></ul><ul><li> </li></ul><ul><li>Google Apps </li></ul><ul><li>Any number of SaaS solutions </li></ul><ul><li>Citrix Receiver (can be installed on a growing number of devices) </li></ul>
  28. 28. Draw a line in the sand: tell end users what they can and can’t do to decrease the effect on support costs Info-Tech Research Group The Question What are the obligations of IT in supporting the end user – not the PC? 52% of respondents strongly agreed with the following statement: Help desk support requirements have increased [since allowing personal devices on the network]. In short, when it comes to personal device support, focus on mitigating connectivity issues with corporate infrastructure. Leave end users to manage their own devices when it comes to hardware and support issues. n = 113 In Info-Tech’s survey on personal mobile devices, the majority of survey respondents interviewed saw an increase in support costs after permitting personal devices on the network. Those that did not focused heavily on developing a policy that outlined resolution options for common issues. <ul><li>My device won’t receive e-mails. </li></ul><ul><li>My device and calendar won’t sync. </li></ul><ul><li>My device can’t access Active Directory. </li></ul><ul><li>My device won’t turn on. </li></ul><ul><li>My device is frozen. </li></ul><ul><li>My screen is cracked. </li></ul>
  29. 29. Consider alternatives to help ease the adjustment of new support arrangements: both for IT and the end user % Info-Tech Research Group Third-party support contracts . As part of a stipend, the business can ask employees to secure support contracts for their devices in case of hardware failure. If employees buy their laptop from a franchise/box store, service contracts are often not suitable for business requirements. In this case, the business may want to contract a suitable service provider and direct employees where to take their devices. A key element of this is having emergency reserves on hand to maintain productivity while the device is being repaired – this could range from previously retired hardware to thin clients. Self-support . The business can also encourage self-service and peer support for some problems. The success of this depends greatly on how comfortable the employee population feels about technology. IT may consider developing a knowledge base or internal wiki that employees can use to self-diagnose and self-help. The changing role of IT from asset manager to service manager. This is a real paradigm shift for IT. The administrative side of desktop management doesn’t really change – managing access and privileges – but IT is no longer managing patching and upgrading on individual machines.
  30. 30. The discussion to move towards BYOC is not just about IT policy alone; involve all parts of the business Info-Tech Research Group IT will determine the capability of both the infrastructure and IT staff skills to support the program. It may be necessary to create a skills inventory to determine capability and support guidelines. IT will also outline minimum requirements for devices purchased by employees. HR will define policies that are already available to be leveraged as well as new policies that must be developed. They will also determine how best to handle new employee onboarding, probation periods, and stipend proration if necessary. Finance can crunch the numbers and outline tax implications of the program for the business in order to determine an appropriate stipend amount. Legal will advise as to any compliance or regulatory restrictions that may interfere in widespread deployment of the program. Restrictions may be placed on a department by department basis. See Info-Tech’s BYOC Acceptable Use Policy .
  31. 31. Secure access from the BYO device to company networks and centrally-stored data therein <ul><li>Key technologies include: </li></ul><ul><li>Network Access Control (NAC) . Identify devices as they connect and apply tight network restrictions dynamically (e.g. assignment to VLANs with appropriate VACLs). May also include anti-malware validation to limit potential attacks against internal resources by infected devices, and integration with multi-factor authentication solutions. </li></ul><ul><li>Firewalls & static VLAN assignments . Restrict access to network resources based on WLAN IP address, or based on physical LAN port assignments to specific IP addresses or VLANs. </li></ul><ul><li>Desktop Virtualization . Deliver a rich desktop experience (i.e. profiles, applications, and data) through a presentation interface, and limit or eliminate the need or potential for copies of company data to reside on the BYO device. </li></ul><ul><li>Multi-factor authentication . Strongly authenticate users and/or devices before allowing access. </li></ul><ul><li>Secure remote access . IPSec and SSL VPN technologies can enable secure access from BYO devices to otherwise private/inaccessible resources. </li></ul>How will devices be allowed to connect to internal company networks (wired or wireless)? Options & considerations for internal connection of BYO devices to business networks: <ul><li>Direct connectivity. The BYO device can connect in the same way(s) as any company-owned asset. </li></ul><ul><li>Limited connectivity. Only allow authenticated access to specific, limited services or resources. For more information, refer to Info-Tech’s Build Security Architecture & Roadmap Implementation . </li></ul><ul><li>No connectivity. Only allow strongly-authenticated access to secured, public-facing services (SMTP, IMAP, HTTP, RDP/VNC). </li></ul>
  32. 32. Secure all copies of company data stored on the employee-owned device <ul><li>Key technologies include: </li></ul><ul><li>Encryption – whole device and content-level encryption can provide companies with the confidence that locally stored data (on the device itself, or on peripherals) is protected from inadvertent disclosure. </li></ul><ul><li>Anti-malware – protect against local data (and central system access credentials) being disclosed as a result of system compromise. </li></ul><ul><li>Remote & event-based wipe – ensure that company data can be removed from lost/stolen BYO devices, or is automatically removed after a set number of failed attempts to unlock. </li></ul><ul><li>Strong passwords – ensure that access to the device, or to data on the device, is protected by more than a trivial PIN. </li></ul>Info-Tech Research Group Will devices be allowed to store copies of company data locally ? Options & considerations for storing local copies of data: <ul><li>No ability to store data locally. The device can only connect to a locked-down VDI session through which data can be accessed and manipulated. </li></ul><ul><li>Limited ability to store data locally. The device is able to access some data and store it locally (e.g. cached e-mail/calendar/contact content). </li></ul><ul><li>No restrictions on local storage of data. </li></ul>
  33. 33. Understand your current capabilities and assess your readiness for different BYOC approaches <ul><li>Info-Tech’s BYOC Readiness Assessment Tool asks questions about your current infrastructure, security, operations & support, and policy competencies. Your responses will result in prioritized advice to help you decide if BYOC is right for your organization, and if so, what model fits best, and where to focus efforts to make BYOC a reality. </li></ul><ul><li>Some of the topics covered include: </li></ul><ul><li>Desktop virtualization </li></ul><ul><li>Granular network security/connectivity </li></ul><ul><li>Encryption </li></ul><ul><li>Self-service support </li></ul><ul><li>Acceptable use and termination policies </li></ul>Info-Tech Research Group
  34. 34. Strategize Execute 3 Understand <ul><li>This section provides five final actions for developing a solid BYOC policy, including: </li></ul><ul><ul><li>Communicating support expectations. </li></ul></ul><ul><ul><li>Analyzing the impact of these objectives on your approach. </li></ul></ul><ul><ul><li>Documenting your position on BYOC. </li></ul></ul><ul><ul><li>Consider five final actions to take BYO the last mile </li></ul></ul><ul><ul><li>Managing BYOC Roadmap </li></ul></ul>
  35. 35. If the capabilities assessment says you are ready for BYOC, consider these five actions for moving forward with a policy <ul><li>Info-Tech Research Group recommends the following actions. </li></ul>Success in developing the four pillar capabilities means the organization can support BYOC. Next is to establish the why and the how. Info-Tech Research Group 1 <ul><li>Measure success against overall objectives of a multi-device strategy. </li></ul><ul><ul><li>Having a multi-device IT service access strategy should contribute to lowering costs while increasing service regardless of who owns the devices. Given that, how does BYOC further those objectives? </li></ul></ul>2 <ul><li>Consider impact on overall objectives when deciding between passive or aggressive approach. </li></ul><ul><ul><li>Bring Your Own policies can range from passive (we allow connection from personally-owned devices) to aggressive (we encourage and even subsidize bring your devices). </li></ul></ul>3 <ul><li>Communicate policy requirements and roles and responsibilities for system support. </li></ul><ul><ul><li>Failure to meet success measures can be a result of communication failures as much as a failure of technical and operational capability. </li></ul></ul>4 <ul><li>Maintain company-owned device options for flexibility and end-user service. </li></ul><ul><ul><li>Info-Tech sees that even in the case of an aggressive BYOC program, allowing use of a company-owned device can mitigate a number of the potential pitfalls of BYOC. </li></ul></ul>5 <ul><li>Document your policy position and rationale for the business. </li></ul><ul><ul><li>In dealing with your internal business customers’ demand for service, there is only one question (with two corollaries) that matters. Can you deliver this service? If yes, how? If no, why? </li></ul></ul>
  36. 36. Measure success against overall objectives of a multi-device strategy <ul><li>Success Metrics </li></ul><ul><li>Objective: Reduce the cost and complexity of managing endpoint devices. </li></ul><ul><li>Has the move to bring your own device lead to a reduction in capital spend for end devices? Look for reduction in desktop hardware/mobile device capital spend. If you are implementing a stipend system, the cost of the stipends should be counted as a capital spend. </li></ul><ul><li>Has the move led to further reduction in time/effort spent on client support? Measure help desk ticket volume and time/effort spent on supporting endpoint issues. Hope for at least neutral impact here; if support costs increase, revisit the BYO fundamentals. </li></ul><ul><li>Objective: Increase flexibility of service to the user. </li></ul><ul><li>If client demand for the service has been high, conduct a follow-up survey to see if clients feel they got what they needed. </li></ul><ul><li>Survey managers/executive groups to gauge if flexible access, including client-owned devices, has boosted productivity and/or job satisfaction. </li></ul><ul><li>Objective: Ensure business-owned digital assets are protected from damage, misuse, or theft. </li></ul><ul><li>If there has been an increase or change in security issues (e.g. breaches, malware attacks, accidental corruption or loss of sensitive data, theft or misuse of company IP) as a direct result of BYOC, then audit. Recognize that a temporary increase may occur, as previously-unsanctioned BYO activity comes under increased corporate scrutiny. </li></ul>Having a multi-device IT service access strategy should contribute to lowering costs while increasing service regardless of who owns the devices. How does BYOC further those objectives? Info-Tech Research Group
  37. 37. Consider impact on overall objectives when deciding between passive or aggressive approach Bring your own policies can range from passive (we allow connection from personally-owned devices to select services) to aggressive (we encourage and even subsidize BYOC). Passive Approach <ul><li>There are a lot of employees, including executives, that have their own devices and want to use them at work. IT can score a service win with these groups if they can allow access from these devices. Nobody is being forced to bring their own. </li></ul><ul><li>In terms of meeting overall objectives, the goal is likely positive progress on the second objective – increased flexibility of service to the users – while at the very least avoiding any increase in cost and complexity of managing endpoints or additional security headaches. </li></ul>Aggressive Approach <ul><li>If the organization is embarking on an aggressive BYOC program – trying to transition as many employees as possible to Bring Your Own – there is going to be additional considerations such as HR implications of stipends and communications/support for less sophisticated tech users. </li></ul><ul><li>The return on this investment will likely need to include definite cost and complexity reduction as well as service improvement. </li></ul>
  38. 38. If your organization decides to pursue an aggressive policy, think about including a stipend as part of the BYOC policy Info-Tech Research Group Below are purchase details for a new laptop on Dell’s online Small & Medium Business shop which allows for business editions of software, such as the OEM version of Windows 7 Pro rather than Home edition. Compare the cost of an individually purchased laptop against the cost of purchasing a device at volume through the business. Cost considerations: Taxation . Some businesses are eligible for a refund of the sales tax paid toward a business laptop. The amount of the refund varies by the size of the business as well as local tax laws. Cost of Support . The ideal state of a BYOC program is that IT will no longer be responsible for maintenance of the hardware. Calculate the number of man hours spent previously against expected savings. Licensing . Microsoft’s Software Assurance (SA) does not apply to thin clients or employee-owned devices. Compare the cost of SA against the cost of individual licenses or the $100/device/year Virtual Desktop Access (VDA) fee. Dell Vostro 3500 Laptop Processor Intel Core i5 (560M) 2.53GHz/3MB cache Operating System Windows 7 Pro 64-Bit Memory 4GB DDR3 Display 15.6” Hard Drive 320GB SATA Service & Warranty 3 Year Advanced Service Plan (next business day onsite service) Productivity Suite None . Add $399.00 for Office Pro 2010 Anti-Virus None . Add $40.00 for 36 months of Trend Micro Worry-Free Business Security Services Keyboard and Mouse None . Add $99.99 for Wireless Logitech MK710 Included Option Fingerprint reader Price $1219.99 +tax
  39. 39. Communication of policy requirements and explicit support expectations will be critical Failure to meet success measures can be a result of communication failures as much as a failure of technical and operational capability. Info-Tech Research Group Here’s a Typical Concern The boss loves his smartphone. He wants to use it for work-related tasks. He also wants anybody in the organization with a smartphone to be able to use one. However, if his smartphone stops functioning, he’ll expect IT to support it. As seen above, a previous Info-Tech survey indicated that over half of respondents (52%) found that support workload increased with a mobile device strategy. If the organization has successfully moved to a model where support is focused on making services available and accessible, support requirements at the access points (access devices) should decrease. But this only works if the user community clearly understands their responsibilities and the obligations of the organization to support the device. Action This is a big culture change, so communication is key. Make sure the policies around BYOC are clear and explicit. Define what is in and out of scope in terms of support and in terms of what can be accessed by the employees using their device. Communications Plan Template for a BYOC Program
  40. 40. Maintain business-owned device options for flexibility and end-user service <ul><li>The overall strategic goal may well be to get out of the desktop asset management business entirely, but continuing to own and maintain some endpoint devices will make it easier to implement BYOC. In a broader IT as a Service initiative, the aim is to reduce the cost and management complexity of all endpoint devices including business-owned devices. BYOC can be leveraged to buy and maintain fewer devices; however, continuing to own and maintain some “spares” will boost service capabilities even as more employees bring their own. </li></ul>Info-Tech sees that even in the case of an aggressive BYOC program, allowing use of a company-owned device can mitigate a number of the potential pitfalls of BYOC. Info-Tech Research Group <ul><li>Scenario 2 </li></ul><ul><li>In a company that is aggressively promoting BYOC, a new employee is told that he or she will be given a stipend to purchase a personal laptop that they can use to access a VDI corporate desktop. The employee is not interested in owning a laptop. He or she is interested in accessing the VDI desktop from a home office PC over VPN but would rather have a desktop PC at the office. </li></ul><ul><li>In this case, if the employee was offered a choice between BYOC and a thin client workstation with access to a VDI desktop, the organization could still meet the objectives of reducing cost and complexity at the desktop while giving more than one choice to the employee. </li></ul><ul><li>Scenario 1 </li></ul><ul><li>The enterprise supports access to corporate desktop services via a laptop or tablet. The scope of support is clear: IT does not handle break/fix of the device but does support access to applications and services. What happens if the device does break and is going to take a week to get repaired or replaced by a third-party vendor? </li></ul><ul><li>If this user can be given a “loaner” device, he or she can continue to work while the device is serviced. This could be a formerly-retired device or a thin client option. </li></ul>
  41. 41. Document your policy position and rationale for the business <ul><li>If you have used this solution set, you now have detailed information on whether or not your organization is ready to support a BYOC initiative, as well as an understanding of the bigger picture strategic goals of which a BYOC program can be part. </li></ul><ul><li>If you are not ready, you know where you have to invest in capabilities development. </li></ul><ul><li>If you are ready, you have also considered why this could be a good idea in terms of measurable benefits to the enterprise. </li></ul><ul><li>Be prepared to communicate your findings back to the business. Info-Tech’s BYOC Strategy Position Template will help guide future investments in IT for capabilities development, including how return on that investment will be measured. </li></ul>In dealing with your internal business customers’ demand for service, there is only one question (with two corollaries) that matter. Can you deliver this service? If yes, how? If no, why? Info-Tech Research Group
  42. 42. Conclusion Info-Tech Research Group <ul><li>The three objectives for any desktop-as-a-service program: </li></ul><ul><li>Reduce the cost and complexity of deploying and managing end-user devices. </li></ul><ul><li>Improve agility of application deployment and accessibility to applications from multiple endpoints and device types. </li></ul><ul><li>Ensure that while objectives one and two are being achieved, business digital assets are protected from damage, misuse, and theft. </li></ul><ul><li>The four pillars of capability for achieving a BYOC initiative: </li></ul><ul><li>Infrastructure </li></ul><ul><li>Security </li></ul><ul><li>Operations & Support </li></ul><ul><li>Policy </li></ul><ul><li>All four pillars must be robust to support a full BYOC program. </li></ul><ul><li>The final five considerations for the last mile of the BYOC program: </li></ul><ul><li>Measure success against overall objectives of a multi-device strategy. </li></ul><ul><li>Consider impact on objectives when deciding between passive or aggressive approach. </li></ul><ul><li>Communication of policy requirements and explicit support expectations is critical. </li></ul><ul><li>Maintain company-owned device options for flexibility and end-user service. </li></ul><ul><li>Document your policy position and rationale for the business. </li></ul>Understand Strategize Execute High Low Adoption