Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

BYOD (Bring Your Own Device) Risks And Benefits


Published on

Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.

In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

BYOD (Bring Your Own Device) Risks And Benefits

  1. 1. CLIENT LOGO HEREThe Debate Over BYOD10.16.2012
  2. 2. INTRODUCTIONEric Alfaro is the Chief Information Officerof Modis, and Modis’s parent company,Adecco Group North America.Adecco Group is the world’s largestrecruitment and workforce solutionsprovider. Eric’s team in North Americadelivers technology enabled businesssolutions and services to over 800 Adeccolocations and 8000 Adecco employees inNorth America.2
  3. 3. AGENDA• Definition: BYOD• BYOD – More Than a Trend, It’s a Shift• Why implement a BYOD strategy?• Best Practices in a Successful BYOD Program• Downsides to BYOD and solutions3
  4. 4. WHAT IS BYOD?BYOD or Bring Your Own Device is becoming the norm among employeesand employers alike. It refers to the policy of allowing employees topurchase and integrate their own devices into a corporate operatingenvironment. The most common devices are laptops, smartphones andtablets.While businesses benefit by having up-to-date and connected employees,IT departments often find it difficult to balance changing technologylandscapes with requirements to manage and support a homogenousenvironment.BYOD also means dealing with new security concerns and a shift toempowered employee computing.4
  5. 5. HOW BIG IS BYOD?• BYOD is a prominent component of the “Consumerization of IT” andis rapidly changing the way IT delivers services and support.• Client virtualization products (e.g. Citrix) are mainstream solutions forsecurely deploying business applications to multiple end user devices,and Internet standards (HTML5) mean multi-device support is closer.• In a 2012 survey of 600 businesses, Cisco found that 95 percentallowed their employees to BYOD in some form. An example of thiswould be secure access to corporate email services from a BYOD,which is the most common service provided.• Of those companies, many also provided technical support for thedevices.• 36% of respondents provided support across all devices andplatforms.5Source: 2012 Cisco IBSG Horizons Study
  6. 6. BYOD TOUCHES IT, HR, SOURCING, …EmpoweredEmployees6Security of BusinessDataUser Requirementsand PopulationsIT SupportCapabilitiesCost ManagementContinuous MobileDevice TechnologyEvolutionHR and BusinessPoliciesEmployee ITProcurementHRSourcingSourcing
  7. 7. THE BENEFITS OF BYOD FOR COMPANIES7• BYOD enhances employee productivity. It allows for immediate accessto work when away from the office, during commutes, while traveling,and during down-time. The costs of delivering a solution should bemeasured against increase in employee productivity. Industry reports anaverage $300 to $1,300, which would depend on your measurement.• Employees are much more likely to protect and care for their owndevices. This equates to decreased expenditures due to damaged orstolen devices and data loss.• Device ownership costs such as initial set-up, maintenance, insurance,and data plans are shifted to the employee rather than the employer.• For Gens Y and Z, 50% are using these technologies at home (andexpecting them in the office).
  8. 8. BENEFITS OF BYOD FOR EMPLOYEES• Efficiency: Carrying a single device is preferable to carryingmultiple devices.• An employee’s device can be used for personal purposes so they’llbe able to save settings and documents on a single phone, laptop,or tablet.• Employees can control which devices they want. This allows themto choose the technology that best suits their needs while alsoguaranteeing them the freedom to upgrade and purchase deviceson their own timeline.
  9. 9. IMPLEMENTING – BEST PRACTICES1. Understand your customers and operating environment2. Prioritize deployment of BYOD services3. Make support processes simple and clear4. Communicate!9
  10. 10. TECHNOLOGY AND BYOD AT MODIS• How similar is Modis to your business?• Our workforce is technology driven and a large segment is comfortablewith minimal technology support – a good starting point for BYODservices1043%60%67%0% 20% 40% 60% 80%Im comfortable using technologywith little or no helpI like technologyTechnology is important to me
  11. 11. UNDERSTAND YOUR CUSTOMERS ANDOPERATING ENVIRONMENT• What populations of IT consumers exist in your business?• Where do they work? How technology savvy are they?• What applications do they use? What type of data do theyaccess?• What does it cost to support them?• What BYOD capabilities do your IT enterprise management toolshave?• What corporate policies are relevant?11
  12. 12. WHERE TO START – WHAT’S HOT WITH YOURCUSTOMERS?• In the Modis environment, Tablets and Phones account for majority ofBYOD devices, which is where our current strategy is focused• The complexity of desktop applications and security requirements hasmade widespread laptop and desktop BYOD too costly• Consider Tiered services, rather than “One Size Fits All”• Products like Citrix andWeb delivery methodsare making applicationportability more viableon common computingdevices1291%79%12%8%1%7%9%4%3%3%2%2%84%89%96%DesktopLaptop/NotebookSmartphoneStandard MobilePhoneTabletCompany Device OwnershipCompany Company &Personal Personal
  13. 13. MAKING BYOD WORK: WHAT APPLICATIONS DOYOUR EMPLOYEES NEED?• Not all applications work well across all BYOD devices• Ensure the applications your employees need will meet performance andease of use expectations• Consider starting with basics: Email, Calendar, Web• Modis workforce relies heavily oncollaboration applications, mostof which run well on mobile,tablet, and laptop devices• Now is the time to start planning forfuture applications can be used with BYOD1351%53%54%59%96%99%0% 20% 40% 60% 80% 100% 120%PresentationsWeb MeetingsInstant MessagingSocial MediaCalendarEmail
  14. 14. PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS• Consider value vs. cost / effort / risk for different BYOD featureso Trap: Supporting BYOD like traditional internal IT systemso Check: Most modern solutions include web access. Upgrading an oldapplication might get you BYOD access out of the box• Engage your Legal, Risk Management, and Sourcing /Procurement function(s) for guidance• Think incrementally as you deploy features• Test the most widely use device / technologies and VIPs• Stick to mainstream BYOD-friendly applications if you can• Expect challenges14
  15. 15. • Get right level of business and management sponsorship forsuccess• Make BYOD program clear and align support methods with self-service tenants• Include BYOD survey items in your IT satisfaction surveys and ITcost metrics• Create employee Evangelist teams with access to news on“what’s next” to drive demand15COMMUNICATE!
  16. 16. DOWNSIDE OF BYOD FOR COMPANIES16• Employee owned devices doesn’t translate to no cost for companiesEnsure you consider TCO – total cost of ownership• Device types change almost dailyIdentify essential version and interface requirements• Sensitive and protected data can pose a security riskHave this discussion with your Risk, Legal, or Data Protection resource prior toBYOD implementation• For IT leaders it’s difficult to explain the time, effort and expense issuessurrounding BYOD to business leadersIf you are already doing IT cost tracking, include BYOD from day one
  17. 17. DOWNSIDE OF BYOD FOR EMPLOYEES17• It can be costly to own and maintain a device Consider an exception policy for employees who are unable to get adevice, but need one• It may be necessary to purchase a more expensive data plan toaccommodate the larger volume of communications Think through how you’ll break out person vs. company data use• Employees may have difficulty “disconnecting” and havingdowntime Work – Life balance is a key satisfaction point for most employees• When accessing the company’s network an employee may beunwittingly exposing personal information, passwords and browsinghistory Acceptable use policy• In some situations an employee may be forced to relinquish thedevice so that it may be cleaned of company data Communicate and help VIPs
  18. 18. THE BOTTOM LINE ON BYOD• Understand what problem(s) you’re solving• Consider the total cost of BYOD, including a reimbursement policy• Plan comprehensively; it’s hard to “put the genie back in the bottle”• Be incremental in your approach to features and services to limitdeployment risk and help users adjust to support• Communicate!• Review or update your security incident response processes18
  19. 19. QUESTIONS ?