SlideShare a Scribd company logo
1 of 20
Download to read offline
The Essential
BYOD Handbook
Effectively Supporting and Managing
All ofYour Mobile Devices
(BYOD = BringYour Own Device)
Jody Costa joined Barcoding, Inc. as
Director of Marketing in 2010. With
over 10 years of experience in writing,
marketing, and publishing, Costa is
responsible for all strategic and tactical
aspects of the marketing program.
Editor
Jody Costa
Barcoding, Inc. is a national systems
integrator, specializing in the
development, deployment, and
management of supply chain and
mobility systems based on automated
data capture and wireless technology.
www.barcoding.com.
Chapter 1: Challenges in the Mobile Landscape
Chapter 2: Consumer vs. Enterprise
Chapter 3:The Era of BYOD and ILD
Chapter 4: Supporting BYOD Effectively
“We Can Help” andVideo Link.
Sources and Additional Reading
TABLE OF CONTENTS
What isYour OS?
One of the biggest challenges facing
companies (and IT departments in
specific) is the complex landscape of
mobile operating systems (OS).
What used to be reliably either Windows
or Blackberry has become a bevy of
possibilities, each with its own pros and
cons.
CHAPTER 1:
Challenges in the Mobile Landscape
// Page 1
Source: Motorola Solutions
Mobile
patent suits
between mobile
device and
component
manufacturers
further complicate
the situation. How
will these get
resolved?What do
these licensing
situations mean for
your company’s IT
assets?
THE ESSENTIAL BYOD HANDBOOK
// Page 2
Source: Motorola Solutions
Expectations of the IT department have radically
changed with the exploding popularity of Apple products like the
iPhone and iPad.These personal devices are now so ubiquitous
that many employees expect to use them for company business,
at all hours of the day.
It is assumed (whether right or wrong) that IT will support
these devices – whether by accessing the company
network/email or by downloading documents and applications.
THE ESSENTIAL BYOD HANDBOOK
I expect my
iPhone/iPad to work
within the company
environment. I expect
IT to support my
personal devices.”
// Page 3
“Gartner …
observes that, even
by 2014, 60% of
Fortune 1000
companies will
have failed to put a
comprehensive
mobile strategy in
place – leading to
considerable
overspending.”2
Fragmentation – so many
devices and operating systems
in the current business
ecosystem – is a persistent
and pernicious problem for IT
departments.
The importance of an end-to-
end mobile management
solution cannot be overstated.
One of the biggest challenges
in the new mobile landscape is
finding a way to
holistically manage
current levels of devices,
software, and data while
also ensuring the ability
to scale and grow as
technology develops.
THE ESSENTIAL BYOD HANDBOOK
Source: “Put an Integrated Mobile Strategy
in Place, or Face Increased Costs Later,”
Gartner, July 6, 2010, ID: G00201262.
// Page 4
In talking about the changing mobile landscape, it’s important to
distinguish between consumer-based devices and
purpose-built enterprise devices. What are the core
differences in cost, security, and support?
CHAPTER 2:
Consumer vs. Enterprise
// Page 5
THE ESSENTIAL BYOD HANDBOOK
// Page 9
Consumer Focus
• Driven by fashion, style,
surprise, and innovation
• TCO is irrelevant, price
defined by social factors
• Focus on user empowerment
& satisfaction
• Balanced visceral, functional,
and reflective value
• Integrates with whatever the
users want/need
• Security, control, management
are irrelevant
Enterprise Focus
• Manageability, security, and
control are critical
• Understands & acts on
CIO/Enterprise needs
• Integrates with/supports
enterprise skills &
technologies
• Predictability & road maps for
planning
• Focus on functional value
Source: Gartner, Motorola Solutions
While device selection is critical, BYOD
takes it out of the hands of IT …
If consumer devices aren’t built for the
enterprise, how will you handle security
and control when they access your data?
CHAPTER 3:
The Era of BYOD and ILD
With Apple’s explosion in the market, employees are
asking to use their own devices (bought with their
own money) for business uses.The “Era of BYOD and
Individual-Liable Devices (ILD)” is here to stay – and if you
don’t have a strategy to deal with it right NOW, you are at
great risk.
// Page 6
THE ESSENTIAL BYOD HANDBOOK
What is this new era? Co-existence and “confluence” –
meaning a blend of style and utility for deices, the evolution of
HTML5, and a consolidation and maturation of UI, OS, MDM, etc.
This “sharing” atmosphere puts tremendous pressure on IT
departments just to keep up with all the changes.
// Page 7
Source: Motorola Solutions
THE ESSENTIAL BYOD HANDBOOK
// Page 8
Source: Motorola Solutions
What defines ILD –
Individual Liable Devices
 Consumer grade devices in the workspace
 The choice of “personal experience” over
“work experience”
 Openness for cloud and personal
applications and functions but constrains
with corporate email,VPN access, etc.
Challenges with ILD
 Establishing ILD “Dual Persona”
 Dealing with sandboxed domains
 Handling hypervisors/ virtualization
 Enabling selective wipes
 Utilizing mobile device management
If you don’t have a current strategy for BYOD,
you are behind. Here is a step-by-step approach for you
to follow to make certain your company has a flexible,
scalable, and effective strategy in place.
Start by conducting a device audit. Find out what
you currently have in order to shape overall BYOD policy.
What features are important to employees and/or to the
company? Identify and work through gaps.
CHAPTER 4:
Supporting BYOD Effectively
// Page 9
Your guidelines/baselines should establish rules like:
• What is your privacy policy? Who owns the data
now or if it’s destroyed?
• What requirements are enforceable for BYODs to
enter the enterprise? (i.e., can they check email, download
docs, etc.)
• What types of BYOD devices are allowed? (i.e.,
Android,Apple?)
• Are all departments involved? BYOD affects the
entire organization. Establish goals of executives, HR, IT, etc.
to create a truly effective policy.
THE ESSENTIAL BYOD HANDBOOK
Establishment of
baselines is the
number one step to
take to effectively
manage BYOD.”
// Page 10
EmployeeTermination should be a formal
and written procedure and/or checklist process.
Create awareness with vendors of the employee’s departure;
record log-in information; have appropriate resources to check
for malware or unauthorized access to company data; have the
ability to wipe devices or to lock them down; etc.3
By formalizing your approach, you will ensure that critical
details aren’t overlooked.
THE ESSENTIAL BYOD HANDBOOK
// Page 5
Get HR Involved.
Don’t have a policy written
yet? Check out this sample
courtesy of
ITManagerDaily.com
// Page 11
THE ESSENTIAL BYOD HANDBOOK
// Page 12
Effective Software Support
Key Challenge
Built to last 4-5 years but are now faced with devices that
update every 6 months
Recommendations
 Avoid thick clients that target one specific OS
 Put money into maintenance and support (M&S) as well as
research and development (R&D)
 Utilize “Mobile Device Management” (MDM) to push
updates
 Explore web-based solutions such as HTML 5: that way,
company information can be accessed from any device,
anywhere
Mobile Device Management
(MDM) is Critical
Without a MDM solution, you won’t be
able to handle device lifecycles, security,
applications and content, or diagnostics
as your organization grows and as your
network of workstations, rugged
computers and terminals, and BYOD
devices grows.
Look for a solution with:
 Centralized management console
 Real-time support
 Reactive and proactive management
 Complete lifecycle management
 Over-the-air configurability
Key Benefit
Push HW &
SW updates
remotely to
devices in the
field – no
manual
provisioning
// Page 14
THE ESSENTIAL BYOD HANDBOOK
THE ESSENTIAL BYOD HANDBOOK
Final Items to Consider
 IsYour Disaster Recovery Plan Relevant to
BYOD?
 AreYou Providing the Right Productivity and
SharingTools so Employees Don’t Seek
Rogue Applications?
 AreYou Encouraging Regular Back-ups of
Mobile Devices?
 Is EffectiveTraining in Place to Support the
Efforts of the ITTeam?
 IsYour Data Secure Under the Policies
You’ve Created?
// Page 13
“BYOD, Social Media
AmongTop Security
Threats of 2013”
If you need help on device
selection, mobile device
management, or more – contact
Barcoding, Inc.We are a trusted
advisor to more than 2,500
companies across the country.
Good News!
We can help…
Watch Industry Experts Discuss
BYOD Live!
1. http://www.eweek.com/c/a/Mobile-and-
Wireless/Management-Orthodoxy-Challenged-by-
iPad-iPhone-257619/
2. http://www.sap.com/campaigns/2011_04_mobility/asse
ts/Mobility-
Its_Impact_Opportunities_and_Challenges.pdf
3. http://www.eweek.com/c/a/Security/BYOD-10-Tips-
Enterprises-Can-Use-to-Protect-Their-Data-700259/
4. http://www.channelpartnersonline.com/blogs/peertope
er/2012/09/why-most-byod-managers-will-welcome-
iphone-5.aspx
5. http://www.computerworld.com/s/article/9230476/Bes
t_BYOD_management_Containment_is_your_friend
6. http://www.thevarguy.com/2012/09/10/byopc-byod-it-
consumerization-dont-matter-in-the-cloud/
7. http://www.eweek.com/it-management/byod-social-
media-among-top-security-threats-of-2013/
8. Motorola Solutions presentation by Bruce Willins
(2012)
9. Barcoding, Inc. presentation by Martin Jack (2012)
Sources and Additional Reading

More Related Content

What's hot

VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]kgbacdd
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationAVI-SPL
 
How to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT StrategyHow to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT StrategyMicrosoft
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemIron Mountain
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksLogicalis
 

What's hot (20)

VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
Security that works
Security that worksSecurity that works
Security that works
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
 
How to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT StrategyHow to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT Strategy
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
 

Viewers also liked

Males & females grade 7
Males & females grade 7Males & females grade 7
Males & females grade 7Zona Iftikhar
 
O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...
O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...
O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...Isabela Espíndola
 
5. index prestasi semester 1 - 4
5. index prestasi semester 1 - 45. index prestasi semester 1 - 4
5. index prestasi semester 1 - 4RURIMA MUHNADI
 
Writing for web class2
Writing for web class2Writing for web class2
Writing for web class2Anna Polud
 
2015. november - A Hónap Webáruháza: Mybeautytools.hu
2015. november - A Hónap Webáruháza: Mybeautytools.hu2015. november - A Hónap Webáruháza: Mybeautytools.hu
2015. november - A Hónap Webáruháza: Mybeautytools.huShopRenter
 
2016. július - A Hónap Webáruháza: Yolkiest.com
2016. július - A Hónap Webáruháza: Yolkiest.com2016. július - A Hónap Webáruháza: Yolkiest.com
2016. július - A Hónap Webáruháza: Yolkiest.comShopRenter
 
2016. február - A Hónap Webáruháza: GEOTREK
2016. február - A Hónap Webáruháza: GEOTREK2016. február - A Hónap Webáruháza: GEOTREK
2016. február - A Hónap Webáruháza: GEOTREKShopRenter
 
Numbers basic a class
Numbers basic a classNumbers basic a class
Numbers basic a classDora Kouri
 

Viewers also liked (11)

Males & females grade 7
Males & females grade 7Males & females grade 7
Males & females grade 7
 
Ley no 1273
Ley no 1273Ley no 1273
Ley no 1273
 
O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...
O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...
O DIREITO HUMANO À ÁGUA NA AMÉRICA DO SUL – UMA PERSPECTIVA CONSTITUCIONAL DO...
 
5. index prestasi semester 1 - 4
5. index prestasi semester 1 - 45. index prestasi semester 1 - 4
5. index prestasi semester 1 - 4
 
Christopher_Reder_2016
Christopher_Reder_2016Christopher_Reder_2016
Christopher_Reder_2016
 
Writing for web class2
Writing for web class2Writing for web class2
Writing for web class2
 
2015. november - A Hónap Webáruháza: Mybeautytools.hu
2015. november - A Hónap Webáruháza: Mybeautytools.hu2015. november - A Hónap Webáruháza: Mybeautytools.hu
2015. november - A Hónap Webáruháza: Mybeautytools.hu
 
2016. július - A Hónap Webáruháza: Yolkiest.com
2016. július - A Hónap Webáruháza: Yolkiest.com2016. július - A Hónap Webáruháza: Yolkiest.com
2016. július - A Hónap Webáruháza: Yolkiest.com
 
2016. február - A Hónap Webáruháza: GEOTREK
2016. február - A Hónap Webáruháza: GEOTREK2016. február - A Hónap Webáruháza: GEOTREK
2016. február - A Hónap Webáruháza: GEOTREK
 
Hot Spot Columbia
Hot Spot ColumbiaHot Spot Columbia
Hot Spot Columbia
 
Numbers basic a class
Numbers basic a classNumbers basic a class
Numbers basic a class
 

Similar to The Essential BYOD Handbook

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Gen Re
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilitySanjay Abraham
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)HCL Technologies
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperAbhishek Sood
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Micosoft PEST, SWOT
Micosoft PEST, SWOTMicosoft PEST, SWOT
Micosoft PEST, SWOTmortress
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docxssuserf9c51d
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docxmattinsonjanel
 

Similar to The Essential BYOD Handbook (20)

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
BYOD
BYODBYOD
BYOD
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise Mobility
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
The CIO Handbook
The CIO HandbookThe CIO Handbook
The CIO Handbook
 
HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Micosoft PEST, SWOT
Micosoft PEST, SWOTMicosoft PEST, SWOT
Micosoft PEST, SWOT
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 

More from Barcoding, Inc.

Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...Barcoding, Inc.
 
Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Barcoding, Inc.
 
Winning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven DesignWinning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven DesignBarcoding, Inc.
 
Driver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the RoadDriver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the RoadBarcoding, Inc.
 
Post Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development PlatformsPost Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development PlatformsBarcoding, Inc.
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsBarcoding, Inc.
 
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...Barcoding, Inc.
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
Continuous Improvement Program Workshop
Continuous Improvement Program WorkshopContinuous Improvement Program Workshop
Continuous Improvement Program WorkshopBarcoding, Inc.
 
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...Barcoding, Inc.
 
Automating Transportation and Logistics
Automating Transportation and LogisticsAutomating Transportation and Logistics
Automating Transportation and LogisticsBarcoding, Inc.
 
Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing Barcoding, Inc.
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!Barcoding, Inc.
 
Improving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile TechnologyImproving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile TechnologyBarcoding, Inc.
 
Automated Data Capture in Distribution
Automated Data Capture in Distribution Automated Data Capture in Distribution
Automated Data Capture in Distribution Barcoding, Inc.
 
5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability 5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability Barcoding, Inc.
 
How to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID TechnologyHow to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID TechnologyBarcoding, Inc.
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Barcoding, Inc.
 

More from Barcoding, Inc. (20)

Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
Keynote Session: A Crooked Yardstick—a Better Way to Measure Winning and Mana...
 
Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10
 
Winning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven DesignWinning Experiences: Delivering Better Solutions through Outcome-Driven Design
Winning Experiences: Delivering Better Solutions through Outcome-Driven Design
 
Driver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the RoadDriver Productivity: Where the Rubber Meets the Road
Driver Productivity: Where the Rubber Meets the Road
 
Post Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development PlatformsPost Windows Mobile: New Application Development Platforms
Post Windows Mobile: New Application Development Platforms
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
 
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
The IoT Advantage
The IoT AdvantageThe IoT Advantage
The IoT Advantage
 
Continuous Improvement Program Workshop
Continuous Improvement Program WorkshopContinuous Improvement Program Workshop
Continuous Improvement Program Workshop
 
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
CFO Perspective: Best Practices for Technology Deployment, Adoption and Reten...
 
Automating Transportation and Logistics
Automating Transportation and LogisticsAutomating Transportation and Logistics
Automating Transportation and Logistics
 
Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!
 
Improving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile TechnologyImproving Patient Care and Safety with Mobile Technology
Improving Patient Care and Safety with Mobile Technology
 
Automated Data Capture in Distribution
Automated Data Capture in Distribution Automated Data Capture in Distribution
Automated Data Capture in Distribution
 
It's Not Just a Label
It's Not Just a LabelIt's Not Just a Label
It's Not Just a Label
 
5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability 5 Biggest Mistakes in Food Traceability
5 Biggest Mistakes in Food Traceability
 
How to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID TechnologyHow to Evaluate and Implement RFID Technology
How to Evaluate and Implement RFID Technology
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

The Essential BYOD Handbook

  • 1. The Essential BYOD Handbook Effectively Supporting and Managing All ofYour Mobile Devices (BYOD = BringYour Own Device)
  • 2. Jody Costa joined Barcoding, Inc. as Director of Marketing in 2010. With over 10 years of experience in writing, marketing, and publishing, Costa is responsible for all strategic and tactical aspects of the marketing program. Editor Jody Costa Barcoding, Inc. is a national systems integrator, specializing in the development, deployment, and management of supply chain and mobility systems based on automated data capture and wireless technology. www.barcoding.com.
  • 3. Chapter 1: Challenges in the Mobile Landscape Chapter 2: Consumer vs. Enterprise Chapter 3:The Era of BYOD and ILD Chapter 4: Supporting BYOD Effectively “We Can Help” andVideo Link. Sources and Additional Reading TABLE OF CONTENTS
  • 4. What isYour OS? One of the biggest challenges facing companies (and IT departments in specific) is the complex landscape of mobile operating systems (OS). What used to be reliably either Windows or Blackberry has become a bevy of possibilities, each with its own pros and cons. CHAPTER 1: Challenges in the Mobile Landscape // Page 1 Source: Motorola Solutions
  • 5. Mobile patent suits between mobile device and component manufacturers further complicate the situation. How will these get resolved?What do these licensing situations mean for your company’s IT assets? THE ESSENTIAL BYOD HANDBOOK // Page 2 Source: Motorola Solutions
  • 6. Expectations of the IT department have radically changed with the exploding popularity of Apple products like the iPhone and iPad.These personal devices are now so ubiquitous that many employees expect to use them for company business, at all hours of the day. It is assumed (whether right or wrong) that IT will support these devices – whether by accessing the company network/email or by downloading documents and applications. THE ESSENTIAL BYOD HANDBOOK I expect my iPhone/iPad to work within the company environment. I expect IT to support my personal devices.” // Page 3
  • 7. “Gartner … observes that, even by 2014, 60% of Fortune 1000 companies will have failed to put a comprehensive mobile strategy in place – leading to considerable overspending.”2 Fragmentation – so many devices and operating systems in the current business ecosystem – is a persistent and pernicious problem for IT departments. The importance of an end-to- end mobile management solution cannot be overstated. One of the biggest challenges in the new mobile landscape is finding a way to holistically manage current levels of devices, software, and data while also ensuring the ability to scale and grow as technology develops. THE ESSENTIAL BYOD HANDBOOK Source: “Put an Integrated Mobile Strategy in Place, or Face Increased Costs Later,” Gartner, July 6, 2010, ID: G00201262. // Page 4
  • 8. In talking about the changing mobile landscape, it’s important to distinguish between consumer-based devices and purpose-built enterprise devices. What are the core differences in cost, security, and support? CHAPTER 2: Consumer vs. Enterprise // Page 5
  • 9. THE ESSENTIAL BYOD HANDBOOK // Page 9 Consumer Focus • Driven by fashion, style, surprise, and innovation • TCO is irrelevant, price defined by social factors • Focus on user empowerment & satisfaction • Balanced visceral, functional, and reflective value • Integrates with whatever the users want/need • Security, control, management are irrelevant Enterprise Focus • Manageability, security, and control are critical • Understands & acts on CIO/Enterprise needs • Integrates with/supports enterprise skills & technologies • Predictability & road maps for planning • Focus on functional value Source: Gartner, Motorola Solutions While device selection is critical, BYOD takes it out of the hands of IT … If consumer devices aren’t built for the enterprise, how will you handle security and control when they access your data?
  • 10. CHAPTER 3: The Era of BYOD and ILD With Apple’s explosion in the market, employees are asking to use their own devices (bought with their own money) for business uses.The “Era of BYOD and Individual-Liable Devices (ILD)” is here to stay – and if you don’t have a strategy to deal with it right NOW, you are at great risk. // Page 6
  • 11. THE ESSENTIAL BYOD HANDBOOK What is this new era? Co-existence and “confluence” – meaning a blend of style and utility for deices, the evolution of HTML5, and a consolidation and maturation of UI, OS, MDM, etc. This “sharing” atmosphere puts tremendous pressure on IT departments just to keep up with all the changes. // Page 7 Source: Motorola Solutions
  • 12. THE ESSENTIAL BYOD HANDBOOK // Page 8 Source: Motorola Solutions What defines ILD – Individual Liable Devices  Consumer grade devices in the workspace  The choice of “personal experience” over “work experience”  Openness for cloud and personal applications and functions but constrains with corporate email,VPN access, etc. Challenges with ILD  Establishing ILD “Dual Persona”  Dealing with sandboxed domains  Handling hypervisors/ virtualization  Enabling selective wipes  Utilizing mobile device management
  • 13. If you don’t have a current strategy for BYOD, you are behind. Here is a step-by-step approach for you to follow to make certain your company has a flexible, scalable, and effective strategy in place. Start by conducting a device audit. Find out what you currently have in order to shape overall BYOD policy. What features are important to employees and/or to the company? Identify and work through gaps. CHAPTER 4: Supporting BYOD Effectively // Page 9
  • 14. Your guidelines/baselines should establish rules like: • What is your privacy policy? Who owns the data now or if it’s destroyed? • What requirements are enforceable for BYODs to enter the enterprise? (i.e., can they check email, download docs, etc.) • What types of BYOD devices are allowed? (i.e., Android,Apple?) • Are all departments involved? BYOD affects the entire organization. Establish goals of executives, HR, IT, etc. to create a truly effective policy. THE ESSENTIAL BYOD HANDBOOK Establishment of baselines is the number one step to take to effectively manage BYOD.” // Page 10
  • 15. EmployeeTermination should be a formal and written procedure and/or checklist process. Create awareness with vendors of the employee’s departure; record log-in information; have appropriate resources to check for malware or unauthorized access to company data; have the ability to wipe devices or to lock them down; etc.3 By formalizing your approach, you will ensure that critical details aren’t overlooked. THE ESSENTIAL BYOD HANDBOOK // Page 5 Get HR Involved. Don’t have a policy written yet? Check out this sample courtesy of ITManagerDaily.com // Page 11
  • 16. THE ESSENTIAL BYOD HANDBOOK // Page 12 Effective Software Support Key Challenge Built to last 4-5 years but are now faced with devices that update every 6 months Recommendations  Avoid thick clients that target one specific OS  Put money into maintenance and support (M&S) as well as research and development (R&D)  Utilize “Mobile Device Management” (MDM) to push updates  Explore web-based solutions such as HTML 5: that way, company information can be accessed from any device, anywhere
  • 17. Mobile Device Management (MDM) is Critical Without a MDM solution, you won’t be able to handle device lifecycles, security, applications and content, or diagnostics as your organization grows and as your network of workstations, rugged computers and terminals, and BYOD devices grows. Look for a solution with:  Centralized management console  Real-time support  Reactive and proactive management  Complete lifecycle management  Over-the-air configurability Key Benefit Push HW & SW updates remotely to devices in the field – no manual provisioning // Page 14 THE ESSENTIAL BYOD HANDBOOK
  • 18. THE ESSENTIAL BYOD HANDBOOK Final Items to Consider  IsYour Disaster Recovery Plan Relevant to BYOD?  AreYou Providing the Right Productivity and SharingTools so Employees Don’t Seek Rogue Applications?  AreYou Encouraging Regular Back-ups of Mobile Devices?  Is EffectiveTraining in Place to Support the Efforts of the ITTeam?  IsYour Data Secure Under the Policies You’ve Created? // Page 13 “BYOD, Social Media AmongTop Security Threats of 2013”
  • 19. If you need help on device selection, mobile device management, or more – contact Barcoding, Inc.We are a trusted advisor to more than 2,500 companies across the country. Good News! We can help… Watch Industry Experts Discuss BYOD Live!
  • 20. 1. http://www.eweek.com/c/a/Mobile-and- Wireless/Management-Orthodoxy-Challenged-by- iPad-iPhone-257619/ 2. http://www.sap.com/campaigns/2011_04_mobility/asse ts/Mobility- Its_Impact_Opportunities_and_Challenges.pdf 3. http://www.eweek.com/c/a/Security/BYOD-10-Tips- Enterprises-Can-Use-to-Protect-Their-Data-700259/ 4. http://www.channelpartnersonline.com/blogs/peertope er/2012/09/why-most-byod-managers-will-welcome- iphone-5.aspx 5. http://www.computerworld.com/s/article/9230476/Bes t_BYOD_management_Containment_is_your_friend 6. http://www.thevarguy.com/2012/09/10/byopc-byod-it- consumerization-dont-matter-in-the-cloud/ 7. http://www.eweek.com/it-management/byod-social- media-among-top-security-threats-of-2013/ 8. Motorola Solutions presentation by Bruce Willins (2012) 9. Barcoding, Inc. presentation by Martin Jack (2012) Sources and Additional Reading