Pulse 2013 - How to run a successful BYOD initiative

3,952 views

Published on

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,952
On SlideShare
0
From Embeds
0
Number of Embeds
551
Actions
Shares
0
Downloads
69
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Pulse 2013 - How to run a successful BYOD initiative

  1. 1. MME-1175How to run a successful”Bring Your Own DeviceInitiative”Chris Pepin, IBM Mobile Enterprise Executive @chrispepin cpepin@us.ibm.com © 2013 IBM Corporation
  2. 2. Agenda What is Bring Your Own Device? What are the risks and how can they be mitigated? Successful BYOD deployments 1
  3. 3. What is “Bring Your Own Device” or BYOD?The use of personally owned devices, includingsmartphones, tablets and laptops for business purposes 2
  4. 4. BYOD today and predictions for the future  30% of enterprises embrace BYOD  15% block it  8% ignore it In the next three years  60% of enterprises will embrace BYOD  3% block it  0% ignore itSource: Gartner 3
  5. 5. BYOD benefits Attract and retain top talent Increased employee productivity Increased employee responsiveness Increased flexibility and work-life balance 4
  6. 6. BYOD myths Passing fad Can be stopped Cost-saving initiative Every device is supported Mobile devices can’t be secured 5
  7. 7. BYOD challenges 6
  8. 8. Four pronged approach to BYOD 7
  9. 9. Technology Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Enterprise Management (MEM) Data Loss Prevention Containerization Network access Anti-malware Mobile application platform 8
  10. 10. BYOD case study: IBM 435,000 employees worldwide; 50% mobile BYOD isn’t new at IBM and includes smartphone, IBMs BYOD program "really is about supporting tablets as well as laptops employees in the way they want to work. They will find the most appropriate tool to get their job done. I 120,000 employees want to make sure I can enable them to do that, but leveraging smartphones in a way that safeguards the integrity of our and tablets; 80,000 BYOD business.“ - IBM CIO Jeanette Horan 9
  11. 11. Successful BYOD deploymentsLarge retail and commercial Carolina HealthCare: Full North Americanbank with headquarters in spectrum of healthcare and transportation companyEurope wellness programs throughout North and South Need: BYOD for 6,000Need: BYOD for 16,000 bank Carolina. knowledge workersemployees (Domino email, leveraging Apple iOS, Googleweb) leveraging Apple iOS Need: Managed and secure Android and BlackBerry.and Google Android devices 38,000 PCs, smartphoneswith high security and tablets both company What: Managed mobilityrequirements and corporate owned services leveraging MobileIron and BlackBerryWhat: Managed mobility What: IBM Endpoint Enterprise Serverservices from IBM Global ManagerTechnology Servicesleveraging GoodTechnologies 10
  12. 12. Key messages No one size-fits-all mobile solutions Don’t try to boil the ocean – walk before you run Mobile technologies continues to evolve – be flexible and embrace change Reach out for help from mobile experts 11
  13. 13. Industry’s most comprehensive mobile portfolio The Broadest The Deepest New Industry Portfolio of Set of Partnerships Mobile Services and Solutions Expertise Resources for Developers 12
  14. 14. Questions? Chris Pepin Mobile Enterprise Executive IBM Global Technology Services cpepin@us.ibm.com @chrispepin 13
  15. 15. Acknowledgements and Disclaimers:Availability. References in this presentation to IBM products, programs, or services do not imply that they will be available in allcountries in which IBM operates.The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They areprovided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance oradvice to any participant. While efforts were made to verify the completeness and accuracy of the information contained in thispresentation, it is provided AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damagesarising out of the use of, or otherwise related to, this presentation or any other materials. Nothing contained in this presentation isintended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or alteringthe terms and conditions of the applicable license agreement governing the use of IBM software.All customer examples described are presented as illustrations of how those customers have used IBM products and the results theymay have achieved. Actual environmental costs and performance characteristics may vary by customer. Nothing contained in thesematerials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specificsales, revenue growth or other results.© Copyright IBM Corporation 2013. All rights reserved.  U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.IBM, the IBM logo, ibm.com, Tivoli, and Lotus, are trademarks or registered trademarks of International Business MachinesCorporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their firstoccurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarksowned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks inother countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” atwww.ibm.com/legal/copytrade.shtmlOther company, product, or service names may be trademarks or service marks of others. 14

×