Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Viability of bring your-own-computer BYOC programs


Published on

The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
By: Masaf Dawood

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Viability of bring your-own-computer BYOC programs

  1. 1. Viability ofBring -Your–Own- June 22 2011Computer (BYOC)Programs The confluence of powerful hand held devices, and a broadband network athome has created the desire for employees to expect the same level ofconnectedness in the enterprise space/workplace. Businesses are feeling thepressure to develop a hybrid support approach that also includes Gen Y and GenZ workers, who are technology savvy and would like to use these devices in the By: Masaf Dawoodworkplace. What is un-clear is how some of the programs aimed at integratingusers own devices will work with the existing IT/framework and this paperattempts to provide a balanced approach to analyze the problem and propose asolution.
  2. 2. Executive Summary According to J.P. Morgan analyst Mark Markowitz tablet revenues will riseThe wide spread consumerization of IT has created a demand to$24.9 billion in 2011 (up from $10.2 billion this year) and that they’ll hitfor personal devices to be connected to the corporate networks $34.1 billion in 2012. The iPad, whichand used in the workplace. This is on the heels of new will make up for 89.4 percent of tabletgeneration of workers who have grown up with the social media revenues this year, will still account for a significant portion of total tabletand are savvy with the usage of such tools/devices. Enterprises revenues in the next few years. Inrecognize this trend and, Bring-your-own-computer to the 2011, he predicts the iPad will account for 71.6 percent of tablet revenue,workplace “BYOC”, programs are being piloted to assess the and by 2012 it will still lead with 61.4viability of the concept and address any issues as a result. This percent.introduces management challenges in terms of divergentrequirements of corporate vs. employee owned devices. Theprogram requires a careful analysis and review of the targetenvironment and user demographics to tailor a specific programto meet the business needs.A carefully blended approach is needed, that manages thechanging demographics in the workplace with the plethora ofnew computing devices availability to address the data integrityand security needs. This research note addresses the issues,facing corporate IT departments in the process of implementingBYOC programs, and outlines an approach that could assess theviability of such programs. 2
  3. 3. An IDC study forecasts annual mobile app downloads to increase from 10.9What is Bring-Your-Own-Computer “BYOC” ? billion in 2010 to nearly 76.9 billion in 2014 as developers create apps for virtually every aspect of a mobileThe term Bring-Your-Own-Computer to work (BYOC) refers to the users personal and business lives. Inemployee owned computers connecting to the corporate addition to booming adoption ofnetworks. The devices are employee owned (purchased and smart phones around the world, newprovisioned) and employee is responsible for the device connected device categories including media tablets, eReaders, portablesubscription and associated services. The connectivity to the media players, consumer electronics,corporate network enables the employee to access application TVs, automobiles, and eventuallyand infrastructure resources on-demand, with the convenience even PCs will all contribute to the enormous growth of mobile apps.of a familiar and preferred user interface. The key differentiatorin usage of corporate vs. employee owned device is the user "Mobile app developers will appifypreference for the employee owned device. The employee just about every interaction you canaffinity for the device is driven in part by device interface and the think of in your physical and digital worlds. The extension of mobile appsbuilt-in eco systems of apps and services. to every aspect of our personal and business lives will be one of the hallmarks of the new decade with Desktops Laptops enormous opportunities for virtually every business sector.” BYOD Scott Ellison IDC - VP, Mobile and Devices Connected Consumer Platforms Tablets SmartPhonesWhile the desktops, and laptops has been around for over aquarter century the tablets and smart phones are relatively newarrivals, but they are growing steadily and swiftly. Laptopshipments eclipsed desktop shipments and now the mobiledevices are taking the enterprise and consumer world by astorm. See the mobile devices growth chart below from RBC capitalmarkets. 3
  4. 4. Demand Driver # 1 : The Appification of Board room and Family roomThe rapid rise of mobile computing power with the widespread and persistent availability of wirelessnetworks has influenced the computing habits of current and future employees alike. The “C” levelexecutives usually are technology agnostic, but have flocked to the ipad and other tablet devices forapplications such as email, mobile web /news, social networking and updating their corporate blogsamongst other things. The convenience, user-friendliness, and the penchant for the ever updating newsfeeds, social interactions etc that we like fits with the information age lifestyle and the mobile devicesprovide the medium with little or no effort/expense. The usage of the mobile computing devices athome and for leisure far exceeds the business usage – however the business uses and applications arecatching up. The connected consumer at home is fully conversant with the tools and technologies andconstantly is evaluating the tools, offerings and new services. The velocity of downloads has taken themost optimists by storm and apple apps store has crossed 5B downloads last year. This demonstratesthe enormous demand and an unsatisfying appetite for consuming more of these apps. The key driverfor productivity in the personal spaces and spilling over to the corporate space is the appification and orproliferation of mobile apps running on employee owned devices.Demand Driver # 2: Workplace or Workspace – what the heck is it…The acceptance of the remote worker or tele-worker in the workplace is a credentialed activity androutinely people work remotely to provide same services as they would do if they were on-site.Companies have resorted to shared cubicles, in this age of cost cutting to trim necessary overheadsincluding expensive downtown real estate. The benefits to employee are zero or no travel costs andmore productive time with the flexibility of their own schedule. Essentially workplace has changed toworkspace in terms of the ability to connect and perform the same productivity tasks as if on-site. This isalso enabled in part by the mobile devices and or laptops using traditional secured connection protocols.Benefits to the enterpriseThe benefits to an enterprise are a combination of “Soft” (motivational) and “Hard” ($ value) savingsthat will evolve over time as the implementation matures and scope increases to cover the entire set ofemployees (vs. subset). The immediate value realization may be in terms of employee satisfaction andempowerment that could lead to higher productivity in the workspace and foster innovation. Some ofthe potential IT service benefits are listed in the table below:Reduced Cost of IT Reduced IT support Flexibility Less Field Services equipment requirements(less tickets)Reduced Software Single/Consolidated Enterprise refresh Less On-site support License Costs Image set program savings Heterogeneous Innovation Reduced Depot services Employee Empowerment environment 4
  5. 5. What about IT folks…?The IT folks are concerned, nervous and unsure of the potential and the associated risk BYOC programscan bring in the enterprise. After all, the devices are owned by the employees and when the employeeconnects the device to corporate networks – is against the conventional IT wisdom and policies andprocedures. The employee may run the risk of data theft, corruption, loss and or other security policyviolations. It is turning upside down the traditional view of a corporate device. In the face of theseconcerns and un-resolved problems, the technology is being brokered downstream to IT with itssponsors in the boardroom and supporters in the cubicles. With the current devices we have today thathave USB and CDrom’s and are connected to the internet, the potential of downloads/uploads andpossibility of corruption/data loss exists. The biggest fear is around three areas - “lack of control”“service assurance”, as well “data privacy and security”. We manage and improve continuously toprovide a better, safer and robust IT environment. Historically connectivity is based on managing the riskassociated with these interactions using the standardization of the devices, operating systems, and toolsthat has led us to evolve to this level of collaboration. Now it seems we may be on cusp of the nextgeneration of productivity in the enterprise and employee owned/mobile devices may be acting as acatalyst to ignite this. The perceived and real risks needs to be managed by crafting a program to pilotthe BYOC program and stress testing the proposed approach as well learning from the pilot outcomes interms of key areas of concerns. However before the pilot is considered – we need to make sure there isa game plan for management of employee owned mobile devices.Do you have an MDM Strategy….The enterprise needs to have a Mobile Device Management Strategy that provides provisioning,configuration, security, policy management, and software distribution, for smart phones, tablets andother mobile devices. The underlying architecture should take into account the specific and uniqueneeds of the business in terms of regulatory, security and data privacy requirements. Some of the othercore capabilities that are required are remote wipe, device tracking, voice and data usage, support andtroubleshooting functions. The landscape of vendors is growing with some of the core capabilitiesmaturing in this space while the additional capabilities are being developed. The capabilities shouldinclude management layer for managing multiple mobile device operating systems to include ios,Windows, and Android.A risk managed approachIn order to test the viability and feasibility of BYOC program in an enterprise – a careful approach isneeded that manages the value against the potential deployment risk. Based on the demand at theenterprise level – the implementation team may develop a “Proof of Concept” strategy to stress test theviability of such a program. The selected employees should be voluntarily participating in the programand would generally be technology savvy and motivated to see this thru and live thru the growing pains.The focus should be on developing the required policies and procedures that facilitate the adoption ofBYOC devices into the workspace while providing the necessary checks and balances IT needs to managethe risk associated with the introduction of these devices. The service delivery model of such devicesshould also be tested and options evaluated during the course of the pilot program. 5
  6. 6. The following points highlight the key steps in implementing the proposed program:a) Identify the appropriate worker/employee to participate o Not all employees would be suitable or open to participation. o Identify the employee based on the request/need and profileb) Define the overall roadmap of BYOC program o Lay out the timeline for initial POC “Proof of concept” o Identify the pilot duration and business unit’s participation o Draft an enterprise wide program availability (subject to poc, pilot findings)c) Implement the MDM strategy o Security management o Policy management o Inventory management o Software distribution and service managementd) Define device requirements o 3 year support contract/24 hours loaner in case of breakdown o Antivirus (AV)update enabled o Partitioning Ability o Software distribution and service management capabilityd) Define service management model o Define the support model o Define the SLA’s o Solution for Self-Serve (shift left) o Define the roles and responsibilities (RACI)e) Findings o Update the processes and procedures based on the findings o Document lessons learned o Execute the next stepsConclusionThe viability of BYOC devices to work is a viable solution that holds the promise of greater collaborationand more enterprise productivity in the workspace. The continued proliferation of handheld devices willdrive the demand for integration with the corporate networks. Enterprises need to be ready for suchemployee requests and can get a head start if they pilot a program with specific objectives and criteriain mind. 6