SlideShare a Scribd company logo
1 of 30
3 Steps to Safe  Bring Your Own Devices (BYOD) September 28, 2011 Host and Moderator:  David Krebs, VDC Research Sponsors;
[object Object]
Panelist Introductions
BYOD market trends
Motorola Solutions
Cloudpath Networks
Bradford Networks
Question and Answers
Wrap up
Motorola XOOM and Apple iPad2 giveawayMust be present to win! Agenda
How many users are on your network?
How many different device types and OS do you expect to support?
How important is it to distinguish between corporate-owned and employee-owned devices?
What are your concerns about supporting BYOD?
[object Object]
Mobile workers demanding access to critical (corporate) information to enable real time distributed decision making and transaction processing.
Consumerization driving shift in balance of power from corporate IT to the employee/consumer.
Consequence is influx of personal devices and multiple OS platforms infiltrating enterprise environments.
Large amounts of sensitive corporate data is and will be accessed on these mobile devices.
With growing corporate support of personal devices critical to ensure key enterprise management and support policies that span the device lifecycle. BYOD : Key Takeaways
Enterprise Mobility Challenges and Opportunities Benefits &  Business Drivers Empower employees to be more productive  Improved customer service Fast, reliable wireless communications Improved decision making capabilities Mobilization of business processes and line of business applications Multiple platform support Security and device management concerns BYOD Application and platform fragmentation Lifecycle management Applications deployment and management Challenges PRIORITY RANKING
Over 50% of organizations provide some level of support for personal/individual devices Enterprises Introducing BYOD Policies Source: 2011 VDC Research survey of 864 mobile decision makers
Mobile & Wireless Solution Requirements Will Differ by Worker Type Mobile  Worker Preferred  Device Target  Applications Technical  Requirements Mobile Worker Population ,[object Object]
Dashboards
BI/CI
Mobile CRM
Approvals
Expense Reporting
Workflow Management
Mobile browser

More Related Content

What's hot

Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
Lai Yoong Seng
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
Lai Yoong Seng
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
olivier lussac
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 

What's hot (19)

MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
WWT Intelligent WAN Presentation
WWT Intelligent WAN PresentationWWT Intelligent WAN Presentation
WWT Intelligent WAN Presentation
 
Byod
ByodByod
Byod
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 

Viewers also liked

Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
Motorola Solutions
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Motorola Solutions
 

Viewers also liked (18)

Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
 
Herramientas para la creación de scorm
Herramientas para la creación de scormHerramientas para la creación de scorm
Herramientas para la creación de scorm
 
Power 3
Power 3Power 3
Power 3
 
Fixing up Your House to Sell - Session 2
Fixing up Your House to Sell - Session 2Fixing up Your House to Sell - Session 2
Fixing up Your House to Sell - Session 2
 
Manage the Complexity
Manage the ComplexityManage the Complexity
Manage the Complexity
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio Demo
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Acecourseinvestorsession1
Acecourseinvestorsession1Acecourseinvestorsession1
Acecourseinvestorsession1
 
acecoursefixinguptosell
acecoursefixinguptosellacecoursefixinguptosell
acecoursefixinguptosell
 
Websitebeta4
Websitebeta4Websitebeta4
Websitebeta4
 
CostvsValuewashingtondc
CostvsValuewashingtondcCostvsValuewashingtondc
CostvsValuewashingtondc
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova Scotia
 
RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITY
 
Pelatihan 5 s
Pelatihan 5 sPelatihan 5 s
Pelatihan 5 s
 
renovaterightbrochure
renovaterightbrochurerenovaterightbrochure
renovaterightbrochure
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer Cities
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 

Similar to 3 Steps to Safely Bringing Your Own Devices (BYOD)

View Slides
View SlidesView Slides
View Slides
Videoguy
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
jasonlan
 
Mobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile CommunicationMobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile Communication
Deepak Pareek
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 

Similar to 3 Steps to Safely Bringing Your Own Devices (BYOD) (20)

System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
View Slides
View SlidesView Slides
View Slides
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
Mobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile CommunicationMobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile Communication
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 

3 Steps to Safely Bringing Your Own Devices (BYOD)