SlideShare a Scribd company logo
Bring Your Own Device
Quick Facts



About Us           Approach            Partnerships
• 20th Year        • Vendor Agnostic   •   Microsoft Gold
• Grand Rapids &   • Non-reseller      •   VMware Enterprise
  Royal Oak        • Professional      •   Cisco Premier
• 25 Staff           Services Only     •   Novell Platinum
                                       •   Citrix Silver
Expertise
Project Management     Infrastructure




Collaboration          Access & Identity Management
Agenda

• Why the move to personal devices?
• How and what technologies are involved?
• Advantages and disadvantages of
  personal devices
• Managing personal devices
• 4 different corporate policies
• What’s next
Sign of the Times

• 1995 – Employee Car



• 2005 – Employee Cell Phone



• 2015 – Employee Computer
Why The Move To Employee
           Owned Devices?

•   Cost savings
•   Convenience
•   Already in service
•   Cost savings
•   Increased employee satisfaction
•   Increased employee productivity (WAH)
•   Cost savings
Industry Analysis

• Gartner projects a 9-40% savings
  using employee PCs
• 1 in 10 use personal computers for
  primary work device today
• 50% use personal computers for
  work at some time
• 43% of companies have a written
  policy, with specific rules
What Technologies Are
     Typically Involved in BYOD?
•   Robust remote access systems
•   U3 boot devices
•   Corporate image on employee device
•   Remote session environments
•   “Mobile” access technologies
•   Virtual desktop environment
Robust Remote Access Control

•   Firewall(s)
•   Intrusion detection
•   Encrypted communications
•   Remote proxy servers
•   Two factor authentication
•   Load balanced / Fault
    tolerant internet
    connections
U3 Boot Device

• U3 boot devices
• Boot employee laptop from USB Flashdisk
• Run operating system and applications
  from flash drive
• Store data on U3 device
Corporate Image on
          Employee Owned Device
• Create corporate standard
  image
• Install directly to EOD
• Install in virtual session on
  EOD
• Time-Bomb the image or
  remove during offboarding
Citrix Remote Desktop Sessions

• Proven technology – 15+
  years
• Used successfully on
  thousands of applications
• Understood by most IT
  groups
• Strong support network
• Best if used with application
  virtualization
Mobile Access Technologies

• Cell phone

• Smartphone

• Netbook

• IPad / APad
Virtual Desktop Infrastructure

• Remote control of virtual desktop
• Robust internal data center infrastructure
• Variety or remote access devices
• Integrates into your existing desktop
  strategy
• Improves security
Virtual Desktop Benefits

• Longer life of endpoint devices
• Centralized administration
• Improved security
• All data stored in datacenter
• Speed of deployment
• Single image – hardware
  independence
• Better hardware utilization
• Higher availability
• Endpoint device is irrelevant!!
IT Management
Virtualization Expectations




                    2008 IDC Report
Physical vs. Virtual
Cost                                    Physical             Virtual
                                        Desktop              Desktop
Client hardware                         $400                 $300
Server hardware                         -                    $250
Virtual desktop solution                -                    $220
PC deployment costs                     $185                 $25
Operations: Support, software           $600                 $392
deployment, backup, security, virus
protection
End-user operations: Training, self-    $2215                $704
support
Annual downtime cost                    $90                  $30
TOTAL                                   $3490                $1921
 Gartner TCO Comparison of Corporate Owned PCs with Server-Based Computing
Virtual Desktop Components

• Virtualization platform
   – Highly available, resource load
     balancing
• Connection Broker
• Hosted desktop
• Application
  deployment
  process/solution
• Endpoint
   – Desktop, laptop,
     thin client, employee
     owned device
Possible Drawbacks

• Large initial investment
  –   Servers for virtualization infrastructure
  –   FC or iSCSI SAN for shared storage
  –   Network infrastructure
  –   Cost benefit analysis
• IT training / expertise
• Reliance on network connectivity
• End-user experience
Key Players

• VMware
  – View
  – Virtual Infrastructure / vSphere
• Citrix Systems
  – XenDesktop
  – XenApp (Presentation Server)
  – XenServer
• Microsoft
  – Remote Desktop Services (Terminal Services)
  – Hyper-V
  – Windows Server and workstation operating
    systems
Disadvantages of Employee
               Owned Devices
• Commingled data
• Security, higher risk for infection
• Theft or loss of company data
• Incompatibility… OpenOffice on a
  Mac?
• Employee equipment damages
  corporate assets
• Higher support costs without
  proper policies
BYOD Policies

      • Policy # 1 – We Take On All Comers
                         “We struggle with this one - most of our equipment
                         is donated, and some of it is employee owned.
                         I state that personal equipment is be allowed, but
                         it first has to be turned over to IT for a complete
                         reload and AV install, etc, and will be a monitored
                         computer as long as you wish for it to be used
TCTexas
                         here. When you depart or wish to have it removed,
                         IT will reload it with your software if you wish, or
                         simply erase “


http://community.spiceworks.com/topic/107246
BYOD Policies

      • Policy # 2 – Live & Let Live
                         “The equipment policy basically says that the
                         company is not responsible for damage to anything
                         not owned by the company, and that the user is
                         responsible for anything damaged by their
                         personal equipment, as determined by IT.
                         When they see that, most of them decide it's not
TheReal_Joe
                         worth the risk. Or they don't care, and sign it
                         anyway.



http://community.spiceworks.com/topic/107246
BYOD Policies

      • Policy # 3 – Father Knows Best

                        “If they really need something
                        specifically the company buys it for
                        them. If there is no business case for
                        the company to purchase it they
   Sosipaterl
                        don't get it.”




http://community.spiceworks.com/topic/107246
BYOD Policies

      • Policy # 4 – Acthung! We Are in Charge

                       “Simple, the employee can bring in
                       products they buy, but the second
                       they hook them up they belong to IT.
                       Problem solved. This goes double for
   Noitall             netbooks, ipads, etc.”




http://community.spiceworks.com/topic/10 7246
How Do I Get Ready?

• Employee purchase plan / policy
• Corporate insurance
• Select one or more technology
  options
• Written corporate support policy
• Confirm your software licensing
  rights
Case Study - Citrix

Here are the basics:

•   Workers apply to their managers, who decide whether they're a good
    choice for the program. About 10 percent of Citrix's work force
    participates.
•   The company gives workers $2,100 to buy a machine, based on the
    company’s calculations of its total cost of ownership of the devices.
•   Employees are required to install antivirus software that the company
    provides.
•   They are required to buy a service contract with an outside provider
    (Geek Squad, Dell, etc.) Citrix provides application support, but not
    device support.
•   They must connect through Citrix’s SSL VPN, Secure Access
    Gateway. It uses XenApp for application delivery and XenDesktop to
    create the corporate image on those machines.
Case Study - Citrix

•   Company saved 15-20% on TCO
•   > 50% spent more than stipend
•   < 25% kept corporate desktops
•   41% chose Mac OS-X
What is Next?

• IT Business Edge Article
  – http://www.itbusinessedge.com/cm/blogs/all/e
    mployee-owned-laptops-is-more-control-worth-
    added-cost/?cs=10394
• Gartner Article
  – http://www.gartner.com/it/page.jsp?id=696007
Thank You

Royal Oak                                  Grand Rapids
306 S. Washington Ave.                     15 Ionia SW
Suite 212                                  Suite 270
Royal Oak, MI 48067                        Grand Rapids, MI 49503
p: (248) 546-1800                          p: (616) 776-1600




                www.cdh.com
                  (c) C/D/H 2007. All rights reserved

More Related Content

What's hot

Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptxChrisaldyChandra
 
Modern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure ADModern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure ADFabian Niesen
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt Babasab Patil
 
5 modern desktop - windows autopilot
5   modern desktop - windows autopilot5   modern desktop - windows autopilot
5 modern desktop - windows autopilotAndrew Bettany
 
End to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via IntuneEnd to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via IntuneAnoop Nair
 
Reference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignReference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignDataWorks Summit
 
Get started with Windows AutoPilot Deployment
Get started  with Windows AutoPilot DeploymentGet started  with Windows AutoPilot Deployment
Get started with Windows AutoPilot DeploymentMicrosoft
 
A cheapskate's guide to Azure - Øredev 2022
A cheapskate's guide to Azure - Øredev 2022A cheapskate's guide to Azure - Øredev 2022
A cheapskate's guide to Azure - Øredev 2022Karl Syvert Løland
 
Introduction to mobile technology
Introduction to mobile technologyIntroduction to mobile technology
Introduction to mobile technologyGautam Krishnan
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud ServicesDavid J Rosenthal
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud ArchitectureDerek Keats
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 releaseDavid J Rosenthal
 

What's hot (20)

Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Modern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure ADModern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure AD
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
 
5 modern desktop - windows autopilot
5   modern desktop - windows autopilot5   modern desktop - windows autopilot
5 modern desktop - windows autopilot
 
Introduction of microsoft azure
Introduction of microsoft azureIntroduction of microsoft azure
Introduction of microsoft azure
 
End to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via IntuneEnd to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via Intune
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Reference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignReference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network Design
 
Get started with Windows AutoPilot Deployment
Get started  with Windows AutoPilot DeploymentGet started  with Windows AutoPilot Deployment
Get started with Windows AutoPilot Deployment
 
A cheapskate's guide to Azure - Øredev 2022
A cheapskate's guide to Azure - Øredev 2022A cheapskate's guide to Azure - Øredev 2022
A cheapskate's guide to Azure - Øredev 2022
 
Introduction to mobile technology
Introduction to mobile technologyIntroduction to mobile technology
Introduction to mobile technology
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud Architecture
 
Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 

Viewers also liked

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Design Didattico
 
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...KiwiSi
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013Clever Consulting
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Clever Consulting
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliaripaolarduini
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYODSwitchup srl
 
BYOD parent presentation 2015
BYOD parent presentation 2015BYOD parent presentation 2015
BYOD parent presentation 2015SunnyhillsSchool
 
2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontro2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontroPierfranco Ravotto
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 

Viewers also liked (20)

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD
BYODBYOD
BYOD
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.
 
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
VMworld 2010 - Building an Affordable vSphere Environment for a Lab or Small ...
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYOD
 
BYOD parent presentation 2015
BYOD parent presentation 2015BYOD parent presentation 2015
BYOD parent presentation 2015
 
2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontro2015 abba ballini_secondoincontro
2015 abba ballini_secondoincontro
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
BYOD
BYODBYOD
BYOD
 

Similar to Bring your own device

Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterpriseGabriella Davis
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10
 
fmb_cloud_computing.pptx
fmb_cloud_computing.pptxfmb_cloud_computing.pptx
fmb_cloud_computing.pptxMrArrow3
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftUni Systems S.M.S.A.
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211hdmchughgmailcom
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationSylCotter
 

Similar to Bring your own device (20)

Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
fmb_cloud_computing.pptx
fmb_cloud_computing.pptxfmb_cloud_computing.pptx
fmb_cloud_computing.pptx
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
E crm m sc - warwick uni - crm solutions
E crm m sc - warwick uni - crm solutionsE crm m sc - warwick uni - crm solutions
E crm m sc - warwick uni - crm solutions
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
Lecture 6 cloud
Lecture 6   cloudLecture 6   cloud
Lecture 6 cloud
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 

More from C/D/H Technology Consultants

More from C/D/H Technology Consultants (20)

6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
No Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 MigrationNo Data Left BehindA A SharePoint 2013 Migration
No Data Left BehindA A SharePoint 2013 Migration
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
Google for education vs office 365
Google for education vs office 365Google for education vs office 365
Google for education vs office 365
 
C/D/H 1990-2015
C/D/H 1990-2015C/D/H 1990-2015
C/D/H 1990-2015
 
SharePoint for Government
SharePoint for GovernmentSharePoint for Government
SharePoint for Government
 
Lean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft AzureLean Mobile Solutions with Microsoft Azure
Lean Mobile Solutions with Microsoft Azure
 
SharePoint site admins leverage search
SharePoint site admins leverage searchSharePoint site admins leverage search
SharePoint site admins leverage search
 
Real world records management in SharePoint 2013
Real world records management in SharePoint 2013Real world records management in SharePoint 2013
Real world records management in SharePoint 2013
 
Real world records management in share point 2013
Real world records management in share point 2013Real world records management in share point 2013
Real world records management in share point 2013
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Microsoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentationMicrosoft SharePoint Cloud presentation
Microsoft SharePoint Cloud presentation
 
Office 365 branding webinar
Office 365 branding webinarOffice 365 branding webinar
Office 365 branding webinar
 
Have It Your Way! SharePoint Customizations
Have It Your Way! SharePoint CustomizationsHave It Your Way! SharePoint Customizations
Have It Your Way! SharePoint Customizations
 
C/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy StepsC/D/H: Excel to Project in 5 Easy Steps
C/D/H: Excel to Project in 5 Easy Steps
 
Real world rm in share point 2013
Real world rm in share point 2013Real world rm in share point 2013
Real world rm in share point 2013
 
Lync seminar preso all content
Lync seminar preso all contentLync seminar preso all content
Lync seminar preso all content
 
Office 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the CloudOffice 365: How to Get a Foothold in the Cloud
Office 365: How to Get a Foothold in the Cloud
 
Epm seminar presentation
Epm seminar presentationEpm seminar presentation
Epm seminar presentation
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Bring your own device

  • 1. Bring Your Own Device
  • 2. Quick Facts About Us Approach Partnerships • 20th Year • Vendor Agnostic • Microsoft Gold • Grand Rapids & • Non-reseller • VMware Enterprise Royal Oak • Professional • Cisco Premier • 25 Staff Services Only • Novell Platinum • Citrix Silver
  • 3. Expertise Project Management Infrastructure Collaboration Access & Identity Management
  • 4. Agenda • Why the move to personal devices? • How and what technologies are involved? • Advantages and disadvantages of personal devices • Managing personal devices • 4 different corporate policies • What’s next
  • 5. Sign of the Times • 1995 – Employee Car • 2005 – Employee Cell Phone • 2015 – Employee Computer
  • 6. Why The Move To Employee Owned Devices? • Cost savings • Convenience • Already in service • Cost savings • Increased employee satisfaction • Increased employee productivity (WAH) • Cost savings
  • 7. Industry Analysis • Gartner projects a 9-40% savings using employee PCs • 1 in 10 use personal computers for primary work device today • 50% use personal computers for work at some time • 43% of companies have a written policy, with specific rules
  • 8. What Technologies Are Typically Involved in BYOD? • Robust remote access systems • U3 boot devices • Corporate image on employee device • Remote session environments • “Mobile” access technologies • Virtual desktop environment
  • 9. Robust Remote Access Control • Firewall(s) • Intrusion detection • Encrypted communications • Remote proxy servers • Two factor authentication • Load balanced / Fault tolerant internet connections
  • 10. U3 Boot Device • U3 boot devices • Boot employee laptop from USB Flashdisk • Run operating system and applications from flash drive • Store data on U3 device
  • 11. Corporate Image on Employee Owned Device • Create corporate standard image • Install directly to EOD • Install in virtual session on EOD • Time-Bomb the image or remove during offboarding
  • 12. Citrix Remote Desktop Sessions • Proven technology – 15+ years • Used successfully on thousands of applications • Understood by most IT groups • Strong support network • Best if used with application virtualization
  • 13. Mobile Access Technologies • Cell phone • Smartphone • Netbook • IPad / APad
  • 14. Virtual Desktop Infrastructure • Remote control of virtual desktop • Robust internal data center infrastructure • Variety or remote access devices • Integrates into your existing desktop strategy • Improves security
  • 15. Virtual Desktop Benefits • Longer life of endpoint devices • Centralized administration • Improved security • All data stored in datacenter • Speed of deployment • Single image – hardware independence • Better hardware utilization • Higher availability • Endpoint device is irrelevant!!
  • 17. Physical vs. Virtual Cost Physical Virtual Desktop Desktop Client hardware $400 $300 Server hardware - $250 Virtual desktop solution - $220 PC deployment costs $185 $25 Operations: Support, software $600 $392 deployment, backup, security, virus protection End-user operations: Training, self- $2215 $704 support Annual downtime cost $90 $30 TOTAL $3490 $1921 Gartner TCO Comparison of Corporate Owned PCs with Server-Based Computing
  • 18. Virtual Desktop Components • Virtualization platform – Highly available, resource load balancing • Connection Broker • Hosted desktop • Application deployment process/solution • Endpoint – Desktop, laptop, thin client, employee owned device
  • 19. Possible Drawbacks • Large initial investment – Servers for virtualization infrastructure – FC or iSCSI SAN for shared storage – Network infrastructure – Cost benefit analysis • IT training / expertise • Reliance on network connectivity • End-user experience
  • 20. Key Players • VMware – View – Virtual Infrastructure / vSphere • Citrix Systems – XenDesktop – XenApp (Presentation Server) – XenServer • Microsoft – Remote Desktop Services (Terminal Services) – Hyper-V – Windows Server and workstation operating systems
  • 21. Disadvantages of Employee Owned Devices • Commingled data • Security, higher risk for infection • Theft or loss of company data • Incompatibility… OpenOffice on a Mac? • Employee equipment damages corporate assets • Higher support costs without proper policies
  • 22. BYOD Policies • Policy # 1 – We Take On All Comers “We struggle with this one - most of our equipment is donated, and some of it is employee owned. I state that personal equipment is be allowed, but it first has to be turned over to IT for a complete reload and AV install, etc, and will be a monitored computer as long as you wish for it to be used TCTexas here. When you depart or wish to have it removed, IT will reload it with your software if you wish, or simply erase “ http://community.spiceworks.com/topic/107246
  • 23. BYOD Policies • Policy # 2 – Live & Let Live “The equipment policy basically says that the company is not responsible for damage to anything not owned by the company, and that the user is responsible for anything damaged by their personal equipment, as determined by IT. When they see that, most of them decide it's not TheReal_Joe worth the risk. Or they don't care, and sign it anyway. http://community.spiceworks.com/topic/107246
  • 24. BYOD Policies • Policy # 3 – Father Knows Best “If they really need something specifically the company buys it for them. If there is no business case for the company to purchase it they Sosipaterl don't get it.” http://community.spiceworks.com/topic/107246
  • 25. BYOD Policies • Policy # 4 – Acthung! We Are in Charge “Simple, the employee can bring in products they buy, but the second they hook them up they belong to IT. Problem solved. This goes double for Noitall netbooks, ipads, etc.” http://community.spiceworks.com/topic/10 7246
  • 26. How Do I Get Ready? • Employee purchase plan / policy • Corporate insurance • Select one or more technology options • Written corporate support policy • Confirm your software licensing rights
  • 27. Case Study - Citrix Here are the basics: • Workers apply to their managers, who decide whether they're a good choice for the program. About 10 percent of Citrix's work force participates. • The company gives workers $2,100 to buy a machine, based on the company’s calculations of its total cost of ownership of the devices. • Employees are required to install antivirus software that the company provides. • They are required to buy a service contract with an outside provider (Geek Squad, Dell, etc.) Citrix provides application support, but not device support. • They must connect through Citrix’s SSL VPN, Secure Access Gateway. It uses XenApp for application delivery and XenDesktop to create the corporate image on those machines.
  • 28. Case Study - Citrix • Company saved 15-20% on TCO • > 50% spent more than stipend • < 25% kept corporate desktops • 41% chose Mac OS-X
  • 29. What is Next? • IT Business Edge Article – http://www.itbusinessedge.com/cm/blogs/all/e mployee-owned-laptops-is-more-control-worth- added-cost/?cs=10394 • Gartner Article – http://www.gartner.com/it/page.jsp?id=696007
  • 30. Thank You Royal Oak Grand Rapids 306 S. Washington Ave. 15 Ionia SW Suite 212 Suite 270 Royal Oak, MI 48067 Grand Rapids, MI 49503 p: (248) 546-1800 p: (616) 776-1600 www.cdh.com (c) C/D/H 2007. All rights reserved