Bring Your Own Device – Ifs, Buts and Mobiles
Richard Allgate – Mobile Services Specialist | 25 September 2013
• Introduction to InTechnology
• What is BYOD?
• The business drivers
• The employee drivers
• Is your business considering BYOD?
• So, you’re serious about implementing BYOD
• Implementing a BYOD policy?
• Mobile Device Management
• Summary
Webcast Overview
• Serving the UK IT market for nearly 30 years
• Unique position in the managed IT services market
• Full range of managed IT services delivered to over 800 UK businesses
Introduction to InTechnology
• Employees permitted to access corporate information using
personal devices
• Covers all mobiles devices – mobiles, tablets, smart phones
• Approximately 44% of employees use their own technology at work.
This figure is estimated to be higher in some countries
• More employers are turning to BYOD as they look to reduce costs at
the same time as increasing productivity
• Allows employees to use device of their choice
What is BYOD?
• Reducing cost while increasing productivity
• Improving business continuity
• Encouraging flexible working
• Keeping staff happy
• The desire to ‘consumerise IT’
Business Drivers
• No need for two devices
• No training needed
• Get to choose their own device, rather than being told to use a
specific ‘company device’
Employee Drivers
• Does your business have a mobile policy ?
• What are the financial implications of uninsured handsets ?
• How will you manage ‘personal contracts’ ?
• What support plan do you have in place for staff ?
• How will you keep up to date with the ever-changing array of
devices?
Is Your Business Considering BYOD?
• How safe is your data?
• What happens to client data when an employee leaves the company?
• What happens if a personal device is lost or stolen?
• Are you prepared for the endless OS/Software upgrades?
• How much do you know about the devices being used?
• How would you handle a data breach?
So, You’re Serious About BYOD?
• Limit the number and type of devices allowed
• Plan out your device security policy
- Screen locking
- Regular password changes
• Include employee exit plan as part of the BYOD policy
• Restrict which company applications are made available
• Plan your Mobile Device Management (MDM)…
Implementing Your BYOD Policy?
• Manage which devices see which applications
• Easier management of updates to devices
• Enabling mass-updates/installation of new applications
• Added protection for company data and applications should device
be lost/stolen or an employee leaves the company
– Locking devices to prevent access to data/applications
– Wiping devices to prevent unauthorised use of data
Mobile Device Management (MDM)
• If you are looking at a BYOD strategy, then ensure it is for the right
reasons
• When you deploy BYOD consider changing or updating your mobile
policy
• Try to keep it simple, and have measures in place to help prevent it
becoming too resource hungry
• Consider what data will be on the devices, and what if it was in the
wrong hands
• ABSOLUTELY deploy a MDM solution in tandem with BYOD
• Research the pros and cons of each MDM solution – try not to be
driven by price (as a breach could be much more expensive!)
Summary
Any Questions?
Thank You For Your Time
Email: contact@intechnology.com
Telephone: 0800 983 2522
Website: www.intechnology.com
Twitter: twitter.com/intechnology
Case Studies: www.intechnology.com/case-studies

Bring Your Own Device

  • 1.
    Bring Your OwnDevice – Ifs, Buts and Mobiles Richard Allgate – Mobile Services Specialist | 25 September 2013
  • 2.
    • Introduction toInTechnology • What is BYOD? • The business drivers • The employee drivers • Is your business considering BYOD? • So, you’re serious about implementing BYOD • Implementing a BYOD policy? • Mobile Device Management • Summary Webcast Overview
  • 3.
    • Serving theUK IT market for nearly 30 years • Unique position in the managed IT services market • Full range of managed IT services delivered to over 800 UK businesses Introduction to InTechnology
  • 4.
    • Employees permittedto access corporate information using personal devices • Covers all mobiles devices – mobiles, tablets, smart phones • Approximately 44% of employees use their own technology at work. This figure is estimated to be higher in some countries • More employers are turning to BYOD as they look to reduce costs at the same time as increasing productivity • Allows employees to use device of their choice What is BYOD?
  • 5.
    • Reducing costwhile increasing productivity • Improving business continuity • Encouraging flexible working • Keeping staff happy • The desire to ‘consumerise IT’ Business Drivers
  • 6.
    • No needfor two devices • No training needed • Get to choose their own device, rather than being told to use a specific ‘company device’ Employee Drivers
  • 7.
    • Does yourbusiness have a mobile policy ? • What are the financial implications of uninsured handsets ? • How will you manage ‘personal contracts’ ? • What support plan do you have in place for staff ? • How will you keep up to date with the ever-changing array of devices? Is Your Business Considering BYOD?
  • 8.
    • How safeis your data? • What happens to client data when an employee leaves the company? • What happens if a personal device is lost or stolen? • Are you prepared for the endless OS/Software upgrades? • How much do you know about the devices being used? • How would you handle a data breach? So, You’re Serious About BYOD?
  • 9.
    • Limit thenumber and type of devices allowed • Plan out your device security policy - Screen locking - Regular password changes • Include employee exit plan as part of the BYOD policy • Restrict which company applications are made available • Plan your Mobile Device Management (MDM)… Implementing Your BYOD Policy?
  • 10.
    • Manage whichdevices see which applications • Easier management of updates to devices • Enabling mass-updates/installation of new applications • Added protection for company data and applications should device be lost/stolen or an employee leaves the company – Locking devices to prevent access to data/applications – Wiping devices to prevent unauthorised use of data Mobile Device Management (MDM)
  • 11.
    • If youare looking at a BYOD strategy, then ensure it is for the right reasons • When you deploy BYOD consider changing or updating your mobile policy • Try to keep it simple, and have measures in place to help prevent it becoming too resource hungry • Consider what data will be on the devices, and what if it was in the wrong hands • ABSOLUTELY deploy a MDM solution in tandem with BYOD • Research the pros and cons of each MDM solution – try not to be driven by price (as a breach could be much more expensive!) Summary
  • 12.
    Any Questions? Thank YouFor Your Time Email: contact@intechnology.com Telephone: 0800 983 2522 Website: www.intechnology.com Twitter: twitter.com/intechnology Case Studies: www.intechnology.com/case-studies