SlideShare a Scribd company logo
Bring Your Own Device[ BYOD]
Implementation
Md Yousup Faruqu
IT
AGENDA
Background & Bring Your Own Device (BYOD) Overview
Implementation Roadmap And Approach
Costing And Budget
Analysis And Key Findings
Objectives Of BYOD
Recommendation
BYOD describes an end user computing strategy
supported by a set of policies and controls,
which in conjunction with a technical solution
provide a managed and secure
framework for employees to access corporate
data from their personal device whilst
providing the enterprise with a level of control
over both the device and the data it
can access.
AppleiPhone
Android
Mobile
Windows
Phone
AppleiPad
Android
Tablet
Blackberry
Playbook
Mobile Phone Tablet
Windows
Laptop
AppleMac
Hand Held Laptop
Mobile Device
Desktop
Device
BYOD
The BYOD policy must detail which
items are allowed and the controls
that will be applied.
When defining the scope of any BYOD
implementation consideration must
be given to which end user devices*
will be allowed.
Each device type has its own set of
risks and management issues.
 What devices will be subject to BYOD
 What over arching method of resource access will
be used for:
 Hand held devices
 Laptops
 How will the solution and end users be supported
 How will business units be charged for the service
Strategy
The business reasons for
adopting BYOD, for a
successful BYOD
implementation
Policy
Policy right protects the
business from the risks
associated with BYOD
 What devices makes and models will be allowed
 How will Antivirus be handled
 What actions does the company reserve the right
to carry out on an employees personal device
(e.g. remote wipe on loss)
 How will leavers be handled
 What access controls will be used (Certificate
based authentication, Pin Number lengths)
 Empower users to choose their own devices to
improve productivity, collaboration and mobility
 Protect sensitive information from loss and theft to
meet privacy, compliance and risk management
standards
 Reduce costs and simplify management through
self-service provisioning and automated management
and monitoring
 Simplify IT by deploying apps once for use on any
device
6
 On-demand delivery of data, apps and desktops to any device
– personal or business
 Transform corporate application as well as desktops into an
on-demand service available on device.
 A self-service app store providing unified access and single
sign-on to Windows, web and SaaS apps on any device, over
any network
 Secure file sync and sharing for any device
 Collaborative work platform with coworkers and clients
 A secure-by-design architecture including SSL VPN and
granular policy-based user authentication with tracking and
monitoring to support compliance and privacy.
Increased user mobility
Increased user satisfaction
Increase productivity*
Help retain top performers
Reduce capital costs
Helps to attract younger talent*
 Conduct baseline PoC to identify precise solutions to implement BYOD.
Citrix and VMware has been identified as a best solutions for ABC Inc
infrastructure.
 All tests done in PoC with CITRIX and VMware were successful.
 Use Citrix and VMware BYOD environment to publish or deliver Windows
XP, 7 virtual desktop and application to the selected end users devices:
 iOS device – iPhone, iPad
 Android device – Samsung Phone, Tablet
 Windows Phone – Nokia Lumia
9
Months
- Device & users selection
- Test report
- Provision desktop and
applications
Kick-Off
- Drawing up the RFP
- Publication
- Selection
- Assignment
Implementation
Dec. 2012 May,13 Jun,13
Project Management
RFP
Design &Analysis
- Optimized design
- Technical design
- BYOD Implementation plan
HW
Provisioning
Completion
Oct,13Feb,13
 Site Preparation, Product Delivery And Installation
 Equipment delivery
 Power preparation
 Network preparation
 H/W installation
 OS installation and configuration
 Host Integration (SAN integration)
 Install and configure hypervisor VMware ESX and Virtual Center
 Install and configure VMWare software and high availability
 Install and configure BYOD solution
 Provision virtual desktop and/or applications to the designated users
11
 Hardware Configuration (Total cost: $32k)
 2 physical server with 4X10-core (40) CPU and 196GB RAM
each, used for the host machines
 Software Configuration - Hypervisor (Total cost: $30k)
 VMware vSphere 5.o (8 CPU licenses. Each License covers 1
physical CPU) with 1 years warranty and support
 BYOD solution –Software, Licenses and support ($66k)
 BYOD solution software and licenses
 Storage (Total cost: $36k)
 3TB usable FC storage
13
 Identical physical servers are running at 20-35% utilization.
 With 30 servers consolidated on 3 ESX Server hosts, all the servers
will be operate at 60-80% utilization, resulting in a huge
improvement in server utilization as measured by average CPU and
memory usage.
 Uniform high availability across the entire virtualized IT
environment without the cost and complexity of failover solutions
tied to either operating systems or specific applications.
 The time is reduced for provisioning new servers to minutes. Before
virtualization, it took us 20-30 hours if we needed to prepare a new
system.
 Downtime and IT service disruptions will be minimize.
 E-mail
 HR Application
 ERP Systems
 File Servers [H & Z drive]
 Intranet Applications
Log On
Time
Last State
Change
Endpoint Name
Endpoint
Address
Endpoint
Hardware Id
Client
Version
Horizontal
Resolution
Vertical
Resolutio
n
9/9/12
11:48 AM
11/5/12
10:03 AM
WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768
11/5/12
7:42 AM
11/5/12
7:44 AM
xt45 172.71.237.15 421C1E03 320 480
11/6/12
8:50 AM
11/6/12
8:50 AM
WI_mitjsZpPOTw8J
oSBS
172.71.229.56 CE49DF52 768 1024
11/6/12
8:52 AM
11/6/12
8:53 AM
WI_m4ubYcezolIW
kWImB
172.71.103.49 363D7406 13.0.0.6685 1366 768
11/6/12
8:59 AM
11/6/12
9:00 AM
WI_tk6oktkdeMd19
jJeO
172.71.103.46 3FB64541 12.1.44.1 1280 800
User access report
Budget Head
Cost ($k)
Phase 1
Hardware
Server 32
Storage 36
Software
VMware ESX license 30
BYOD solutions and license 56
Professional Services
Implémentation service 10
Total 164
Costing & Budget
17
Most of the tests performed with CITRIX VDI in POC,
were successful.
We recommend deploy the solution in phased approach
and build the infrastructure gradually
The phase 1 implementation is planned to be done in
2013.
Meanwhile, we understood that there are many vendor
products available in the market, so we would be doing
the POC on VMware technology this year to determine
if there have been any development that more capable
in terms of reliability, and user experience compare to
CITRIX
Thank you!

More Related Content

What's hot

Decision Making and Information Systems
Decision Making and  Information SystemsDecision Making and  Information Systems
Decision Making and Information Systems
Ariful Saimon
 
Erp, crm and scm concept
Erp, crm and scm conceptErp, crm and scm concept
Erp, crm and scm concept
Fadly Gaulan
 
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging TechnologiesIT Infrastructure and Emerging Technologies
IT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT InftractructureIT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT Inftractructure
Mahmoud Al ahmad
 
Introduction of information technology to managers
Introduction of information technology to managersIntroduction of information technology to managers
Introduction of information technology to managers
AbdulQadir Koitewale
 
Information Systems, Data and MIS
Information Systems, Data and MISInformation Systems, Data and MIS
Information Systems, Data and MIS
Mohit Bansal
 
MIS concepts
MIS conceptsMIS concepts
MIS concepts
Sajan N. Thomas
 
End User Support Presentation
End User Support Presentation End User Support Presentation
End User Support Presentation
Self employed
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policymarindi
 
MIS Presentation
MIS PresentationMIS Presentation
MIS Presentation
Dhiren Gala
 
Information Technology in Controlling
Information Technology in ControllingInformation Technology in Controlling
Information Technology in ControllingAvadhesh Solanki
 
Management Information System & Technology
Management Information System & TechnologyManagement Information System & Technology
Management Information System & TechnologyAkash Jauhari
 
Management information system
Management information system Management information system
Management information system
Manish Kaushik
 
How Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business FirmsHow Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business FirmsAlbrecht Jones
 
ERP And Enterprise Architecture
ERP And Enterprise ArchitectureERP And Enterprise Architecture
ERP And Enterprise Architecture
University of Engineering and Technology Taxila
 
information system in business today
information system in business todayinformation system in business today
information system in business today
shriya jha
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
SlideTeam
 

What's hot (20)

Decision Making and Information Systems
Decision Making and  Information SystemsDecision Making and  Information Systems
Decision Making and Information Systems
 
Erp, crm and scm concept
Erp, crm and scm conceptErp, crm and scm concept
Erp, crm and scm concept
 
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging TechnologiesIT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging Technologies
 
IT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT InftractructureIT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT Inftractructure
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Introduction of information technology to managers
Introduction of information technology to managersIntroduction of information technology to managers
Introduction of information technology to managers
 
Information Systems, Data and MIS
Information Systems, Data and MISInformation Systems, Data and MIS
Information Systems, Data and MIS
 
MIS concepts
MIS conceptsMIS concepts
MIS concepts
 
End User Support Presentation
End User Support Presentation End User Support Presentation
End User Support Presentation
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policy
 
MIS Presentation
MIS PresentationMIS Presentation
MIS Presentation
 
IT Infrastructure and Platforms
IT Infrastructure and PlatformsIT Infrastructure and Platforms
IT Infrastructure and Platforms
 
The role of information system
The role of information system The role of information system
The role of information system
 
Information Technology in Controlling
Information Technology in ControllingInformation Technology in Controlling
Information Technology in Controlling
 
Management Information System & Technology
Management Information System & TechnologyManagement Information System & Technology
Management Information System & Technology
 
Management information system
Management information system Management information system
Management information system
 
How Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business FirmsHow Information Systems Impact Organizations and Business Firms
How Information Systems Impact Organizations and Business Firms
 
ERP And Enterprise Architecture
ERP And Enterprise ArchitectureERP And Enterprise Architecture
ERP And Enterprise Architecture
 
information system in business today
information system in business todayinformation system in business today
information system in business today
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
 

Viewers also liked

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
SunnyhillsSchool
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology Proposal
Dana L. Miller
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
Mohd Syaheezam Asyra Yamin
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
FAIZAL T H
 
Wearable computing
Wearable computingWearable computing
Wearable computing
saakshi srivastava
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
Seyed Yahya Moradi
 
Human cloning
Human cloningHuman cloning
Human cloning
WriterTrouvailleWorld
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
Tata Consultancy Services
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
raj7
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
guest91b50e7a4
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Yole Developpement
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
Seminar Links
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Yole Developpement
 
Biosensors
BiosensorsBiosensors
Biosensors
Pooja Shukla
 

Viewers also liked (20)

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology Proposal
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
 
Clothing for Biosensing
Clothing for BiosensingClothing for Biosensing
Clothing for Biosensing
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
 
Human cloning
Human cloningHuman cloning
Human cloning
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
 
Biosensors
BiosensorsBiosensors
Biosensors
 

Similar to Business Case Of Bring Your Own Device[ BYOD]

Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
Stephen Rose
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
Aditi Shrivastava
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSiraj Syed
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
ksholes
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptx
Abbadabbajabba1
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
GovCloud Network
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
Md Yousup Faruqu
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
Trihedral
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Flexera
 
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
jasonlan
 

Similar to Business Case Of Bring Your Own Device[ BYOD] (20)

Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptx
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_Admin
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Maninder_singh
Maninder_singhManinder_singh
Maninder_singh
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Business Case Of Bring Your Own Device[ BYOD]

  • 1. Bring Your Own Device[ BYOD] Implementation Md Yousup Faruqu IT
  • 2. AGENDA Background & Bring Your Own Device (BYOD) Overview Implementation Roadmap And Approach Costing And Budget Analysis And Key Findings Objectives Of BYOD Recommendation
  • 3. BYOD describes an end user computing strategy supported by a set of policies and controls, which in conjunction with a technical solution provide a managed and secure framework for employees to access corporate data from their personal device whilst providing the enterprise with a level of control over both the device and the data it can access.
  • 4. AppleiPhone Android Mobile Windows Phone AppleiPad Android Tablet Blackberry Playbook Mobile Phone Tablet Windows Laptop AppleMac Hand Held Laptop Mobile Device Desktop Device BYOD The BYOD policy must detail which items are allowed and the controls that will be applied. When defining the scope of any BYOD implementation consideration must be given to which end user devices* will be allowed. Each device type has its own set of risks and management issues.
  • 5.  What devices will be subject to BYOD  What over arching method of resource access will be used for:  Hand held devices  Laptops  How will the solution and end users be supported  How will business units be charged for the service Strategy The business reasons for adopting BYOD, for a successful BYOD implementation Policy Policy right protects the business from the risks associated with BYOD  What devices makes and models will be allowed  How will Antivirus be handled  What actions does the company reserve the right to carry out on an employees personal device (e.g. remote wipe on loss)  How will leavers be handled  What access controls will be used (Certificate based authentication, Pin Number lengths)
  • 6.  Empower users to choose their own devices to improve productivity, collaboration and mobility  Protect sensitive information from loss and theft to meet privacy, compliance and risk management standards  Reduce costs and simplify management through self-service provisioning and automated management and monitoring  Simplify IT by deploying apps once for use on any device 6
  • 7.  On-demand delivery of data, apps and desktops to any device – personal or business  Transform corporate application as well as desktops into an on-demand service available on device.  A self-service app store providing unified access and single sign-on to Windows, web and SaaS apps on any device, over any network  Secure file sync and sharing for any device  Collaborative work platform with coworkers and clients  A secure-by-design architecture including SSL VPN and granular policy-based user authentication with tracking and monitoring to support compliance and privacy.
  • 8. Increased user mobility Increased user satisfaction Increase productivity* Help retain top performers Reduce capital costs Helps to attract younger talent*
  • 9.  Conduct baseline PoC to identify precise solutions to implement BYOD. Citrix and VMware has been identified as a best solutions for ABC Inc infrastructure.  All tests done in PoC with CITRIX and VMware were successful.  Use Citrix and VMware BYOD environment to publish or deliver Windows XP, 7 virtual desktop and application to the selected end users devices:  iOS device – iPhone, iPad  Android device – Samsung Phone, Tablet  Windows Phone – Nokia Lumia 9
  • 10. Months - Device & users selection - Test report - Provision desktop and applications Kick-Off - Drawing up the RFP - Publication - Selection - Assignment Implementation Dec. 2012 May,13 Jun,13 Project Management RFP Design &Analysis - Optimized design - Technical design - BYOD Implementation plan HW Provisioning Completion Oct,13Feb,13
  • 11.  Site Preparation, Product Delivery And Installation  Equipment delivery  Power preparation  Network preparation  H/W installation  OS installation and configuration  Host Integration (SAN integration)  Install and configure hypervisor VMware ESX and Virtual Center  Install and configure VMWare software and high availability  Install and configure BYOD solution  Provision virtual desktop and/or applications to the designated users 11
  • 12.  Hardware Configuration (Total cost: $32k)  2 physical server with 4X10-core (40) CPU and 196GB RAM each, used for the host machines  Software Configuration - Hypervisor (Total cost: $30k)  VMware vSphere 5.o (8 CPU licenses. Each License covers 1 physical CPU) with 1 years warranty and support  BYOD solution –Software, Licenses and support ($66k)  BYOD solution software and licenses  Storage (Total cost: $36k)  3TB usable FC storage
  • 13. 13  Identical physical servers are running at 20-35% utilization.  With 30 servers consolidated on 3 ESX Server hosts, all the servers will be operate at 60-80% utilization, resulting in a huge improvement in server utilization as measured by average CPU and memory usage.  Uniform high availability across the entire virtualized IT environment without the cost and complexity of failover solutions tied to either operating systems or specific applications.  The time is reduced for provisioning new servers to minutes. Before virtualization, it took us 20-30 hours if we needed to prepare a new system.  Downtime and IT service disruptions will be minimize.
  • 14.  E-mail  HR Application  ERP Systems  File Servers [H & Z drive]  Intranet Applications
  • 15. Log On Time Last State Change Endpoint Name Endpoint Address Endpoint Hardware Id Client Version Horizontal Resolution Vertical Resolutio n 9/9/12 11:48 AM 11/5/12 10:03 AM WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768 11/5/12 7:42 AM 11/5/12 7:44 AM xt45 172.71.237.15 421C1E03 320 480 11/6/12 8:50 AM 11/6/12 8:50 AM WI_mitjsZpPOTw8J oSBS 172.71.229.56 CE49DF52 768 1024 11/6/12 8:52 AM 11/6/12 8:53 AM WI_m4ubYcezolIW kWImB 172.71.103.49 363D7406 13.0.0.6685 1366 768 11/6/12 8:59 AM 11/6/12 9:00 AM WI_tk6oktkdeMd19 jJeO 172.71.103.46 3FB64541 12.1.44.1 1280 800 User access report
  • 16. Budget Head Cost ($k) Phase 1 Hardware Server 32 Storage 36 Software VMware ESX license 30 BYOD solutions and license 56 Professional Services Implémentation service 10 Total 164 Costing & Budget
  • 17. 17 Most of the tests performed with CITRIX VDI in POC, were successful. We recommend deploy the solution in phased approach and build the infrastructure gradually The phase 1 implementation is planned to be done in 2013. Meanwhile, we understood that there are many vendor products available in the market, so we would be doing the POC on VMware technology this year to determine if there have been any development that more capable in terms of reliability, and user experience compare to CITRIX