SlideShare a Scribd company logo
1 of 25
Welcome to the presentation
Group Member
●Name ●ID
●Md. Asif ulla Azad
A case STUDY ABOUT..........
The
Pleasures
and Pitfalls
of BYOD
The term BYOD first entered common use in 2009, BYOD is
short for bring your own device. also called  (BYOT),  (BYOP),
and  (BYOPC).
In the conzumiraization of it, BYOD, is a phrase that has
become widely adopted to refer to employees who bring their
own computing devices – such as smartphones, laptops and
Tablets –to the workplace for use and connectivity on the
Today, employees expect to use personal smartphones and mobile devices at
work, making BYOD security a concern for IT teams.
Many corporations that allow employees to use their own mobile devices at work
implement a BYOD security policy that clearly outlines the company's position
and governance policy to help IT better manage these devices and
ensure network security.
Difficulties of BYOD
there are number of difficult issues related to this concept, especially when dealing with company’s
information security leading to a vulnerable ground if not properly dealt with..
Difficulties of BYOD concept:
device
support
managing
cost,
data and
network
protection.
variety of device types and operation systems,
this requires a reasonable amount of IT resources
together with human resource involvement in order
to tackle information security in non-proprietary
software and numerous networking platforms.
Implementation of BYOD
• the implementation of BYOD in two companies,
IBM and Intel.
IBM did not successfully deploy BYOD is practice due to an
unorganized controlling measures.
Intel, with emphasis on its people, managed it by developing multiple
access and control levels for its registered devices, alongside with
several software and security tools to enhance the user satisfaction
• https://www.youtube.com/watch?v=Yq22pRNFHbE&feature=youtu.be
Advantages
§All companies will receive benefits of a mobile workforce, even
though they not spend their money for it.
§ Avoid companies from wasting money for unnecessary devices
and mobile initiatives.
§Every employees will be feel comfortable because they using their
own device.
§Employees will feel easier because they don’t have burden to carry
and manage multiple devices.
•
Q. 1: What are the advantages and disadvantages of allowing
employees to use their personal smartphones for work?
§The data of a company which is private and confidential will be leak out to public. This is legal and
liability risk for that company.
§Companies lose their consistency and efficiency when they have their own hardware, and control
their data and scale their own It infrastructure.
§Employees have to spend their own pocket money for buy the devices needed by their company
§In a company every employees using different kind of devices. So the operating systems available,
providing adequate technical support for every employees will be difficult.
•
Disadvantages
Management
• Many companies are integrating these “mobility experts” into core IT
functions and software development. Mobility experts can help a
company leverage mobility more effectively.
• Identify or analyze that employees have ability to own their devices.
• Make sure that employees agree to safe the company’s confidential
information
•
2. What management, organization, and technology factors should be addressed when
deciding whether to allow employees to use their personal smart phones for work?
• Limit business smartphone use to a single platform.
This made it easier to keep track to each mobile device and to roll out software
upgrades or fixes, because all employees were using the same devices, or at the
very least, the same operating system. For example, BlackBerry mobile devices
access corporate e-mail and data using a proprietary software and networking
platform that is company–controlled and protected from outsiders.
• More than one type of mobile device and operating system
Firm need an efficient inventory management system that keeps track of which
devices employees are using, where the device is located, whether it is being used,
and what software it is equipped with.
Organization
• A number of software products such as Sybase Afaria, Trellia,
Microsoft System Center Device Manager and Odyssey Software
Athena have emerged to help companies manage diverse mobile
platforms.
• Virtualization is an approach to mobile device management.
Companies can install software such as Citrix Systems XenDesktop
that runs Windows desktops and individual applications on any
device, regardless of operating system.
•
Technology
I agree. Because:
§it lower cost for the company
§ increase resource or information for the task given
§ easy to communicate among worker
§ develop bureaucratic
§paperless/ green technology
§ develop workers knowledge and practice
§ save money in communicate with client through video conference.
Q. 3: Allowing employees to use their own smartphone for work will
save the company money. Do you agree? Why or Why not?
LEARNING OF THE CASE
BYOD = BRING YOUR OWN DEVICE(S) means employees can bring their own smartphones, tablets
,laptops in the workplace use and connectivity on corporate networking
NEW TREND COMPANIES ARE FOLLOWING IN THEIR WORK PLACE FOR BETTER
PRODUCTIVITY AND MINIMIZING THEIR INVESTMENT IN PERCHESING DIVICES FOR
EMPLOYEES.ITS A BIG ADVANTAGE FOR SMALL COMPANIES IN THIS WAY THEY CAN SAVE
SOME MONEY .BIG COMPANIESS (like imp ,intel)ARE ALSO USING THIS BYOD. As it is
anywhere/anytime access to computing tools increase workplace productivity and raised effective employee
work time by 45-60 minutes.
BYOD is customization of IT use that can help in increasing employee job satisfaction and productivity
Like all other IT systems BYOD also have some drawbacks which is found when companies are using this
.BYOD need a significant level of IT recourses dedicated to manage and maintain large number of devices
within the corporation.it is again adding some It cost in corporation. Different smart devices use different kinds
of operating system which does not have any well developed administration and security tools. Which is a big
risk for firms to keep their internal confidential information safe because BYOD gives data flexibility and
mobility
•
Risk in using BYOD
Theft or loss
of personal
devices)
Discloser of
corporate
sensitive data
in public
media
Loss of
control on
devices, data
and
employees
Use of less
reliable or
public or free
wife network
Uncontrolled
or
unauthorized
BYOD use
Malware
introduced in
corporate
data system
If any company’s only moto is saving money and increasing productivity through
BYOD system than its going to be a massive deserter for this companies internal
privacy. Without a well developed corporate data monitoring policy using BYOD is not
a good idea at all. So make BYOD corporations need to keep this points in their mind
ØTheir should be some it policy that will discourse employees to lick confidential data
ØHave to restrict confidential data availability to all level of employees
ØHave to keep tack of devices and monitor employees activity
ØCorporation Should have control on employees device data saving system
ØUnrecognized devices band for information safety etc.
•
THE PLEASURES AND PITFALLS OF BYOD
Application of learning in Bangladesh
Application of learning in Bangladesh
• BYOD “new normal” program is applicable in Bangladesh.
• As Blackberry is protected from outsiders. so we can use it.
• Some body use Apple IOS operating system also in limited areas.
• Companies need to handle all types of technical support.
• Information Security Management System (ISMS) is required to
implement in Bangladeshi companies.
•
Application of learning in Bangladesh
* Using personal drop box is a security problem.
* Access to IT data is important.
* BYOD program and Intel corporation are successful.
• Intel is popular in Bangladesh & offers more than 40 applications.
• Intel- BYOD makes employees happy
• Bangladeshi Companies will be benefited by using mobile devices.
Recommendation………
 Make clear and understandable policy for BYOD & defining minimum
security controls.
 Make a plan to deal with lost and stolen devices.
 Clearly announce what types of devices are being allowed for BYOD.
 Keep personal information separate from corporate data and personal
information in private.
 Always monitor inappropriate content on a personal device in the
workplace.
 Use GFI LanGuard security for vulnerability assessment capabilities for
BYOD devices.
 Set Up an Employee Exit Strategy.
•
Conclusion……….
BYOD new term for organization & organization become confused
because organization do not sure it is good or bad for their working
environment. Though IBM fail but Intel successfully integrate BYOD
in business sector & Intel prove that it improves employees
productivity & reduce cost in business. In a USA base research 60+%
people says they are using their own device at work.
BYOD create some problem but there are many factors boosting the
BYOD and enterprise mobility. Most importantly, enterprises realized
that this change in the work culture increases productivity and
employee satisfaction. Further, BYOD helped enterprises to reduce
hardware cost also.
Byod
Byod

More Related Content

What's hot

Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)Nirajan Silwal
 
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | EdurekaCloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | EdurekaEdureka!
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantIlesh Dattani
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the Newaccenture
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
26982319 samsung-project-report
26982319 samsung-project-report26982319 samsung-project-report
26982319 samsung-project-reportMohd zaid shaikh
 
Iot in healthcare
Iot in healthcareIot in healthcare
Iot in healthcareGauravBiswas9
 
Samsung Company Presentation
Samsung Company PresentationSamsung Company Presentation
Samsung Company PresentationSanthosh Madheswaran
 
Internet of behaviour.pptx
Internet of behaviour.pptxInternet of behaviour.pptx
Internet of behaviour.pptxAmit Kumar
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Presentation on nokia
Presentation on nokiaPresentation on nokia
Presentation on nokiaSaumitra Gupta
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Introduction to DSS
Introduction to DSSIntroduction to DSS
Introduction to DSSSoetam Rizky
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022engineermaste solution
 
Establishing a Framework for Security and Control
Establishing a Framework for Security and ControlEstablishing a Framework for Security and Control
Establishing a Framework for Security and ControlAlbrecht Jones
 

What's hot (20)

Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)
 
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | EdurekaCloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliant
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the New
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
26982319 samsung-project-report
26982319 samsung-project-report26982319 samsung-project-report
26982319 samsung-project-report
 
Iot in healthcare
Iot in healthcareIot in healthcare
Iot in healthcare
 
Samsung Company Presentation
Samsung Company PresentationSamsung Company Presentation
Samsung Company Presentation
 
Internet of behaviour.pptx
Internet of behaviour.pptxInternet of behaviour.pptx
Internet of behaviour.pptx
 
Smart watch
Smart watchSmart watch
Smart watch
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Presentation on nokia
Presentation on nokiaPresentation on nokia
Presentation on nokia
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Introduction to DSS
Introduction to DSSIntroduction to DSS
Introduction to DSS
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 
Establishing a Framework for Security and Control
Establishing a Framework for Security and ControlEstablishing a Framework for Security and Control
Establishing a Framework for Security and Control
 

Similar to Byod

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byodManageEngine
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD RightCloudUniversity
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...Association for Commuter Transportation (ACT)
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Gen Re
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)BrendaGraycon
 

Similar to Byod (20)

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
BYOD
BYODBYOD
BYOD
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 

More from Asifulla Azad

Consumer Preferences of Hospitals among Square, United, Apollo and Labaid
Consumer Preferences of Hospitals among Square, United, Apollo and LabaidConsumer Preferences of Hospitals among Square, United, Apollo and Labaid
Consumer Preferences of Hospitals among Square, United, Apollo and LabaidAsifulla Azad
 
Communication skill
Communication skill Communication skill
Communication skill Asifulla Azad
 
Different aspects of business communication used in delta brac housing financ...
Different aspects of business communication used in delta brac housing financ...Different aspects of business communication used in delta brac housing financ...
Different aspects of business communication used in delta brac housing financ...Asifulla Azad
 
Janata Bank presentation
Janata Bank presentationJanata Bank presentation
Janata Bank presentationAsifulla Azad
 
World Trade Organization
World Trade Organization World Trade Organization
World Trade Organization Asifulla Azad
 
Conflict resolution
Conflict resolutionConflict resolution
Conflict resolutionAsifulla Azad
 

More from Asifulla Azad (7)

Consumer Preferences of Hospitals among Square, United, Apollo and Labaid
Consumer Preferences of Hospitals among Square, United, Apollo and LabaidConsumer Preferences of Hospitals among Square, United, Apollo and Labaid
Consumer Preferences of Hospitals among Square, United, Apollo and Labaid
 
Communication skill
Communication skill Communication skill
Communication skill
 
Different aspects of business communication used in delta brac housing financ...
Different aspects of business communication used in delta brac housing financ...Different aspects of business communication used in delta brac housing financ...
Different aspects of business communication used in delta brac housing financ...
 
Call center
Call centerCall center
Call center
 
Janata Bank presentation
Janata Bank presentationJanata Bank presentation
Janata Bank presentation
 
World Trade Organization
World Trade Organization World Trade Organization
World Trade Organization
 
Conflict resolution
Conflict resolutionConflict resolution
Conflict resolution
 

Recently uploaded

High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...Pooja Nehwal
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝soniya singh
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一ga6c6bdl
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...nagunakhan
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一ga6c6bdl
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...Call Girls in Nagpur High Profile
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsappssapnasaifi408
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Pooja Nehwal
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...srsj9000
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsPooja Nehwal
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
 
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call Girls
 
Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
 

Byod

  • 1. Welcome to the presentation
  • 3. A case STUDY ABOUT.......... The Pleasures and Pitfalls of BYOD
  • 4. The term BYOD first entered common use in 2009, BYOD is short for bring your own device. also called  (BYOT),  (BYOP), and  (BYOPC). In the conzumiraization of it, BYOD, is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and Tablets –to the workplace for use and connectivity on the
  • 5. Today, employees expect to use personal smartphones and mobile devices at work, making BYOD security a concern for IT teams. Many corporations that allow employees to use their own mobile devices at work implement a BYOD security policy that clearly outlines the company's position and governance policy to help IT better manage these devices and ensure network security.
  • 6. Difficulties of BYOD there are number of difficult issues related to this concept, especially when dealing with company’s information security leading to a vulnerable ground if not properly dealt with.. Difficulties of BYOD concept: device support managing cost, data and network protection. variety of device types and operation systems, this requires a reasonable amount of IT resources together with human resource involvement in order to tackle information security in non-proprietary software and numerous networking platforms.
  • 7. Implementation of BYOD • the implementation of BYOD in two companies, IBM and Intel. IBM did not successfully deploy BYOD is practice due to an unorganized controlling measures. Intel, with emphasis on its people, managed it by developing multiple access and control levels for its registered devices, alongside with several software and security tools to enhance the user satisfaction
  • 9. Advantages §All companies will receive benefits of a mobile workforce, even though they not spend their money for it. § Avoid companies from wasting money for unnecessary devices and mobile initiatives. §Every employees will be feel comfortable because they using their own device. §Employees will feel easier because they don’t have burden to carry and manage multiple devices. • Q. 1: What are the advantages and disadvantages of allowing employees to use their personal smartphones for work?
  • 10. §The data of a company which is private and confidential will be leak out to public. This is legal and liability risk for that company. §Companies lose their consistency and efficiency when they have their own hardware, and control their data and scale their own It infrastructure. §Employees have to spend their own pocket money for buy the devices needed by their company §In a company every employees using different kind of devices. So the operating systems available, providing adequate technical support for every employees will be difficult. • Disadvantages
  • 11. Management • Many companies are integrating these “mobility experts” into core IT functions and software development. Mobility experts can help a company leverage mobility more effectively. • Identify or analyze that employees have ability to own their devices. • Make sure that employees agree to safe the company’s confidential information • 2. What management, organization, and technology factors should be addressed when deciding whether to allow employees to use their personal smart phones for work?
  • 12. • Limit business smartphone use to a single platform. This made it easier to keep track to each mobile device and to roll out software upgrades or fixes, because all employees were using the same devices, or at the very least, the same operating system. For example, BlackBerry mobile devices access corporate e-mail and data using a proprietary software and networking platform that is company–controlled and protected from outsiders. • More than one type of mobile device and operating system Firm need an efficient inventory management system that keeps track of which devices employees are using, where the device is located, whether it is being used, and what software it is equipped with. Organization
  • 13. • A number of software products such as Sybase Afaria, Trellia, Microsoft System Center Device Manager and Odyssey Software Athena have emerged to help companies manage diverse mobile platforms. • Virtualization is an approach to mobile device management. Companies can install software such as Citrix Systems XenDesktop that runs Windows desktops and individual applications on any device, regardless of operating system. • Technology
  • 14. I agree. Because: §it lower cost for the company § increase resource or information for the task given § easy to communicate among worker § develop bureaucratic §paperless/ green technology § develop workers knowledge and practice § save money in communicate with client through video conference. Q. 3: Allowing employees to use their own smartphone for work will save the company money. Do you agree? Why or Why not?
  • 15. LEARNING OF THE CASE BYOD = BRING YOUR OWN DEVICE(S) means employees can bring their own smartphones, tablets ,laptops in the workplace use and connectivity on corporate networking NEW TREND COMPANIES ARE FOLLOWING IN THEIR WORK PLACE FOR BETTER PRODUCTIVITY AND MINIMIZING THEIR INVESTMENT IN PERCHESING DIVICES FOR EMPLOYEES.ITS A BIG ADVANTAGE FOR SMALL COMPANIES IN THIS WAY THEY CAN SAVE SOME MONEY .BIG COMPANIESS (like imp ,intel)ARE ALSO USING THIS BYOD. As it is anywhere/anytime access to computing tools increase workplace productivity and raised effective employee work time by 45-60 minutes. BYOD is customization of IT use that can help in increasing employee job satisfaction and productivity Like all other IT systems BYOD also have some drawbacks which is found when companies are using this .BYOD need a significant level of IT recourses dedicated to manage and maintain large number of devices within the corporation.it is again adding some It cost in corporation. Different smart devices use different kinds of operating system which does not have any well developed administration and security tools. Which is a big risk for firms to keep their internal confidential information safe because BYOD gives data flexibility and mobility •
  • 16.
  • 17. Risk in using BYOD Theft or loss of personal devices) Discloser of corporate sensitive data in public media Loss of control on devices, data and employees Use of less reliable or public or free wife network Uncontrolled or unauthorized BYOD use Malware introduced in corporate data system
  • 18. If any company’s only moto is saving money and increasing productivity through BYOD system than its going to be a massive deserter for this companies internal privacy. Without a well developed corporate data monitoring policy using BYOD is not a good idea at all. So make BYOD corporations need to keep this points in their mind ØTheir should be some it policy that will discourse employees to lick confidential data ØHave to restrict confidential data availability to all level of employees ØHave to keep tack of devices and monitor employees activity ØCorporation Should have control on employees device data saving system ØUnrecognized devices band for information safety etc. •
  • 19. THE PLEASURES AND PITFALLS OF BYOD Application of learning in Bangladesh
  • 20. Application of learning in Bangladesh • BYOD “new normal” program is applicable in Bangladesh. • As Blackberry is protected from outsiders. so we can use it. • Some body use Apple IOS operating system also in limited areas. • Companies need to handle all types of technical support. • Information Security Management System (ISMS) is required to implement in Bangladeshi companies. •
  • 21. Application of learning in Bangladesh * Using personal drop box is a security problem. * Access to IT data is important. * BYOD program and Intel corporation are successful. • Intel is popular in Bangladesh & offers more than 40 applications. • Intel- BYOD makes employees happy • Bangladeshi Companies will be benefited by using mobile devices.
  • 22. Recommendation………  Make clear and understandable policy for BYOD & defining minimum security controls.  Make a plan to deal with lost and stolen devices.  Clearly announce what types of devices are being allowed for BYOD.  Keep personal information separate from corporate data and personal information in private.  Always monitor inappropriate content on a personal device in the workplace.  Use GFI LanGuard security for vulnerability assessment capabilities for BYOD devices.  Set Up an Employee Exit Strategy. •
  • 23. Conclusion………. BYOD new term for organization & organization become confused because organization do not sure it is good or bad for their working environment. Though IBM fail but Intel successfully integrate BYOD in business sector & Intel prove that it improves employees productivity & reduce cost in business. In a USA base research 60+% people says they are using their own device at work. BYOD create some problem but there are many factors boosting the BYOD and enterprise mobility. Most importantly, enterprises realized that this change in the work culture increases productivity and employee satisfaction. Further, BYOD helped enterprises to reduce hardware cost also.