SlideShare a Scribd company logo
Consumerization of IT –
Bring Your Own Device
Tim Groenwals
Technology Innovation Manager
2
3
4
5
Setting THE
SCENE
6
7
Generation Y… they arrived
8
Reality check : different device for
business use and personal use
9
Evolution and Convergence of
Technology
10
Stay up-to-date
Work, read, play
Specialized work
Best of both worlds
High performance
Different devices are being used for
different functions and on different
times
Source : Microsoft / Getronics
11
Setting the Scene : bpost
•About 1500 plain gsm’s and 500 Blackberry’s
•Lifecycle management challenges
•Employer attraction for new potential hirees
•No data on company SIM cards
APPROACH
12
13
Our approach
• From within the ICT Innovation
team, we started a small pilot
with our Dircom
• In a few days, it extended to
senior management
• In parallel we were running a RFP for Mobile Device
Management solution for our Mail business (mobile
devices for postmen)
BYOD-smartdevices BYOD-laptops
(smartphone, tablet)
• We started to create a vision build on 2 pillars :
14
BYOD basic model
“Here's Your Own”
Hardware, specs defined
and managed by
company, strict policies
and rules
“Choose Your Own”
Whitelist of allowed
hardware, managed,
possibly less tight
policies and rules
“Bring Your Own”
Freedom of choice for
hardware, relatively
unmanaged, loose
policies and rules
“Own Your Own”
Freedom of choice for
hardware, unmanaged,
barely policies and rules
T
R
U
S
T
F
R
E
E
D
O
M
Source : Microsoft / Getronics
15
Bring-Your-Own-Device
Smartphone / Tablet
•Target audience : all employees under the corporate
mobile phone policy
•new employees receive only SIM card, no physical phone
anymore. Data included. No goodie budget.
•Blackberry users (in pilot) : replace BB service by data
subscription (ongoing)
•Security imposed : MDM app, pincode, remote wipe, no
jailbreak / rootkitted device
•Wifi access in HQ
•for employees not willing to join, or need a replacement
device, a small stock of refurbished gsm and blackberry will be
maintained.
•Scope : secure mail, calendaring, “My Documents”, Lync
•Attention : no ICT support for personal devices, only for
SIM card, user-community WIKI available
• Benefits :
•positive employer image and attraction for new hirees
• employee satisfaction
•saving of up to 180 € / device / year for ICT (support,
logistics, user management, device)
16
Bring-Your-Own-Device
Smartphone / Tablet
 Final MDM (Mobile Device Management) solution
selected & implemented
 BYOD policy (HR – ICT – Legal) written
 Trial with cloud-based storage ongoing
 Lync setup from BYOD ongoing
 Corporate mobile subscriptions, including data,
under final negotiation
 No single Android is standard
 Final approval Dircom planned
17
Bring-Your-Own-Device Laptop
•Target audience : mandatory for all externals
(contractors, bodyshop) and voluntary² for employees
•currently small & limited pilot to test functionalities
and design architecture
•Scope : secure bpost environment (mail, calendaring,
Lync , “My Documents” and business applications) on
personal laptop
•Security : via strong authentication and secured VDI
environment.
•Attention : no ICT support for personal devices, only for
the standardized secure bpost environment, user-
community WIKI available, no offline VDI yet.
• Benefits :
• no delay in onboarding externals
• € savings unclear at this moment
(cost VDI versus cost “managed laptop”)
² to avoid additional tax rulings, little appetite to bring own
laptop
18
Bring-Your-Own-Device
Laptop
 Architecture ready
 BYOD policy (HR – ICT – Legal) written
 Business Impact Analysis done, but to be approved
 Calculating business case ongoing
 Printing solution to be defined
 Unclarity about license obligations
 Contract renegotiation with bodyshop suppliers to be done
 Final approval Dircom planned
19
The future employee…
… will be able to use his private phone, tablet or laptop to access his mail,
calendar and business applications in a secure way².
² following rules of corporate mobile phone policy. Own laptop mandatory for externals
Some final
words
20
21
Enterprise Mobility
• Apart from the vision on “Consumerization of IT”
and BYOD, we discovered the need for an
“Enterprise Mobility” approach as well
• Accountmanagers, client
advisors, fleet, postmen, ….
• Gathering business reqs just
started
22
• Cost cutting should never be the main reason to start a BYOD
traject.
• DO NOT assume BYOD is ONLY an ICT-project or ONLY an
HR&O-project.
• Start AS SOON as possible with Mobile Device Management and Network Access
Control implementation to guide the current BYOD culture.
• The security architecture that emerges due to BYOD leads to an IT-infrastructure that is
future ready. ICT wil not only facilitate internal staff, but also external people, as it will
facilitate co-operation with partners and suppliers.
• a complete BYOD traject can be very complex and takes some time before it is realized, but
this only increases the requirement to start the definition of the BYOD policy as soon as
possible. This way, we will be ready as a company to start fishing in the (small) pool of
young talent.
• spend plenty of time to evangelize throughout the organisation. Not all decision-makers are
into new technology, nextgen expectations or benefits.
23
Questions ?
24
Tim Groenwals
Technology Innovation Manager
bpost
http://www.linkedin.com/in/tgroenwals
@tgroenwals
http://www.slideshare.net/tgroenwa/

More Related Content

What's hot

ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
Adrian Wright
 
Around a Few Big Buttons
Around a Few Big Buttons Around a Few Big Buttons
Around a Few Big Buttons
Suo&Co Oy
 
Designing a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's RoleDesigning a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's Role
NJ_OTI
 
Strategy Institute Smartbuilding
Strategy Institute SmartbuildingStrategy Institute Smartbuilding
Strategy Institute SmartbuildingCABA
 
IIoT and JD Edwards
IIoT and JD EdwardsIIoT and JD Edwards
IIoT and JD Edwards
Chris Misztur
 
Presentasi Awingu DCMS
Presentasi Awingu DCMSPresentasi Awingu DCMS
Presentasi Awingu DCMS
Fanky Christian
 
New ways of working with Fujitsu
New ways of working with FujitsuNew ways of working with Fujitsu
New ways of working with Fujitsu
Ton Schuiten
 
Intel Mini case Study
Intel Mini case StudyIntel Mini case Study
Intel Mini case Study
Shashwat Agarwal
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that mater
APPAU_Ukraine
 
Ch 18
Ch 18Ch 18
Smart Buildings Action Cluster
Smart Buildings Action ClusterSmart Buildings Action Cluster
Smart Buildings Action Cluster
inside-BigData.com
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoT
John Breitenbach
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
Ishay Tentser
 
IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018
LoQutus
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
E-Lock digital signatures
 
Iit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbIit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gb
Graham Bleakley
 
Wp byod
Wp byodWp byod
Wp byod
J
 
Industry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADAIndustry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADA
Enerco Energy Solutions LLP
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Graham Bleakley
 

What's hot (20)

ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Around a Few Big Buttons
Around a Few Big Buttons Around a Few Big Buttons
Around a Few Big Buttons
 
Designing a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's RoleDesigning a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's Role
 
Strategy Institute Smartbuilding
Strategy Institute SmartbuildingStrategy Institute Smartbuilding
Strategy Institute Smartbuilding
 
IIoT and JD Edwards
IIoT and JD EdwardsIIoT and JD Edwards
IIoT and JD Edwards
 
Presentasi Awingu DCMS
Presentasi Awingu DCMSPresentasi Awingu DCMS
Presentasi Awingu DCMS
 
New ways of working with Fujitsu
New ways of working with FujitsuNew ways of working with Fujitsu
New ways of working with Fujitsu
 
Intel Mini case Study
Intel Mini case StudyIntel Mini case Study
Intel Mini case Study
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that mater
 
Ch 18
Ch 18Ch 18
Ch 18
 
Smart Buildings Action Cluster
Smart Buildings Action ClusterSmart Buildings Action Cluster
Smart Buildings Action Cluster
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoT
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
 
IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
 
Iit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbIit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gb
 
Wp byod
Wp byodWp byod
Wp byod
 
Industry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADAIndustry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADA
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2
 

Similar to Byod bpost

Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
Mithi SkyConnect
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
Troy C. Fulton
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013
Prasant Mishra
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
Prasant Mishra
 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at MerakiCisco Canada
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
Brian Pereira
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018
MayankAgrawal205
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2Jorge Rivero Sanchez
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
Prasant Mishra
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
Ixonos Plc
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
Association for Commuter Transportation (ACT)
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
CooperTechnologiesInc
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
Dan Mårtensson
 

Similar to Byod bpost (20)

Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
01 ondrej felix [režim kompatibility]
01   ondrej felix [režim kompatibility]01   ondrej felix [režim kompatibility]
01 ondrej felix [režim kompatibility]
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at Meraki
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
 
GilbertoJulio CV 2015 (Ingles)
GilbertoJulio  CV 2015 (Ingles)GilbertoJulio  CV 2015 (Ingles)
GilbertoJulio CV 2015 (Ingles)
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Byod bpost

  • 1. Consumerization of IT – Bring Your Own Device Tim Groenwals Technology Innovation Manager
  • 2. 2
  • 3. 3
  • 4. 4
  • 5. 5
  • 8. 8 Reality check : different device for business use and personal use
  • 10. 10 Stay up-to-date Work, read, play Specialized work Best of both worlds High performance Different devices are being used for different functions and on different times Source : Microsoft / Getronics
  • 11. 11 Setting the Scene : bpost •About 1500 plain gsm’s and 500 Blackberry’s •Lifecycle management challenges •Employer attraction for new potential hirees •No data on company SIM cards
  • 13. 13 Our approach • From within the ICT Innovation team, we started a small pilot with our Dircom • In a few days, it extended to senior management • In parallel we were running a RFP for Mobile Device Management solution for our Mail business (mobile devices for postmen) BYOD-smartdevices BYOD-laptops (smartphone, tablet) • We started to create a vision build on 2 pillars :
  • 14. 14 BYOD basic model “Here's Your Own” Hardware, specs defined and managed by company, strict policies and rules “Choose Your Own” Whitelist of allowed hardware, managed, possibly less tight policies and rules “Bring Your Own” Freedom of choice for hardware, relatively unmanaged, loose policies and rules “Own Your Own” Freedom of choice for hardware, unmanaged, barely policies and rules T R U S T F R E E D O M Source : Microsoft / Getronics
  • 15. 15 Bring-Your-Own-Device Smartphone / Tablet •Target audience : all employees under the corporate mobile phone policy •new employees receive only SIM card, no physical phone anymore. Data included. No goodie budget. •Blackberry users (in pilot) : replace BB service by data subscription (ongoing) •Security imposed : MDM app, pincode, remote wipe, no jailbreak / rootkitted device •Wifi access in HQ •for employees not willing to join, or need a replacement device, a small stock of refurbished gsm and blackberry will be maintained. •Scope : secure mail, calendaring, “My Documents”, Lync •Attention : no ICT support for personal devices, only for SIM card, user-community WIKI available • Benefits : •positive employer image and attraction for new hirees • employee satisfaction •saving of up to 180 € / device / year for ICT (support, logistics, user management, device)
  • 16. 16 Bring-Your-Own-Device Smartphone / Tablet  Final MDM (Mobile Device Management) solution selected & implemented  BYOD policy (HR – ICT – Legal) written  Trial with cloud-based storage ongoing  Lync setup from BYOD ongoing  Corporate mobile subscriptions, including data, under final negotiation  No single Android is standard  Final approval Dircom planned
  • 17. 17 Bring-Your-Own-Device Laptop •Target audience : mandatory for all externals (contractors, bodyshop) and voluntary² for employees •currently small & limited pilot to test functionalities and design architecture •Scope : secure bpost environment (mail, calendaring, Lync , “My Documents” and business applications) on personal laptop •Security : via strong authentication and secured VDI environment. •Attention : no ICT support for personal devices, only for the standardized secure bpost environment, user- community WIKI available, no offline VDI yet. • Benefits : • no delay in onboarding externals • € savings unclear at this moment (cost VDI versus cost “managed laptop”) ² to avoid additional tax rulings, little appetite to bring own laptop
  • 18. 18 Bring-Your-Own-Device Laptop  Architecture ready  BYOD policy (HR – ICT – Legal) written  Business Impact Analysis done, but to be approved  Calculating business case ongoing  Printing solution to be defined  Unclarity about license obligations  Contract renegotiation with bodyshop suppliers to be done  Final approval Dircom planned
  • 19. 19 The future employee… … will be able to use his private phone, tablet or laptop to access his mail, calendar and business applications in a secure way². ² following rules of corporate mobile phone policy. Own laptop mandatory for externals
  • 21. 21 Enterprise Mobility • Apart from the vision on “Consumerization of IT” and BYOD, we discovered the need for an “Enterprise Mobility” approach as well • Accountmanagers, client advisors, fleet, postmen, …. • Gathering business reqs just started
  • 22. 22 • Cost cutting should never be the main reason to start a BYOD traject. • DO NOT assume BYOD is ONLY an ICT-project or ONLY an HR&O-project. • Start AS SOON as possible with Mobile Device Management and Network Access Control implementation to guide the current BYOD culture. • The security architecture that emerges due to BYOD leads to an IT-infrastructure that is future ready. ICT wil not only facilitate internal staff, but also external people, as it will facilitate co-operation with partners and suppliers. • a complete BYOD traject can be very complex and takes some time before it is realized, but this only increases the requirement to start the definition of the BYOD policy as soon as possible. This way, we will be ready as a company to start fishing in the (small) pool of young talent. • spend plenty of time to evangelize throughout the organisation. Not all decision-makers are into new technology, nextgen expectations or benefits.
  • 24. 24 Tim Groenwals Technology Innovation Manager bpost http://www.linkedin.com/in/tgroenwals @tgroenwals http://www.slideshare.net/tgroenwa/