Considering a BYOD
Infrastructure
Presented By: Melissa Andrews
April 10, 2013
Controversy
Position and Argument Summary
Argument Detail
Conclusion
Presentation Agenda
Suggested Cons
Threatens Security
Escalates Costs
Proven Pros
Creates Productivity
Fosters Innovation
Should We Implement a Bring Your
Own Device (BYOD) Infrastructure?
Tighten Security Controls
Optimize Technical Costs
Increase Employee Productivity
Foster Technical Innovation
Implement Pioneering Strategy
We Should Implement a BYOD
Infrastructure
Although 55% of the federal employees who use
smartphones or tablets for work bring their own, just
11% of them say their agency has an official BYOD
policy at all.
Source: (1)
Prevent Rogue Devices
Tighten Security Controls
With hosted VDI, no data ever leaves the data center.
Through the use of security policies, administrators of client-
hosted VDI can have virtual machines expire after a specified
time, helping to prevent data leakage.
Source (2)
Source (3)
Minimize Data Leakage
Tighten Security Controls
Virtual Desktop Environment
Virginia Bank VP of IT, Sharon Moynihan credits the cloud
component of the bank’s BYOD model for delivering the cost
savings…. Virginia Commerce Bank stands to save roughly
$1,500 per [BYOD] device.
Source (4)
Reduce Capital Expenditures
Optimize Technical Costs
The State of Delaware has begun “a two year transition
plan to migrate all users off of the existing infrastructure
by June 30, 2013 and move them to either a personal
device through a proposed reimbursement program”
“By doing so, the state stands to save up to $2.5 million
dollars annually through the reimbursement program but
also would save $75K in lifecycle costs and $120K in
ongoing support. “
Source (5)
Reallocate Technical Resources
Optimize Technical Costs
“One of the strong drivers of BYOD activity is that people want
to use a single device for both work and personal purposes”
Source (6)
In 2011 Mobile Workers carried on average 2.7 devices (spanning
tablets, laptops, smartphones, netbooks, etc.). In 2012 that
jumped to 3.5 devices. For the Q1 2013 report that dropped to 3
devices (2.95). This recent drop is directly attributed to BYOD.
Source (7)
Optimize Electronic Devices
Increase Employee Productivity
“According to a 2010 IDC-Unisys report, consumer-powered IT is
being touted as the principal driver behind the fourth wave of
corporate productivity. The first wave was inspired by Henry Ford's
invention of the assembly line (between 1908 and 1915). The
Japanese collaborative model, Kaizen, was the second wave. The
third was driven by the Chinese model of mass production, low
prices and global domination.”
“Today, the fourth wave is driven by a network of constantly
connected workers. A network connected by mobiles, laptops,
smartphones and the like.”
Source (8)
Facilitate Unrestricted Mobility
Increase Employee Productivity
Elevate Workforce Composition
Foster Technical Innovation
“It is especially true for Millennials
and teleworkers.”
“Increased flexibility is attractive.”
“It shows your office is forward
thinking, savvy, and efficient.”
Source (9)
“In an organization where the average age of employees ranges
between 28 to 30 years…. Prabhu realized that this squad of power
users was far ahead of their peers when it came to adopting whiz-
bang technology.
“[BYOD] would allow the IT team to focus on strategic innovation
instead of fixing IT issues. Keeping the IT team enthused is an
imperative at a time when attrition is rampant and work pressure is
mounting.”
“[BYOD] would free my IT resources from managing non-strategic
assets and help me focus on high business value initiatives.”
Source (8)
Leverage Technical Advances
Foster Technical Innovation
“Groups like Gartner … claim that BYOD will rise to become a
major technology trend in 2013, largely based on the huge
amount of iPads streaming into employees’ hands. These tablets
in the workplace are expected to reach 250 million by 2016,
according to findings by Forrester Research.”
Source (10)
Create Infrastructure Versatility
Implement Pioneering Strategy
S Source (11)
Embrace the Future
Implement Pioneering Strategy
Virtual Desktop
Infrastructure
Mobile Device
Management Systems
Dual-Persona Devices
Source (10)
 Prevent Rogue Devices
 Minimize Data Leakage
 Reduce Capital Expenditures
 Reallocate Technical Resources
 Optimize Electronic Devices
 Facilitate Unrestricted Mobility
 Elevate Workforce Composition
 Leverage Technical Advances
 Create Infrastructure Versatility
 Embrace the Future
A BYOD Infrastructure is a Must!
1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013.
<http://www.networkworld.com/news/2013/012213-federal-byod-266032.html?page=1>.
2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013.
<http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>.
3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. <http://vdi.co.nz/category/vdi/>.
4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013.
<http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-savings/?fp=16&fpid=1>.
5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov. Federal Chief Information Officers Council, n.d. Web.
19 Feb. 2013. <https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf>.
6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. <Source 6:
http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>.
7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass." IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact
Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. <http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>.
8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-study/bring-it-essar>.
9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public Sector." Api.ning.com. Api.ning.com, n.d. Web. 19
Feb. 2013.
<http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0pKqqZKcURsbISzQ__/BYODfinal_1.pdf>.
10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013.
<http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx>.
11. Wainwright, Ashley. "IT Solutions Blog." How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013.
<http://www.securedgenetworks.com/secure-edge-networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>.
12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC, 10 Apr. 2013. Web. 16 Apr. 2013.
<http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-support-it-infographic>.
Bibliography

Considering a BYOD Infrastructure

  • 1.
    Considering a BYOD Infrastructure PresentedBy: Melissa Andrews April 10, 2013
  • 2.
    Controversy Position and ArgumentSummary Argument Detail Conclusion Presentation Agenda
  • 3.
    Suggested Cons Threatens Security EscalatesCosts Proven Pros Creates Productivity Fosters Innovation Should We Implement a Bring Your Own Device (BYOD) Infrastructure?
  • 4.
    Tighten Security Controls OptimizeTechnical Costs Increase Employee Productivity Foster Technical Innovation Implement Pioneering Strategy We Should Implement a BYOD Infrastructure
  • 5.
    Although 55% ofthe federal employees who use smartphones or tablets for work bring their own, just 11% of them say their agency has an official BYOD policy at all. Source: (1) Prevent Rogue Devices Tighten Security Controls
  • 6.
    With hosted VDI,no data ever leaves the data center. Through the use of security policies, administrators of client- hosted VDI can have virtual machines expire after a specified time, helping to prevent data leakage. Source (2) Source (3) Minimize Data Leakage Tighten Security Controls Virtual Desktop Environment
  • 7.
    Virginia Bank VPof IT, Sharon Moynihan credits the cloud component of the bank’s BYOD model for delivering the cost savings…. Virginia Commerce Bank stands to save roughly $1,500 per [BYOD] device. Source (4) Reduce Capital Expenditures Optimize Technical Costs
  • 8.
    The State ofDelaware has begun “a two year transition plan to migrate all users off of the existing infrastructure by June 30, 2013 and move them to either a personal device through a proposed reimbursement program” “By doing so, the state stands to save up to $2.5 million dollars annually through the reimbursement program but also would save $75K in lifecycle costs and $120K in ongoing support. “ Source (5) Reallocate Technical Resources Optimize Technical Costs
  • 9.
    “One of thestrong drivers of BYOD activity is that people want to use a single device for both work and personal purposes” Source (6) In 2011 Mobile Workers carried on average 2.7 devices (spanning tablets, laptops, smartphones, netbooks, etc.). In 2012 that jumped to 3.5 devices. For the Q1 2013 report that dropped to 3 devices (2.95). This recent drop is directly attributed to BYOD. Source (7) Optimize Electronic Devices Increase Employee Productivity
  • 10.
    “According to a2010 IDC-Unisys report, consumer-powered IT is being touted as the principal driver behind the fourth wave of corporate productivity. The first wave was inspired by Henry Ford's invention of the assembly line (between 1908 and 1915). The Japanese collaborative model, Kaizen, was the second wave. The third was driven by the Chinese model of mass production, low prices and global domination.” “Today, the fourth wave is driven by a network of constantly connected workers. A network connected by mobiles, laptops, smartphones and the like.” Source (8) Facilitate Unrestricted Mobility Increase Employee Productivity
  • 11.
    Elevate Workforce Composition FosterTechnical Innovation “It is especially true for Millennials and teleworkers.” “Increased flexibility is attractive.” “It shows your office is forward thinking, savvy, and efficient.” Source (9)
  • 12.
    “In an organizationwhere the average age of employees ranges between 28 to 30 years…. Prabhu realized that this squad of power users was far ahead of their peers when it came to adopting whiz- bang technology. “[BYOD] would allow the IT team to focus on strategic innovation instead of fixing IT issues. Keeping the IT team enthused is an imperative at a time when attrition is rampant and work pressure is mounting.” “[BYOD] would free my IT resources from managing non-strategic assets and help me focus on high business value initiatives.” Source (8) Leverage Technical Advances Foster Technical Innovation
  • 13.
    “Groups like Gartner… claim that BYOD will rise to become a major technology trend in 2013, largely based on the huge amount of iPads streaming into employees’ hands. These tablets in the workplace are expected to reach 250 million by 2016, according to findings by Forrester Research.” Source (10) Create Infrastructure Versatility Implement Pioneering Strategy
  • 14.
    S Source (11) Embracethe Future Implement Pioneering Strategy Virtual Desktop Infrastructure Mobile Device Management Systems Dual-Persona Devices Source (10)
  • 15.
     Prevent RogueDevices  Minimize Data Leakage  Reduce Capital Expenditures  Reallocate Technical Resources  Optimize Electronic Devices  Facilitate Unrestricted Mobility  Elevate Workforce Composition  Leverage Technical Advances  Create Infrastructure Versatility  Embrace the Future A BYOD Infrastructure is a Must!
  • 16.
    1. Messmer, Ellen."Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. <http://www.networkworld.com/news/2013/012213-federal-byod-266032.html?page=1>. 2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013. <http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>. 3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. <http://vdi.co.nz/category/vdi/>. 4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013. <http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-savings/?fp=16&fpid=1>. 5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov. Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. <https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf>. 6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. <Source 6: http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>. 7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass." IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. <http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>. 8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-study/bring-it-essar>. 9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public Sector." Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013. <http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0pKqqZKcURsbISzQ__/BYODfinal_1.pdf>. 10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. <http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx>. 11. Wainwright, Ashley. "IT Solutions Blog." How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. <http://www.securedgenetworks.com/secure-edge-networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>. 12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC, 10 Apr. 2013. Web. 16 Apr. 2013. <http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-support-it-infographic>. Bibliography

Editor's Notes

  • #2 Overview of what BYOD is
  • #3 Explain overall approach of the presentation
  • #4 Most common cons citedBYOD can increase security and can lessen costsMore important business benefits: Productivity and InnovationAdds to bottom line and competitive advantage
  • #5 Prevent Rogue Devices / Minimize Data LeakageReduce Capital Expenditures / Reallocate Technical ResourcesOptimize Electronic Devices / Facilitate Unrestricted MobilityElevate Workforce Composition / Leverage Technical Advances Create Infrastructure Versatility / Embrace the FutureWe will see that BYOD Becomes a Must
  • #6 On a daily basis, employees are attempting to utilize their own devices. The implementation of a Mobile Device Management system will control what devices can access the networkSource 1: Messmer, Ellen. &quot;Are Federal Agency Workers Going Rogue with Personal Devices?&quot; Network World. Network World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. &lt;http://www.networkworld.com/news/2013/012213-federal-byod-266032.html?page=1&gt;.
  • #7 No data touches the devices eliminating need for device encryptionCan prevent download of data to USB and other devicesCentralized data makes it easier to secure, audit and recover.Source 2: Schultz, Keith. &quot;VDI Tailored to BYOD.&quot; CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013. &lt;http://www.cio.com.au/article/432639/review_vdi_tailored_byod/&gt;.Source 3: Valaboju, Krishna. &quot;V Blog.&quot; Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013. &lt;http://vdi.co.nz/category/vdi/&gt;.
  • #8 BYOD can eliminate the capital expenditure of replacement hardware. A cost-effective BYOD requires the cloud on the back end otherwise costs of maintaining security will quickly negate capital savings.With VDI in the back end standard end-point patch management and anti-virus costs can be eliminated. A BYOD model doesn’t need to be all or nothing. A certain subset of users can be allowed into the BYOD model. Reimbursements or stipends can be offered. Source 4: Kaneshige, Tom. &quot;The BYOD Troubleshoot: Security and Cost-savings.&quot; Cio.com. IDG Communications, 31 Mar. 2012. Web. 1 Apr. 2013. &lt;http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-savings/?fp=16&amp;fpid=1&gt;.
  • #9 A BYOD model can require that employees, not IT support, to select, provision and maintain their equipment. In the case of cell phones, almost all employees are savvy enough to call their wireless provider for assistance. In terms of laptop support, hardware recommendation and subsidized helpdesk support can be offered. It is important that the BYOD policy clearly delineate the support responsibilities. When done well, IT staff get out of the “hardware” business and can focus on more strategic goals. Source 5: &quot;A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs.&quot; CIO.gov. Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. &lt;https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf&gt;.
  • #10 Employees are burned with carrying multiple devices and using sub-optimal equipmentBYOD allows employees to rely on one set of devices they are comfortable withBYOD allows employees to utilize equipment that meets their individual needs (size, battery life, weight)BYOD prevents employees from having to transfer data between devicesSource 6: Bender, Adam. &quot;BYOD 101: What Are BYOD and the Consumerization of IT?&quot; Cio.com. IDG Communications, 6 Nov. 2012. Web. 1 Apr. 2013. &lt;Source 6: http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3&gt;.Source 7: Witeck, Chris. &quot;Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass.&quot; IPass Q1 2013 Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013. &lt;http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/&gt;.
  • #11 A BYOD model supports secure anytime, anywhere access to electronic resources.Source 8: Roy, Debarati. &quot;BYOD: The Essar Way.&quot; CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. &lt;http://www.cio.in/case-study/bring-it-essar&gt;.
  • #12 2012 Gov Loop Study of 103 public sector employeesForward-thinking policies such as BYOD help attract and retain a forward-thinking workforceA BYOD model increases employee satisfactionThe implementation of a BYOD model suggests a cutting-edge mindset that is attractive to new talentSource 9: Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. &quot;Exploring Bring Your Own Device in the Public Sector.&quot; Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013.&lt;http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0pKqqZKcURsbISzQ__/BYODfinal_1.pdf&gt;.
  • #13 Source . JayanthaPrabhu, CTO, Essar GroupManufacturing Sector – Case Study of BYOD implementationEmployees will introduce new ways of leveraging technology Employees will introduce new technology faster than IT can test and standardize devicesIT staff are available to focus on strategic projects rather than operational tasksSource 8:Roy, Debarati. &quot;BYOD: The Essar Way.&quot; CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. &lt;http://www.cio.in/case-study/bring-it-essar&gt;.
  • #14 There will be increased pressure from employees to bring their own devicesThere will be increased pressure to support a variety of devicesEven if a BYOD program is optional rather than mandatory, the number of employees seeking it will continue to growSource 10:&quot;BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies.&quot; Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. &lt;http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx&gt;.
  • #15 This informative infographic on the State of BYOD in 2013 by Magic Software shows how the move to BYOD environments is affecting devices, employees, and IT staffs in 2013. It provides many interesting statistics gathered from a variety of sources such as Gartner and Ovum to cover all the need-to-know facts about the state of BYOD and it’s expected growth.The BYOD model will become a standard infrastructure modelVDI interfaces will continue to advance in order to support the BYOD modelMDM technology will also advanceThe concept of a device having a manageable dual-persona, private versus business, will further the BYOD push. Source 11:Wainwright, Ashley. &quot;IT Solutions Blog.&quot; How BYOD Will Impact 2013 and the Years to Come: Infographic. Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. &lt;http://www.securedgenetworks.com/secure-edge-networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic&gt;.Source 10: &quot;BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies.&quot; Ucstrategies.com. Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. &lt;http://www.ucstrategies.com/unified-communications-newsroom/byod-here-to-stay-or-doomed.aspx&gt;.
  • #16 Review each of these points.Adds to bottom line and competitive advantageLeading companies will embrace it now rather play “catch-up”