There is no escaping the "bring your own device" trend, but organizations need to chart a middle path to strike a balance between employee freedom and corporate control over technology.
Digital Transformation Toolkit from ProductStackRahul Mohan
ProductStack's Digital Transformation Toolkit is a conceptual model that provides:
1) A structure for assessing an organization’s digital strategy and digital maturity (Digital Transformation Framework)
2) An indicator or an organization's capabilities to leverage technology to transform their business. (Digital Maturity Model)
3) A high-level approach for an organization to create a roadmap that aligns digital initiatives with its long term vision and business goals. (Digital Strategy)
ProductStack’s Digital Strategy Workshop is a short (2-3 days), collaborative engagement where ProductStack consultants run facilitated workshops with your team members to help you build your digital strategy and an execution roadmap.
Learn more about Digital Transformation at https://productstack.com
Digitalization involves creating value through customer experiences, business processes, and foundational capabilities. To meet high customer expectations, companies must accelerate digitizing processes but go beyond just automating existing processes. Digitalization transforms companies by applying disruptive technologies, reducing costs and cycle times through automated data collection and analysis to better understand processes, performance, and risks.
- Krishnan Viswanath has over 20 years of experience in technology management focusing on data governance, reference data, and data quality.
- Emerging topics in technology include mobile apps, big data, cloud computing, actionable analytics and visualization, data science, the internet of things, and wearable technologies.
- Democratization of technology through low-cost platforms like Raspberry Pi, BeagleBone Black, and HummingBoard is enabling more people to learn programming, explore open source operating systems, build autonomous systems and robots, and develop innovative applications.
This document discusses e-commerce and e-business. E-commerce refers to buying and selling online, while e-business is a broader concept that also includes customer service, partnerships, and internal organization functions. There are different types of e-commerce such as business-to-business, business-to-consumer, consumer-to-consumer. E-commerce provides benefits to organizations, customers, and society as a whole such as access to wider markets, lower costs, and increased standard of living. However, it also faces limitations such as security and privacy issues. The document outlines the consumer decision process and different advertising and shopping methods used in e-commerce.
Este documento describe la integración entre Salesforce y Microsoft Power BI. Detalla los objetos principales en Salesforce como cuentas, contactos, oportunidades y campañas, y explica cómo Power BI puede conectarse a estos objetos y a los informes preconfigurados en Salesforce para realizar análisis avanzados combinando datos. También promueve los servicios de consultoría, formación y proyectos de Stratebi utilizando Power BI e integración con Salesforce.
1. Introducción a la Gestión de la Információn.pptdavidlora9
La gestión de la información es el proceso de gestionar el ciclo de vida completo de la información de una organización, incluida su recolección, almacenamiento, distribución, archivo y destrucción. Esto ayuda a las organizaciones a asegurar que la información correcta esté disponible para las personas adecuadas en el momento adecuado y apoya el funcionamiento eficiente de la organización.
In partnership with IDG, our 2022 Insight Intelligent Technology™ Report examines how companies are making progress on long-term IT strategies to meet the changing, post-pandemic expectations of their businesses, their employees, and the market more broadly.
Digital Transformation Toolkit from ProductStackRahul Mohan
ProductStack's Digital Transformation Toolkit is a conceptual model that provides:
1) A structure for assessing an organization’s digital strategy and digital maturity (Digital Transformation Framework)
2) An indicator or an organization's capabilities to leverage technology to transform their business. (Digital Maturity Model)
3) A high-level approach for an organization to create a roadmap that aligns digital initiatives with its long term vision and business goals. (Digital Strategy)
ProductStack’s Digital Strategy Workshop is a short (2-3 days), collaborative engagement where ProductStack consultants run facilitated workshops with your team members to help you build your digital strategy and an execution roadmap.
Learn more about Digital Transformation at https://productstack.com
Digitalization involves creating value through customer experiences, business processes, and foundational capabilities. To meet high customer expectations, companies must accelerate digitizing processes but go beyond just automating existing processes. Digitalization transforms companies by applying disruptive technologies, reducing costs and cycle times through automated data collection and analysis to better understand processes, performance, and risks.
- Krishnan Viswanath has over 20 years of experience in technology management focusing on data governance, reference data, and data quality.
- Emerging topics in technology include mobile apps, big data, cloud computing, actionable analytics and visualization, data science, the internet of things, and wearable technologies.
- Democratization of technology through low-cost platforms like Raspberry Pi, BeagleBone Black, and HummingBoard is enabling more people to learn programming, explore open source operating systems, build autonomous systems and robots, and develop innovative applications.
This document discusses e-commerce and e-business. E-commerce refers to buying and selling online, while e-business is a broader concept that also includes customer service, partnerships, and internal organization functions. There are different types of e-commerce such as business-to-business, business-to-consumer, consumer-to-consumer. E-commerce provides benefits to organizations, customers, and society as a whole such as access to wider markets, lower costs, and increased standard of living. However, it also faces limitations such as security and privacy issues. The document outlines the consumer decision process and different advertising and shopping methods used in e-commerce.
Este documento describe la integración entre Salesforce y Microsoft Power BI. Detalla los objetos principales en Salesforce como cuentas, contactos, oportunidades y campañas, y explica cómo Power BI puede conectarse a estos objetos y a los informes preconfigurados en Salesforce para realizar análisis avanzados combinando datos. También promueve los servicios de consultoría, formación y proyectos de Stratebi utilizando Power BI e integración con Salesforce.
1. Introducción a la Gestión de la Információn.pptdavidlora9
La gestión de la información es el proceso de gestionar el ciclo de vida completo de la información de una organización, incluida su recolección, almacenamiento, distribución, archivo y destrucción. Esto ayuda a las organizaciones a asegurar que la información correcta esté disponible para las personas adecuadas en el momento adecuado y apoya el funcionamiento eficiente de la organización.
In partnership with IDG, our 2022 Insight Intelligent Technology™ Report examines how companies are making progress on long-term IT strategies to meet the changing, post-pandemic expectations of their businesses, their employees, and the market more broadly.
This document discusses the digital transformation of high-tech industries. It notes that profit and market value are migrating away from hardware and components towards internet platforms. It identifies trends like artificial intelligence, internet of things, cloud computing and edge processing driving changes. Few product companies have fully transformed, with internet platform companies outpacing spending on research and development. The document outlines a framework for companies to transform their core business while growing new business models in areas like connected products, living products and services, and ecosystem platforms. It emphasizes the need for digital talent and factories to drive transformation.
This Altimeter Group webinar explores the findings of our latest research report on digital transformation. Attendees will learn what digital transformation is, how companies are embracing change, the challenges and opportunities that emerge throughout the process, and how to refocus and reorganize teams to modernize, optimize, and integrate digital touchpoints.
Watch the webinar: https://www.slideshare.net/Altimeter/webinar-digital-transformation-with-brian-solis
Download the related report: altimetergroup.com/digitaltransformation/
The document discusses integrating traditional marketing frameworks with new e-commerce strategies. It proposes a framework with four elements - product, place, price and promotion. It applies this framework to analyze Nabisco's current e-commerce approach and challenges in online grocery shopping. The framework suggests ways for Nabisco to develop new niche products, quickly build an online customer base, and maintain relationships across its supply chain in the changing digital marketplace.
The document discusses problems with the current healthcare system such as overcrowding in emergency rooms, lack of centralized healthcare records, and lack of efficient data collection. It then introduces TeleAfya as a solution to connect patients with healthcare providers through features like an emergency mobile care service, a secure health records vault, centralized systems, and access to transportation services. TeleAfya aims to improve access to healthcare and allow better management of health issues. The document outlines TeleAfya's marketing strategy, potential threats, and roadmap to guide the project.
It’s clear how Incumbent banks are met with unprecedented market forces. Fintech and neobanks—new financial players that offer more and more exciting financial products—are eating up banking market shares. Meanwhile, the growing use of alternative payments such as PayPal, Samsung Pay, Apple Pay, and so on points to the fact that customers are finding traditional banks inconvenient and untrustworthy. At the same time, people are walking away from physical branches; instead preferring mobile banking for ease and convenience, according to a recent report by Backbase. On top of that, the government continues to encourage Digital Banking, made apparent by the government’s recent directives. These factors may sound like twists and turns that took traditional banks by surprise, yet they point to the refusal to change and innovate in the face of digital disruption. Now that change becomes a matter of life and death for banks, there’s an evident need for a shift in mindset and principle called Design Thinking. This paper looks over the relevance and application of Design Thinking in the banking sector. You will also get to explore how some current banks are applying this method. The promise of Design Thinking for banks proves beyond doubt. Now let’s dive in.
Tom Armitage's presentation on the University of Edinburgh's process for install QGIS across a network. Presented at 6th Scottish QGIS UK user group meeting.
Advantages, Disadvantages of Digital Marketing.pptxDigital Aacharya
Increased reach and better targeting are two of the benefits that digital marketing provides, but it also has drawbacks including a continuously shifting landscape.
As more employees transition to a work-from-home environment, digital workplace technology offers a vital agile setting for businesses. We show you how to create a Digital Workplace within your company, uniting technology, people, and processes using intranet software.
Electronic commerce or ecommerce is a term for any type of business, or commercial transaction, that involves the transfer of information across the Internet. It covers a range of different types of businesses, from consumer based retail sites, through auction or music sites, to business exchanges trading goods and services between corporations. It is currently one of the most important aspects of the Internet to emerge.
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015SiteVisibility
Jon Hibbitt, SiteVisibility's Technical SEO Analyst spoke at BrightonSEO about digital marketing in the age of 5G & how 5G will make mobile devices the primary digital marketing device. Jon also provides ideas on the opportunities that 5G presents.
Digital disruption refers to using digital technologies to disrupt existing businesses and industries. It requires companies to rethink their entire business model, not just technology, and adopt the mindset of a digital disruptor. This involves thinking differently and focusing on giving customers what they really want. Companies must exploit digital platforms, have an ongoing relationship with customers, and view failure as feedback. To behave as a digital disruptor, companies should pursue adjacent opportunities to provide new customer benefits, give customers a total product experience, and let customer needs guide their innovation. They must also disrupt themselves by establishing digital disruption as a priority, identifying barriers between departments, and designing teams to find disruptive opportunities.
This document defines and describes 7 types of e-commerce models: Business-to-Business (B2B), Business-to-Consumer (B2C), Consumer-to-Consumer (C2C), Consumer-to-Business (C2B), Peer-to-Peer (P2P), Government-to-Consumer (G2C), and Consumer-to-Government (C2G). B2B refers to transactions between two companies. B2C involves transactions between businesses and consumers. C2C facilitates transactions between consumers. C2B means transactions from consumers to businesses. P2P allows sharing of computer files and resources without a central server. G2C is when the government transacts
This document defines and discusses e-services. It begins by defining e-services as services that are produced, provided, and consumed through information and communication technologies like the internet. It then discusses the benefits of e-services, including accessing larger customer bases and lowering costs. The main domains of e-services identified are e-business, e-government, e-learning, and e-health. Examples of each domain are provided. The document concludes by noting some disadvantages of e-services, such as the risks of data hacking and costs of ensuring high system performance and reliability.
Digital Transformation: What it is and how to get thereEconsultancy
Digital Transformation: What it is and how to get there.
Authored by Econsultancy CEO Ashley Friedlein, this presentation on the topic of 'Digital Transformation', is broken down into six sections covering:
1. Digital Transformation - what it is and recent data and research on the topic
2. Strategy - what a digital strategy should include
3. Technology - the challenges of technology and the skills gap
4. People - looking at organisational structure, culture, roles & responsibilities, environment recquired
5. Process - how to address the speed, innovation and agility required
6. Business Transformation - how digital transformation is actually business transformation
Monetizing Big Data at Telecom Service ProvidersDataWorks Summit
Hadoop enables telecom companies to gain valuable insights from large amounts of customer data. It provides a cost-effective way to store and analyze call detail records, network traffic data, customer account information, and other big data sources. This allows telecoms to improve network maintenance, enhance the customer experience, optimize marketing campaigns, and reduce customer churn. The document discusses several use cases where telecom companies have used Hadoop to save millions of dollars annually or increase revenue through better data-driven decisions.
Developing a Roadmap for Digital TransformationJohn Sinke
Digitally mature companies out-perform their peers in innovation, agility and responsiveness to customers. “Digirati” also enjoy advantages in efficiency and effectiveness in product delivery, marketing, e-commerce, sales and customer service. More importantly, companies that achieve Digital Excellence are 26% more profitable (source: Capgemini Consulting and MIT Centre for Digital Business).
However, building a Roadmap for Digital Transformation requires not only successful collaboration between the CMO and the CIO, it also demands a strong customer-focused orientation and digital culture. During this presentation, John Sinke will share insights from leading marketers and his personal experience of turning Resorts World Sentosa into a “digital business”.
This document provides guidance on strategic roadmap planning. It emphasizes that the most important part of roadmapping is setting the product vision and strategic goals through top-down planning before building the roadmap. It covers developing the product strategy, defining goals, integrating roadmapping with agile planning, addressing common challenges, and using metrics to support the strategy. The overall message is that roadmaps should communicate high-level strategy and priorities rather than detailed plans to align stakeholders and guide product development.
Preparing an Effective BYOD or Mobility Strategy outlines a 5-step process for developing a BYOD strategy:
1. Develop a business case by calculating the costs and savings of a BYOD program.
2. Segment the workforce based on work styles and common use cases.
3. Map workforce segments to planned service offerings like laptops, VDI, or mobile devices.
4. Define BYOD policies around minimum device standards, entitlements, and rules of use.
5. Design a new support model where IT supports applications and OS, while users support hardware.
St Mary's Bring Your Own Device Information Evening Presentationstmns
This document summarizes the key discussion points from an information evening about a school's plan to implement a Bring Your Own Device (BYODD) program. The summary includes:
1) The evening included presentations from teachers, students, and education officials on why the school wanted to implement BYODD and how it could enhance learning.
2) Survey results from parents showed majority support for BYODD and felt it could benefit students, but some had concerns about overuse of technology and cyber safety.
3) The proposed plan was to phase BYODD in over the next few years, starting with older grades, and include teacher training, digital citizenship lessons, and guidelines for appropriate student use.
This document discusses the digital transformation of high-tech industries. It notes that profit and market value are migrating away from hardware and components towards internet platforms. It identifies trends like artificial intelligence, internet of things, cloud computing and edge processing driving changes. Few product companies have fully transformed, with internet platform companies outpacing spending on research and development. The document outlines a framework for companies to transform their core business while growing new business models in areas like connected products, living products and services, and ecosystem platforms. It emphasizes the need for digital talent and factories to drive transformation.
This Altimeter Group webinar explores the findings of our latest research report on digital transformation. Attendees will learn what digital transformation is, how companies are embracing change, the challenges and opportunities that emerge throughout the process, and how to refocus and reorganize teams to modernize, optimize, and integrate digital touchpoints.
Watch the webinar: https://www.slideshare.net/Altimeter/webinar-digital-transformation-with-brian-solis
Download the related report: altimetergroup.com/digitaltransformation/
The document discusses integrating traditional marketing frameworks with new e-commerce strategies. It proposes a framework with four elements - product, place, price and promotion. It applies this framework to analyze Nabisco's current e-commerce approach and challenges in online grocery shopping. The framework suggests ways for Nabisco to develop new niche products, quickly build an online customer base, and maintain relationships across its supply chain in the changing digital marketplace.
The document discusses problems with the current healthcare system such as overcrowding in emergency rooms, lack of centralized healthcare records, and lack of efficient data collection. It then introduces TeleAfya as a solution to connect patients with healthcare providers through features like an emergency mobile care service, a secure health records vault, centralized systems, and access to transportation services. TeleAfya aims to improve access to healthcare and allow better management of health issues. The document outlines TeleAfya's marketing strategy, potential threats, and roadmap to guide the project.
It’s clear how Incumbent banks are met with unprecedented market forces. Fintech and neobanks—new financial players that offer more and more exciting financial products—are eating up banking market shares. Meanwhile, the growing use of alternative payments such as PayPal, Samsung Pay, Apple Pay, and so on points to the fact that customers are finding traditional banks inconvenient and untrustworthy. At the same time, people are walking away from physical branches; instead preferring mobile banking for ease and convenience, according to a recent report by Backbase. On top of that, the government continues to encourage Digital Banking, made apparent by the government’s recent directives. These factors may sound like twists and turns that took traditional banks by surprise, yet they point to the refusal to change and innovate in the face of digital disruption. Now that change becomes a matter of life and death for banks, there’s an evident need for a shift in mindset and principle called Design Thinking. This paper looks over the relevance and application of Design Thinking in the banking sector. You will also get to explore how some current banks are applying this method. The promise of Design Thinking for banks proves beyond doubt. Now let’s dive in.
Tom Armitage's presentation on the University of Edinburgh's process for install QGIS across a network. Presented at 6th Scottish QGIS UK user group meeting.
Advantages, Disadvantages of Digital Marketing.pptxDigital Aacharya
Increased reach and better targeting are two of the benefits that digital marketing provides, but it also has drawbacks including a continuously shifting landscape.
As more employees transition to a work-from-home environment, digital workplace technology offers a vital agile setting for businesses. We show you how to create a Digital Workplace within your company, uniting technology, people, and processes using intranet software.
Electronic commerce or ecommerce is a term for any type of business, or commercial transaction, that involves the transfer of information across the Internet. It covers a range of different types of businesses, from consumer based retail sites, through auction or music sites, to business exchanges trading goods and services between corporations. It is currently one of the most important aspects of the Internet to emerge.
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015SiteVisibility
Jon Hibbitt, SiteVisibility's Technical SEO Analyst spoke at BrightonSEO about digital marketing in the age of 5G & how 5G will make mobile devices the primary digital marketing device. Jon also provides ideas on the opportunities that 5G presents.
Digital disruption refers to using digital technologies to disrupt existing businesses and industries. It requires companies to rethink their entire business model, not just technology, and adopt the mindset of a digital disruptor. This involves thinking differently and focusing on giving customers what they really want. Companies must exploit digital platforms, have an ongoing relationship with customers, and view failure as feedback. To behave as a digital disruptor, companies should pursue adjacent opportunities to provide new customer benefits, give customers a total product experience, and let customer needs guide their innovation. They must also disrupt themselves by establishing digital disruption as a priority, identifying barriers between departments, and designing teams to find disruptive opportunities.
This document defines and describes 7 types of e-commerce models: Business-to-Business (B2B), Business-to-Consumer (B2C), Consumer-to-Consumer (C2C), Consumer-to-Business (C2B), Peer-to-Peer (P2P), Government-to-Consumer (G2C), and Consumer-to-Government (C2G). B2B refers to transactions between two companies. B2C involves transactions between businesses and consumers. C2C facilitates transactions between consumers. C2B means transactions from consumers to businesses. P2P allows sharing of computer files and resources without a central server. G2C is when the government transacts
This document defines and discusses e-services. It begins by defining e-services as services that are produced, provided, and consumed through information and communication technologies like the internet. It then discusses the benefits of e-services, including accessing larger customer bases and lowering costs. The main domains of e-services identified are e-business, e-government, e-learning, and e-health. Examples of each domain are provided. The document concludes by noting some disadvantages of e-services, such as the risks of data hacking and costs of ensuring high system performance and reliability.
Digital Transformation: What it is and how to get thereEconsultancy
Digital Transformation: What it is and how to get there.
Authored by Econsultancy CEO Ashley Friedlein, this presentation on the topic of 'Digital Transformation', is broken down into six sections covering:
1. Digital Transformation - what it is and recent data and research on the topic
2. Strategy - what a digital strategy should include
3. Technology - the challenges of technology and the skills gap
4. People - looking at organisational structure, culture, roles & responsibilities, environment recquired
5. Process - how to address the speed, innovation and agility required
6. Business Transformation - how digital transformation is actually business transformation
Monetizing Big Data at Telecom Service ProvidersDataWorks Summit
Hadoop enables telecom companies to gain valuable insights from large amounts of customer data. It provides a cost-effective way to store and analyze call detail records, network traffic data, customer account information, and other big data sources. This allows telecoms to improve network maintenance, enhance the customer experience, optimize marketing campaigns, and reduce customer churn. The document discusses several use cases where telecom companies have used Hadoop to save millions of dollars annually or increase revenue through better data-driven decisions.
Developing a Roadmap for Digital TransformationJohn Sinke
Digitally mature companies out-perform their peers in innovation, agility and responsiveness to customers. “Digirati” also enjoy advantages in efficiency and effectiveness in product delivery, marketing, e-commerce, sales and customer service. More importantly, companies that achieve Digital Excellence are 26% more profitable (source: Capgemini Consulting and MIT Centre for Digital Business).
However, building a Roadmap for Digital Transformation requires not only successful collaboration between the CMO and the CIO, it also demands a strong customer-focused orientation and digital culture. During this presentation, John Sinke will share insights from leading marketers and his personal experience of turning Resorts World Sentosa into a “digital business”.
This document provides guidance on strategic roadmap planning. It emphasizes that the most important part of roadmapping is setting the product vision and strategic goals through top-down planning before building the roadmap. It covers developing the product strategy, defining goals, integrating roadmapping with agile planning, addressing common challenges, and using metrics to support the strategy. The overall message is that roadmaps should communicate high-level strategy and priorities rather than detailed plans to align stakeholders and guide product development.
Preparing an Effective BYOD or Mobility Strategy outlines a 5-step process for developing a BYOD strategy:
1. Develop a business case by calculating the costs and savings of a BYOD program.
2. Segment the workforce based on work styles and common use cases.
3. Map workforce segments to planned service offerings like laptops, VDI, or mobile devices.
4. Define BYOD policies around minimum device standards, entitlements, and rules of use.
5. Design a new support model where IT supports applications and OS, while users support hardware.
St Mary's Bring Your Own Device Information Evening Presentationstmns
This document summarizes the key discussion points from an information evening about a school's plan to implement a Bring Your Own Device (BYODD) program. The summary includes:
1) The evening included presentations from teachers, students, and education officials on why the school wanted to implement BYODD and how it could enhance learning.
2) Survey results from parents showed majority support for BYODD and felt it could benefit students, but some had concerns about overuse of technology and cyber safety.
3) The proposed plan was to phase BYODD in over the next few years, starting with older grades, and include teacher training, digital citizenship lessons, and guidelines for appropriate student use.
A Vision for U.S. Healthcare's Radical MakeoverCognizant
The healthcare industry is on the verge of a disruptive change that will significantly reshape our experiences and reorient our expectations across the provider and payer value chain.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
Gamification can greatly enhance companies' ability to meet their business goals, but they must first define their objective, identify the brand mission, determine gaming components and create an effective design.
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
This document discusses Bring Your Own Device (BYOD) implementation and security issues. It begins with defining BYOD as a trend of allowing employees to use their personal mobile devices for work purposes. Some advantages of BYOD include increased productivity, lower costs for companies, and attracting talent. However, there are also security, privacy, infrastructure support, and device control issues that need to be addressed. The document recommends automating access policies, detecting threats, unifying security policies, and protecting infrastructure to implement BYOD securely. It concludes that BYOD improves productivity and costs but requires enforceable security policies.
Bring Your Own Device It’s all about Employee Satisfaction and Productivity, not Costs!
BYOD is becoming more popular globally. For instance, a survey indicated that about 28% of the global workforce in 2011 used personal devices for official purposes. This growth of BYOD is creating doubts in the minds of CIOs. Most focus on BYOD has primarily been from a cost savings perspective, however, our analysis indicates there are more important reasons for CIOs to consider.
Finding the value in byod capgemini consulting - digital transformationRick Bouter
This document discusses the benefits of a Bring Your Own Device (BYOD) program for employees and businesses. While BYOD was initially thought to primarily save costs by reducing hardware and software expenses, the document argues the main benefits are improved employee satisfaction, productivity and mobility. BYOD allows employees to use their personal devices for work, increasing flexibility and satisfaction. It also enables increased productivity through greater mobility and availability of employees outside traditional working hours. While security and support costs can reduce savings, the employee and business benefits of BYOD are greater than just cost reduction. The document provides recommendations for developing an effective BYOD strategy including defining the program scope, establishing security policies, selecting appropriate solutions, and implementing support structures.
This document discusses the implementation and security issues related to BYOD (Bring Your Own Device) policies. It begins with an introduction to BYOD, noting the economic advantages for companies but also the security risks. The rest of the document covers: advantages of BYOD like increased productivity and lower costs; security issues with allowing personal devices on corporate networks; privacy concerns; challenges with infrastructure, device control, and support; and recommendations for developing a BYOD security policy including identifying risks, enforcing policies, and using security measures like encryption and mobile device management.
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
This document provides a summary of a term paper on handheld devices and BYOD (Bring Your Own Device) adoption in enterprises. It discusses drivers of BYOD such as increased use of mobile devices and collaborative applications. Executives at Cisco were interviewed and noted that BYOD can boost productivity but challenges include security issues and changing employee behaviors. The document also analyzes factors fueling BYOD adoption such as the overlap of work and personal tasks on mobile devices. However, BYOD implementation presents security and policy challenges for IT that companies are working to address.
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
We offer complete satisfaction to our customers by following standardized SDLC processes, hiring the best of breed developers and mastering most of our requirements gathering, wireframing, designing, developing, testing, delivering, deploying and maintenance tasks.
Ours is an off-shore model, but we ensure that both customer and Mobiloitte are always in touch by keeping communications open, providing regular updates and iterative releases so that the customer is always well informed.
The document discusses Bring Your Own Device (BYOD) policies that allow employees to use their personal devices for work purposes. It notes that BYOD can improve employee productivity and satisfaction by giving them flexibility. However, it also presents challenges for ensuring corporate security and privacy protocols are followed. The document provides criteria organizations should consider for BYOD implementation, such as defining liability, supporting user experience and choice of devices, and developing internal marketing and sustainability of the program over time. It argues that with proper planning and policies, BYOD can balance employee freedom with corporate security and control over technology use.
Viability of bring your-own-computer BYOC programsMasaf Dawood
The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
By: Masaf Dawood
The pervasiveness of mobile computing is forcing companies to rethink their business models, reinvent their organizations and rewire their operations in order to reap the benefits and overcome the challenges of enterprise mobility.
This paper analyzes the challenges involved with BYOD, the ways to leverage the benefits and also brings out the best practices in order to effectively utilize the BYOD trend.
The document discusses the BYOD (Bring Your Own Device) trend and its evolution from BYOD to BYOT, bringing additional challenges for companies. It notes that BYOD started as an effect of technology democratization rather than a business need. Companies now need to develop BYOD policies to address security concerns around personal and business data separation and access to internal infrastructure, as well as flexibility with diverse personal devices and technologies. The best way for companies to provide security is through a comprehensive BYOD policy and tools like MDM for mobile device management.
NEC's Top 10 Strategic Smart Enterprise Drivers 2022InteractiveNEC
Digital Transformation is recreating business models, changing the way customers and employees function and
altering whole industries. Social and business values surge when people, devices, and resources are connected.
With the COVID-19 pandemic a further catalyst, organizations worldwide are embracing digital transformation
to manage rapid organization-wide changes in support of business continuity, remote working, and dynamic
service delivery.
Read Navigating the Flood of BYOD to find out what challenges to secure your network architecture. When Total Application and Network Visibility is implemented, BYOD helps employees to stay in touch with their personal lives while keeping their business lives separate, preserving the confidentiality and integrity of each—all on the same device. This adds up to productivity, security and morale.
A BYOC program enables the use of employee-owned smartphones, tablets, and laptops for business use. The growing popularity and use of personal devices, such as the iPad, is challenging IT to develop a position on their use in the workplace.
This storyboard explores:
•The objectives for a successful BYOC deployment: reducing cost and complexity of desktop management; improving agility and accessibility; and ensuring that security is not sacrificed in achieving those goals.
•Building out the four pillars of capability to prepare your environment for BYOC: infrastructure, security, operations & support, and policy development.
•Refocusing efforts in the last mile by developing a clear communications strategy to manage expectations and prepare for change.
Success in BYOC can be achieved. Rather than just saying no, focus on how to drive positive, secure change in the desktop environment.
This document provides an overview and guidance on effectively supporting Bring Your Own Device (BYOD) programs. It discusses the challenges of the complex mobile landscape with many operating systems. It also distinguishes between consumer and enterprise mobile devices. The document outlines steps to take to support BYOD, including conducting a device audit, establishing guidelines and policies, using mobile device management software, and ensuring data security. It emphasizes the importance of having a comprehensive BYOD strategy to control costs and effectively manage devices and data.
In most of the small businesses, the employees might own latest and more advanced devices like tablets, Ultrabooks or laptops while their employers provide them with desktop computers which are at least 2 or 3 years outdated. So this would be a good opportunity for the businesses to compete with the rival companies. But there are a set of risks that go along with this concept as well, such as the data risk.
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Cognizant
Organizations rely on analytics to make intelligent decisions and improve business performance, which sometimes requires reproducing business processes from a legacy application to a digital-native state to reduce the functional, technical and operational debts. Adaptive Scrum can reduce the complexity of the reproduction process iteratively as well as provide transparency in data analytics porojects.
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingCognizant
The document discusses how most companies are not fully leveraging artificial intelligence (AI) and data for decision-making. It finds that only 20% of companies are "leaders" in using AI for decisions, while the remaining 80% are stuck in a "vicious cycle" of not understanding AI's potential, having low trust in AI, and limited adoption. Leaders use more sophisticated verification of AI decisions and a wider range of AI technologies beyond chatbots. The document provides recommendations for breaking the vicious cycle, including appointing AI champions, starting with specific high-impact decisions, and institutionalizing continuous learning about AI advances.
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesCognizant
Experience is becoming a key strategy for technology companies as they shift to cloud-based subscription models. This requires building an "experience ecosystem" that breaks down silos and involves partners. Building such an ecosystem involves adopting a cross-functional approach to experience, making experience data-driven to generate insights, and creating platforms to enable connected selling between companies and partners.
Intuition is not a mystery but rather a mechanistic process based on accumulated experience. Leading businesses are engineering intuition into their organizations by harnessing machine learning software, massive cloud processing power, huge amounts of data, and design thinking in experiences. This allows them to anticipate and act with speed and insight, improving decision making through data-driven insights and acting as if on intuition.
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...Cognizant
The T&L industry appears poised to accelerate its long-overdue modernization drive, as the pandemic spurs an increased need for agility and resilience, according to our study.
Enhancing Desirability: Five Considerations for Winning Digital InitiativesCognizant
To be a modern digital business in the post-COVID era, organizations must be fanatical about the experiences they deliver to an increasingly savvy and expectant user community. Getting there requires a mastery of human-design thinking, compelling user interface and interaction design, and a focus on functional and nonfunctional capabilities that drive business differentiation and results.
The Work Ahead in Manufacturing: Fulfilling the Agility MandateCognizant
Manufacturers are ahead of other industries in IoT deployments but lag in investments in analytics and AI needed to maximize IoT's benefits. While many have IoT pilots, few have implemented machine learning at scale to analyze sensor data and optimize processes. To fully digitize manufacturing, investments in automation, analytics, and AI must increase from the current 5.5% of revenue to over 11% to integrate IT, OT, and PT across the value chain.
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...Cognizant
Higher-ed institutions expect pandemic-driven disruption to continue, especially as hyperconnectivity, analytics and AI drive personalized education models over the lifetime of the learner, according to our recent research.
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Cognizant
The document discusses potential future states for the claims organization of Australian general insurers. It notes that gradual changes like increasing climate volatility, new technologies, and changing customer demographics will reshape the insurance industry and claims processes. Five potential end states for claims organizations are described: 1) traditional claims will demand faster processing; 2) a larger percentage of claims will come from new digital risks; 3) claims processes may become "Uberized" through partnerships; 4) claims organizations will face challenges in risk management propositions; 5) humans and machines will work together to adjudicate claims using large data and computing power. The document argues that insurers must transform claims through digital technologies to concurrently improve customer experience, operational effectiveness, and efficiencies
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Cognizant
Amid constant change, industry leaders need an upgraded IT infrastructure capable of adapting to audience expectations while proactively anticipating ever-evolving business requirements.
Green Rush: The Economic Imperative for SustainabilityCognizant
Green business is good business, according to our recent research, whether for companies monetizing tech tools used for sustainability or for those that see the impact of these initiatives on business goals.
Policy Administration Modernization: Four Paths for InsurersCognizant
The pivot to digital is fraught with numerous obstacles but with proper planning and execution, legacy carriers can update their core systems and keep pace with the competition, while proactively addressing customer needs.
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalCognizant
Utilities are starting to adopt digital technologies to eliminate slow processes, elevate customer experience and boost sustainability, according to our recent study.
AI in Media & Entertainment: Starting the Journey to ValueCognizant
Up to now, the global media & entertainment industry (M&E) has been lagging most other sectors in its adoption of artificial intelligence (AI). But our research shows that M&E companies are set to close the gap over the coming three years, as they ramp up their investments in AI and reap rising returns. The first steps? Getting a firm grip on data – the foundation of any successful AI strategy – and balancing technology spend with investments in AI skills.
Operations Workforce Management: A Data-Informed, Digital-First ApproachCognizant
As #WorkFromAnywhere becomes the rule rather than the exception, organizations face an important question: How can they increase their digital quotient to engage and enable a remote operations workforce to work collaboratively to deliver onclient requirements and contractual commitments?
Five Priorities for Quality Engineering When Taking Banking to the CloudCognizant
As banks move to cloud-based banking platforms for lower costs and greater agility, they must seamlessly integrate technologies and workflows while ensuring security, performance and an enhanced user experience. Here are five ways cloud-focused quality assurance helps banks maximize the benefits.
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedCognizant
Changing market dynamics are propelling Asia-Pacific businesses to take a highly disciplined and focused approach to ensuring that their AI initiatives rapidly scale and quickly generate heightened business impact.
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...Cognizant
Intelligent automation continues to be a top driver of the future of work, according to our recent study. To reap the full advantages, businesses need to move from isolated to widespread deployment.
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
Making BYOD Work for Your Organization
1. Making BYOD Work
for Your Organization
The “bring your own device” movement compels organizations to strike
the right balance between employee freedom and corporate control over
technology. Organizations should take a measured approach to transition
to BYOD and chart a middle path to reap its benefits to avoid falling behind
proactive competitors.
| FUTURE OF WORK
2. Executive Summary
The influx of personal smartphones, tablets and laptops that
connect with and use corporate resources is challenging
companies to walk a fine line between channeling the
benefits of employees purchasing and using their own
mobile devices and making these devices secure and cost-
effective enough for the enterprise.
Known as BYOD, or bring your own device, this consumer-led
movement is transforming enterprise workspaces by extend-
ing the notion that 21st century employees need to work from
anywhere, at anytime and on their devices of choice, both
within and outside of the traditional corporate structure.
BYOD is not only disrupting the traditional way technology is
provisioned, paid for and used, but it also promises the dual
benefits of simultaneously driving down IT costs while improv-
ing employee productivity and satisfaction.
The BYOD trend holds immense potential to transform
business, enable agility and encourage innovative ways of
interacting with customers and business partners. The key
is to approach BYOD holistically, responding to employee
expectations while fulfilling business requirements for
security, compliance and risk mitigation.
Transitioning to a BYOD model should be phased in over
time. Organizations need to mitigate security risks, such
as inappropriate usage or loss of corporate data and
the ensuing financial and legal implications. Establishing
effective governance mechanisms to ensure data privacy
and security can be challenging when embracing a BYOD
philosophy. In addition, advances in consumer technology
and device heterogeneity are creating complexities that
can undoubtedly turn into nightmares for IT if not handled
properly.
June 2012 MAKING BYOD WORK FOR YOUR ORGANIZATION 2
3. Organizations should deconstruct traditional workspaces,
using virtualization to decouple dependencies among hard-
ware, OS, applications and user states found in traditional
desktop configurations. This gives them greater flexibility to
stream the right set of user profile, data and applications on-
demand, at the right performance level and in a secure manner
to any device, based on employee roles and IT requirements.
For the foreseeable future, companies should take a
limited BYOD approach (the middle path), with finite lists of
supported devices that are easier and less costly to manage.
A limited-BYOD infrastructure that is platform and OS-
agnostic will help minimize security breaches and the
organizational resources needed to support and manage
employee-owned devices. Deploying the right combination
of mobile device management (MDM), mobile application
management (MAM) and mobile application development
platform (MADP) solutions can help organizations secure and
quickly update business apps on employee devices and perform
compliance reporting, all while providing employees the flexibil-
ity they demand, resulting in improved productivity and higher
satisfaction.
Unlike previous waves of technology change, BYOD promises
to pervade all parts of the business. Proactive organiza-
tions that embrace this trend and mold it in suitable ways to
benefit the business will gain the critical lead to out-perform the
competition.
3 FUTURE OF WORK June 2012
4. BYOD Beginnings
The proliferation of affordable computing devices and technology in the 1980s
and ‘90s had organizations scurrying to adjust to the trend of employees using
non-corporate devices for work. Being off the IT radar, portable computers and
first-generation handheld devices confounded many organizations that recognized
their utility but could not fully embrace them because of the command and control
issues they raised.
Today, with even greater advances in consumer technology, mobile applications
and the affordability of smart and powerful mobile devices, organizations are
more challenged than ever to incorporate them into the enterprise IT architecture.
IT departments are understandably concerned about the security and data privacy
risks that accompany the BYOD movement, as well as the increased support costs.
But the genie is out of the bottle. BYOD holds the promise of not only enabling
companies to become more agile and customer-focused, but also helping
employees rapidly create and apply knowledge at work, which is key to deriv-
ing competitive advantage in a knowledge-driven economy. The issue today
is for enterprises to embrace these changes in ways that improve organiza-
tional effectiveness and productivity while mitigating risk. Organizations need
to be proactive in avoiding the mistakes of the past so they can benefit from
the cost and productivity advantages of BYOD initiatives, as well as the ability to
meet employee expectations and enable anytime/anywhere work.
IT Consumerization and BYOD
Consumerization of IT is transforming the traditional IT landscape of organizations
and the way employees use technology. The traditional lines between work and
personal life continue to blur for employees. Seeking flexibility and choice in how
they work, more and more employees are using their personal (smart) devices in
the workplace. An IDC survey found that in 2011, 40% of devices used by informa-
tion workers to access business applications were personal devices, compared with
30% in 20101 (see Figure 1), a 33% increase in just one year. According to the survey,
30% of information workers used their PCs, and 10% used their tablets for
Devices Used to Access Business Applications
2010 2011
30.7%
Personal PC, 40.7%
smartphone Personal PC,
smartphone,
59.3% tablet
69.3% Business PC,
Business PC, smartphone,
smartphone tablet
Personally-owned Company-owned
Base for 2010: 2,820 responses from enterprises with Base for 2011: Over 3,000 information workers and
500 or more employees from 10 countries. business executives from nine countries.
Source: IDC Information Worker Custom Survey, May 2011 and May 2010.
Figure 1
June 2012 MAKING BYOD WORK FOR YOUR ORGANIZATION 4
5. work-related tasks. BYOD demand and adoption varies by industry, with financial
services, insurance, healthcare and professional services leading the way
(see Figure 2).2
As businesses realize that they can no longer dictate what devices should be
used at work, many are looking for ways to approach BYOD to advance their
strategic agenda.
Benefits for Employees and Organizations
A major driver of BYOD is the productivity advantage resulting from improved
employee satisfaction and worker mobility, as well as lower costs of technology
adoption and refresh (see Figure 3, next page). Other benefits include:
Increased productivity and employee satisfaction. BYOD provides the
flexibility that employees seek to respond instantly to work requests outside of
work hours, thus reducing process times and improving operational efficiency.
In addition, employees report higher satisfaction levels with such flexible work
arrangements and the freedom to use their devices of choice.
Attracting, retaining and supporting new talent. Expected to soon become
the largest segment of the workforce, many millennials openly seek environ-
ments that allow them the freedom to use tools and technologies native to their
upbringing and customized to their work and life preferences (see Figure 4,
page 7).
Lower IT procurement, support costs. BYOD promises considerable cost
savings if employees are willing to bear the cost of purchasing, maintaining and
upgrading the devices they use for work. Though BYOD necessitates a one-time,
upfront investment to create the support infrastructure, it can result in lower
total cost of ownership in the long run.
Improved collaboration. Employee-owned devices equipped with enhanced
mobile services allow employees to collaborate in real time and finish their tasks
efficiently by responding quickly. With virtualization, ubiquitous connectivity,
anywhere access to corporate data, and innovative mobile apps, the opportuni-
ties for collaborative ways of working have grown immensely.
BYOD Support By Industry
Finance/Insurance
Healthcare
Professional Services
Manufacturing
Transportation/Logistics
Legal
Software
Government (Federal)
Communications
Retail/Wholesale
Life Sciences
Government (Local)
Entertainment/Media
0% 5% 10% 15% 20% 25% 30% 35% 40%
Currently support Planning to support: Next 6 months Planning to support: Next 6-12 months
Considering, no specific timeframe Not planning to support
Source: Good Technology
Figure 2
5 FUTURE OF WORK June 2012
6. Transforming the workplace. The combination of managed personal devices
and cloud computing with desktop and application virtualization can help
organizations enable secure access to key corporate resources anytime and
anywhere for their employees. The confluence of cloud, virtualization and
mobility is transforming the way employees work today, allowing them to be
creative and innovative in ways previously unobtainable.
BYOD Implementation Challenges
Without a doubt, the proliferation of myriad smart mobile devices creates
complexities that are overwhelming many organizations. With limited control
over and vast choice of mobility devices, today’s organizations face considerable
challenges in protecting data, ensuring security, providing support, meeting
compliance regulations and lowering IT costs to manage a BYOD environment.
Protecting data. Compared with most corporate hardware resources, employee-
owned devices are more prone to theft and loss because of their size, perceived
value and portability. For organizations, tracking lost personal devices and
wiping sensitive corporate data stored on them is a major challenge.
Security. The heterogeneity in the device landscape makes it challenging to
develop and implement appropriate security measures. In addition, their
advanced features — such as high-resolution cameras, recording functions and
large storage capacity — can circumvent many traditional IT security measures.
The possibility of employees inadvertently exposing their devices to malicious
attacks while using them outside work is a serious risk. For organizations
operating in regulated environments bound by compliance mandates, ensuring
security for corporate resources while allowing BYOD can be a tightrope walk.
Support. Providing support for the numerous devices used by employees —
while offering the potential for significant reductions in overall support costs — is
a major implementation challenge. IT departments may be overwhelmed if they
lack the appropriate resources to implement the changes necessary to support
BYOD.
BYOD Drivers
Improved employee satisfaction
Increased worker productivity
Greater mobility for workers
More flexible work environments for employees
Reduced IT costs
Attracting/retaining high-quality staff
Better quality of devices used by workers
Better care and/or longevity of devices
Reduced device management requirements for IT
Faster onboarding of employees and third parties
Improved business continuity
Other
0% 10% 20% 30% 40% 50% 60%
Base: 700 IT professionals in seven countries, including Australia, Percent of respondents
Canada, Germany, India, Netherlands, U.S. and UK.
Source: Citrix Global BYO Index
Figure 3
June 2012 MAKING BYOD WORK FOR YOUR ORGANIZATION 6
7. BYOD costs. The potential to save money depends on how well organizations
understand and manage the required expenditure. Companies run the risk of
unnecessary BYOD outlays, such as reimbursing employees’ mobile expenses,
processing related expense reports, investing in solutions to support heteroge-
neous devices and customizing apps to run on those platforms.
Compliance requirements. Compliance mandates such as HIPAA,3 PCI DSS4 and
GLBA5 are particular about safeguarding data, regardless of the device on which
data is stored. Organizations are subject to heavy fines in the event of data
breaches. Given device heterogeneity and the scant regard today’s workforce
seems to have for IT policies, the cost of staying compliant, addressing risk and
establishing proper governance can be daunting.6
Overcoming BYOD Barriers
Yet the benefits afforded by BYOD make it worth proactively pursuing. To
support the myriad devices, configurations and applications, organizations need
to have a robust and scalable infrastructure. Additionally, it requires support
staff, especially IT expertise, to acquire the appropriate skills to manage this new
environment and infrastructure.
A platform- and OS-agnostic BYOD infrastructure will provide controls to limit
security breaches, as well as minimize organization support and management of
employee-owned devices. By deploying the right combination of MDM, MAM and
MADP solutions, organizations can secure and quickly update business apps on
employee devices, as well as perform compliance reporting. It can also provide IT
departments some degree of visibility and control over the devices and apps used
by employees.
Infrastructure Provisioning
Managing the complexity of a BYOD environment requires organizations to
intelligently provision the infrastructure and access to corporate resources.
Business Staff Expects To Be Self-Sufficient And Empowered
By 2020,
45% of your
workforce
34% of 45%
will be
22% of your millennials
millennials.†
employees say they
39% of have better
have used
millennials technology
a service
select their at home
delivered Empowered,
own mobile than they
25% over the Web tech-savvy
Millennials phone, have at
to help employees
in the regardless of work.*
them get their
workforce 66% of your what IT
job done.*
employees supports.*
select their
own mobile
phone. *
2010 2015 2020
* Forrsights Workforce Employee Survey, Q3 2010, Forrester Research, Inc.
† Bureau of Labor Statistics and Forrester Research
Source: Forrester Research, Inc.
Figure 4
7 FUTURE OF WORK June 2012
8. Virtualization. Providing access to corporate data and enterprise applications
from a centralized location gives IT greater control over safeguarding enterprise
resources regardless of the devices in use. In this way, virtualization accommo-
dates the diverse devices used at work and eliminates the IT and business costs
of customizing apps and creating access mechanisms.
“Containerization.” This approach separates corporate data into secure
“container” structures on devices and allows organizations full control over
them. By using either a self-contained, secured application and data construct
or a completely separate mobile OS via a hypervisor, organizations can isolate
or contain corporate data on personal devices.
With the hypervisor, multiple instances of an operating system can be run on a
single device, essentially creating virtual devices. This way, organizations can
completely isolate the OS and partition the portion used for corporate applica-
tions and data from the one used for personal purposes. With the self-contained
construct, applications and data are run in a separate memory space on the
device. Access to this information is secured via additional authentications and
can be selectively removed in the case of device loss or employee retirement.
These containerization methods allow IT departments to manage and monitor
the corporate applications and data effectively and securely without impinging
on the personal data on employees’ devices.
Encryption. This provides a strong layer of security for devices, applications
and data. It also makes it difficult for anyone to view and obtain data from lost
devices without the encryption key.
BYOD in phases. Embracing a limited BYOD model is key to handling
the complexity that personal devices introduce. Carefully evaluating the
requirements of employees based on their roles and limiting device support
will help IT departments gain some control over management and security
challenges. Allowing only secure and compliant personal devices for work can
help organizations alleviate their concerns over security, support issues and
costs so they can create an infrastructure to accommodate them.
Creating a Holistic BYOD Strategy and Policy
Deciding on a BYOD implementation path can be challenging for many organiza-
tions. The BYOD journey should begin with the understanding that the strategy
needs to be all-inclusive and balance the risks and rewards for employees and
employers.
Strategy
Essential to the formulation of a BYOD strategy is understanding employee
roles and how they relate to the use of mobile devices at work. Organizations should
group users into broad categories that consider the kind of work they do on a daily
basis and the necessary IT requirements to support them. Ideally, BYOD should be
rolled out only to qualifying employees. The strategy should factor in the nature of the
business and industry in which an organization operates to identify how it can stay
compliant, especially on data security/privacy and usage mandates. It should also
specify the kind of device configurations, preferred vendors and brands that
support the organization’s business needs.
An important consideration is balancing enablement with control. This will
require organizations to decide on the proper application of MDM, MAM
and MADP solutions and whether these should be managed in-house or
contracted out to vendors. The transition to BYOD should start only after an
organization assesses the net benefits it expects to realize from the initiative.
June 2012 MAKING BYOD WORK FOR YOUR ORGANIZATION 8
9. Another key element is the cost BYOD entails in setting up new infrastructure
and ensuring support for diverse technologies in a non-standard environment.
Organizations should also determine the liability they are willing to assume (see
Figure 5), as well as the tax and legal implications of allowing BYOD, especially
when reimbursing employee expenses.
To support BYOD, organizations also need to prepare enterprise applications to
work with the allowed set of personal devices, which entails customizing, developing
and updating applications to work with personal devices. Support is another critical
aspect, as employees need anytime, anywhere access to either live agents or
self-help tools. A mix of sourcing, automation and strong technical customer
support is essential to a robust BYOD support model. A successful strategy will
ensure that IT and the business units agree on how to approach the BYOD program.
Companies should consider a middle path between the two extremes of the
complete freedom that employees desire and the full control that
organizations seek over personal device work usage. A flexible and scalable
strategy will better accommodate the growing demand for BYOD, given the rapidly
evolving device technology landscape.
Policy
Implementing the BYOD strategy is only possible with a comprehensive policy.
To develop an effective policy, organizations need to define and understand factors
such as:
Which devices and operating systems to support.
Security requirements based on employee role and designation.
The level of risk they are willing to tolerate.
Employee privacy concerns.
Employee demand for freedom in how they work and use technology has
serious ramifications for IT environments. This demand is altering IT
departments’ traditional structure and scope of control. Understanding this altered
Employee vs. Company Liability
Corporate Corporate
• Better control over devices can Liable, Liable, • Reduced IT overhead
be applied (blocking of Capped Complete • Reduced device procurement
marketplace applications, etc.) Expense Expenses Paid cost (Cap-Ex)
• Better security • Better choice of device
• Comparatively easier for • Challenges in deploying
enforcing policy and corporate applications due to
compliance Individual Individual non-standardization of OS
Liable, Liable,
• Need for application license
No/Capped Complete
management
Expense Expenses Paid
• Better control over expenditure
• Reduced device running cost (direct Op-Ex cost)
Corporate liable devices are recommended for environments with higher data security risks (e.g., financial services);
individual liable devices are recommended for environments with lower data risks (e.g., education).
Source: Cognizant
Figure 5
9 FUTURE OF WORK June 2012
10. environment will give organizations a better idea of what to consider while drafting
BYOD policies (see Figure 6).
BYOD Policy Framework
A comprehensive BYOD policy is an essential component of a successful BYOD
program. An effective policy should include the following:
Devices
» Scalability of devices: Flexible guidelines need to determine which devices
are evaluated on an ongoing basis, particularly as new devices, platforms and
operating systems emerge and employee expectations evolve.
» Device criteria: Comprehensive evaluation criteria need to specify which
devices are allowed and how employees will be notified that their devices
satisfy that criteria.
» Supported configurations and platforms: Customized user agreements
should account for the varied combinations of devices, the platforms they
run and the regulatory requirements specific to the region(s)/industry(s) in
which the organization operates.
» Device certification: A methodology is needed to evaluate and certify a
device. The policy should provide a list of compliant and preferred vendors
for sourcing devices and licensing for core applications required.
» Device support: A clear statement needs to detail how employee-owned
devices will be configured, which applications will be supported and the
type of support that will be provided. If the company wants to encourage a
“self-support” culture, it should provide self-help/support tools to users.
» Security: The organization needs to define its stance on how corporate
data will be retrieved and wiped in case of device loss or theft, as well as the
rights it reserves for dealing with corporate data and applications. It should
outline restrictions on usage of device features such as cameras, storage and
recording functions and should stipulate the use of anti-virus and malware
software and the frequency of updates.
Defining BYOD Policies
Policy Element Traditional IT Policy BYOD Policy
Devices, device Standardized. Complex and heterogeneous.
configurations and
operating systems
Mobile applications Full command and control over data Limited control over corporate partitions, data and apps.
and data and apps.
Device tracking and Full IT control over evaluating how Clarification of how devices are tracked and monitored, as well as
monitoring devices are used, with no express which portion of the devices and data will fall under the policy’s
permission required from users. purview.
Cost reimbursement No provision for reimbursement of Definition of who pays for what, based on an understanding
company-owned device costs. between employees and employer.
Figure 6
June 2012 MAKING BYOD WORK FOR YOUR ORGANIZATION 10
11. Users
» Eligibility: Eligibility requirements need to be created, as well as the criteria
used to establish eligibility. Role-based restrictions regarding access to
certain applications and data should also be clearly stated. Organizations
should describe the procedure for obtaining approval for using personal
devices.
» Acceptable usage: Employees should be required to understand their
responsibilities with regard to acceptable use and minimum device
connectivity requirements. The policy should encourage employees to
prioritize business-related use when they are at work.
» Compliance and governance: Communicate non-compliance to users and
outline the remedial actions they can take to be compliant. Organizations
should get executive buy-in for the BYOD policy and involve all related
departments, such as HR, finance, legal and operations, apart from IT.
» Ownership and liability: Guidelines must be clarified on who owns the device
and the data. These should define liabilities related to loss of corporate data
stored on personal devices, as well as the liability the organization is willing to
accept for affecting personal data due to the management of corporate data
and apps.
» Reimbursement considerations: The organization needs to define its stance
on reimbursement. The extent of reimbursement (full, partial), the limits
(allowed expenses, maximum amount), the frequency (one-time, monthly,
yearly) and eligibility (based on role) will help guide the organization when
formulating its stance.
» Policy violations: The company needs to prescribe actions in the event of
violations of policy guidelines.
Implementing BYOD Policy
A clear policy on the types of devices allowed as part of a BYOD program helps
organizations attain a certain level of standardization and allocate the necessary
Defining User Profiles and Their Needs
Examples Typical Work Pattern IT Requirements
Knowledge Scientists, designers, • Rich user experience, with multiple • Data security and compliance
Workers statisticians computer applications and tools • Flexibility to access multiple desktop computers
running locally • Application-specific security and regulatory
compliance efforts
Office Workers Admins, HR, finance • Routine workflows, with multiple • Data security and compliance
computer applications and tools • PC integrity
running locally • Application-specific security and regulatory
compliance efforts
Executive & Function heads, • Similar to knowledge/ • Data security and compliance
Mobile Workers sales reps office workers • PC integrity
• Offline computing • Application-specific security and regulatory
• Anytime, anywhere access compliance efforts
• Offline access to files and data
Task Workers Call center reps, retail • Simplified and streamlined • Data security and compliance
agents, factory workers user experience • PC integrity
• No requirements to save • Highly controlled environment
data locally • Low-cost hardware solution that maintains
high user productivity
Contract External contractors, • Local and remote access • Data privacy and confidentiality
Workers third-party collaborators • Low-cost hardware solution that maintains
high user productivity
Source: Cognizant
Figure 7
11 FUTURE OF WORK June 2012
12. infrastructure to support the devices. Customized policies mapped to the roles of
users and their dependence on the devices will be an effective way of limiting risk.
Segregating users into broad categories such as mobile workers, office knowledge
workers and task workers will help organizations better understand their needs and
provision the appropriate IT requirements accordingly. The policy should consider
the role, the kind of work performed and the mobility needed to determine the
capabilities required of a personal device. For example, a senior executive is more
likely to use a tablet to review and approve work, while a designer or an engineer
will prefer a desktop or a laptop. Organizations can derive insights from the BYOD
implementations of early movers and absorb the best practices into their policies.
Transitioning to BYOD
BYOD is transforming traditional end-user workspaces by unshackling the
dependencies of employees tied to a physical location, a rigidly configured device,
OS, applications and user states and allowing them to work from anywhere, access-
ing applications and content using myriad device configurations. Organizations
looking to profit from a BYOD setup should ensure that employees have the right
virtual workspace from any device and a productive work and collaboration plat-
form, while ensuring effective security for corporate information and ease of
access.
To do so, organizations should deconstruct traditional workspaces and decouple
the dependencies among hardware, OS, applications and user states found in
traditional desktop configurations. By isolating and centralizing operating systems,
applications and user data and state, users can access data and apps from any
device, from anywhere, and organizations can manage and monitor apps and
corporate assets efficiently. Once they have categorized employees into broad pools
based on their work and IT requirements, organizations can stream the right set of
user profile, data and applications on-demand, at the right performance levels and
on any device, securely (see Figure 7, previous page). Taking a pilot approach to
BYOD, organizations can establish the reference architecture for an “any device,
anywhere access” model.
Transitioning to the BYOD Model
Investment New Setup Employee
ROI Analysis Implementation Onboarding Process
• Baseline current TCO • Build enabling • Define trigger for
• Identify one-time infrastructure for onboarding
investments solution identified • Define policies
• Assess ongoing cost • Finalize sourcing • Create implementation
with new model options checklist
• Go/no-go • Define new • Create communication
support model plans
Creating a compliance audit framework to ensure success
Source: Cognizant
Figure 8
June 2012 MAKING BYOD WORK FOR YOUR ORGANIZATION 12
13. Organizations currently have only two choices when it comes to BYOD – adopt it
now or later. A transition to the BYOD model should occur in a phased manner
(see Figure 8, previous page).
First, organizations should analyze their return on the investment of enabling
and supporting BYOD. They need to consider the costs of setting up the required
infrastructure, one-time investments in MDM, MAM and MADP solutions,
supporting the program and reimbursements for device purchases. Looking at
returns over the long term and the possible value-additions from such a program
will be a better yardstick to measure the ROI.
Second, they should examine the current infrastructure that is designed to
support corporate-issued devices and bolster it with the additional capabili-
ties required to support BYOD programs. Organizations should be proactive
and recommend to employees the ideal devices and platforms that can quickly
deliver the desired benefits. Organizations should ideally recommend preferred
vendors and discounted pricing contracts for devices and apps to help minimize
costs.
Lastly, a critical step is that the employee onboarding process should be smooth
and simple.
The Future of BYOD
BYOD introduces a multitude of challenges; however, organizations should treat this
as an opportunity that can yield significant benefits, both tangible and intangible.
The key is to approach BYOD in a holistic fashion to address employee expectations,
while ensuring business requirements are met related to security, compliance and
risk minimization. The need for agility and speed will more rapidly transform the
role of IT from a support function to a strategic, business-enabling function.
Successful organizations will take a proactive approach to embracing and
molding BYOD for competitive advantage and the agility to outmaneuver the
competition. Creating obstacles to BYOD will be futile as empowered employees
are provisioning their own technology anyway. Younger employees and those
with a millennial mindset find it hard to draw the line between their personal and
professional lives and seek the flexibility and ease-of-use that their personal devices
provide. Implemented with the right strategy, BYOD can:
Empower employees to improve their productivity through their choice of
devices and collaboration styles.
Ensure security of corporate data while complying with corporate mandates on
compliance, risk management and privacy.
Deliver cost savings with minimal IT support for employee-owned devices.
Simplify IT by running any app, anywhere, on any device.
13 FUTURE OF WORK June 2012
14. Footnotes
“2011 Consumerization of IT Study: Closing the Consumerization Gap,” IDC, 2011,
1
http://www.unisys.com/unisys/ri/report/detail.jsp?id=1120000970016710178.
2
“Good Technology State of BYOD Report,” Good Technology, December 2011,
http://www.good.com/resources/Good_Data_BYOD_2011.pdf.
3
Health Insurance Portability and Accountability Act.
4
Payment Card Industry Data Security Standard.
5
Gramm-Leach-Bliley Act.
6
“Cisco 2011 Annual Security Report,” Cisco, 2011, http://www.cisco.com/en/US/
prod/collateral/vpndevc/security_annual_report_2011.pdf.
References
Tom Kaneshige, “BYOD: Five Hidden Costs to a Bring-Your-Own-Device Programme,”
Computerworld UK, April 2012, http://www.computerworlduk.com/in-depth/mobile-
wireless/3349518/byod-five-hidden-costs-bring-your-own-device-progamme/.
“Bring Your Own Device: Agility Through Consistent Delivery,”
PricewaterhouseCoopers, 2012, http://www.pwc.com/en_US/us/increasing-it-effec-
tiveness/assets/byod-1-25-2012.pdf.
“Best Practices to Make BYOD Simple and Secure,” Citrix, March 2012,
http://docs.media.bitpipe.com/io_10x/io_104481/item_530202/BYOD%20
Best%20Practices%20Guide.pdf.
“Leaders in Enterprise Mobile Strategies: Tug of War Between Business Value
and Risks,” SandHill Group, November 2011, http://sandhill.com/reports/leaders-in-
enterprise-mobile-strategies-tug-of-war-between-business-value-and-risks/.
Cimarron Buser, “How Workers Can BYOD Without Risking Data, Networks,”
Mobile Enterprise, August 25, 2011, http://mobileenterprise.edgl.com/how-
to%5CHow-Workers-Can-BYOD-Without-Risking-Data,-Networks-75175.
“Mobile Virtualization Offers Enterprises a Way to Embrace the Consumerization
of IT, According to New Research from IDC,” IDC, June 7, 2011, http://www.idc.com/
getdoc.jsp?containerId=prUS22864311.
James Staten and Alex Cullen, “BT 2020: IT’s Future in The Empowered Era,”
Forrester Research, January 2011. http://www.forrester.com/BT+2020+ITs+Future+
In+The+Empowered+Era/fulltext/-/E-RES58156?docid=58156.
June 2012 MAKING BYOD WORK FOR YOUR ORGANIZATION 14
15. Credits
Author and Analyst
Aala Santhosh Reddy, Senior Research Analyst, Cognizant Research Center
Subject Matter Experts
Jeff Wallace, Assistant Vice President and Cognizant Mobility Practice Leader
Tim Rose, Associate Director, Cognizant IT Infrastructure Services Product Management
Anindo Sengupta, Associate Director, Cognizant IT Infrastructure Services
Design
Harleen Bhatia, Design Team Lead
Suresh Sambandhan, Designer
About Cognizant
Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process out ourcing services, dedicated to
s
helping the world’s leading companies build stronger businesses. Headquartered in Teaneck, New Jersey (U.S.), Cognizant combines a passion
for client satisfaction, technology innovation, deep industry and business process expertise, and a global, collaborative workforce that embodies
the future of work. With over 50 delivery centers worldwide and approximately 140,500 employees as of March 31, 2012, Cognizant is a member
of the NASDAQ-100, the S&P 500, the Forbes Global 2000, and the Fortune 500 and is ranked among the top performing and fastest growing
companies in the world.
Visit us online at www.cognizant.com or follow us on Twitter: @Cognizant.