SlideShare a Scribd company logo
Bring Your Own Device

        Alan Shields
Cambridgeshire County Council
My Car?
My First Mobile
B YOD
  U
Use your Own Device
Infrastructure must cover:

    Connection
     As these devices will not be directly connected to your network, you need a secure method
     of connection.

    Authentication
     If you can, best to use something you already use such a Active Directory or other similar
     LDAP services.

    Security
     Beyond the network connection, you must have a means of managing/ administrating
     these devices. This is often called “Mobile Device Management”.

    Data access
     Not all these devices will have the capability to connect to your normal network file storage
     so consider more agnostic methods of data access such a SharePoint, internal versions of
     “DropBox” or other WebDAV/FTP functionality.
Possible Uses for BYOD

  Communication   Information




   Transaction      Other
So, what are we doing in
    Cambridgeshire?
So, what are we doing in
    Cambridgeshire?

   Dynamic Mobile Exchange (DME) by Excitor




   Good for Enterprise by Good Technology
The Pilot was run to determine some of the
following:
  Suitability of the software (incl. usability and
  security)
  Acceptance by staff to use their own devices
  Effectiveness of “light-touch” training and support
  To determine and calculate any cost
  savings/benefits
Security
Security
Acceptance
The Pilot was limited to 50 users and to get volunteers, messages
were posted on the Council’s intranet pages. Within 3 days we
had over 150 requests. Whilst that does not seem many out of a
5,000-strong user base, it proved there was some appetite for staff
wanting to use their own devices.
Training and Support
Suitability

    70% of pilot users found sending and receiving emails as “Easy” or “Very Easy”.
    69% found handling attachments “Easy” or “Acceptable”.
    50% rated the calendar functionality as “Easy” or “Very Easy”.
    Other functionality (i.e. Contacts, Tasks etc.) was only used by a very small number of pilot
    users.

Acceptance

    69% of pilot users rated the DME product as either “Essential” or “Very Useful”.
    Only 4% of pilot users stated that running the DME client affected either their handset’s
    performance and/or battery life.
    77% of pilot users wished to continue using the service after the pilot had ended.

Training and Support

    98% of pilot users rated downloading and installing the software as “Easy” or “Very Easy”.
    77% of pilot users rated the training documentation as either “Good” or “Excellent”.
Savings and benefits
In summary
In summary, BYOD (or UYOD) is here to stay and will become a demand
from both your current and future employees. However, don’t (seriously)
comprise your security – get the right product and have a clearly defined
BYOD user policy that outlines what you expect from the employee and
what they can expect from you. Indeed, BYOD is s culture change for you
IT department. No longer will they have ultimate control of who uses what
and where. However, in reality, that control is probably being lost already
by staff using their own devices in a non-managed, unsecure way.

   Introducing a proper BYOD strategy will wrestle just enough
   of that control back to hopefully make everyone happy.
Next Steps…
…in Cambridgeshire?

Plan to have the DME product in full production and available to
all suitable users by the end of the calendar year. This includes a
slight delay as we are also migrating our email system from
Exchange 2003 to 2010.
Thank you.

Email: alan.shields@cambridgeshire.gov.uk

        Excitor: www.excitor.com
        CNS:     www.cnsuk.co.uk

More Related Content

What's hot

AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
Proyet Kft
 
Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project
ILM Professional Services
 
Connected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationConnected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems Integration
UBMCanon
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
Citrix
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
Ivanti
 
Enterprise Solutions
Enterprise SolutionsEnterprise Solutions
The Top 10 IT Issues in Higher Ed
The Top 10 IT Issues in Higher EdThe Top 10 IT Issues in Higher Ed
The Top 10 IT Issues in Higher Ed
Extreme Networks
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
Aujas
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
Citrix
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ivanti
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
Ivanti
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
OneLogin
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
Softchoice Corporation
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primend
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the Cloud
Emtec Inc.
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
Mobile Device Management Solution
 
Facts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To KnowFacts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To Know
ChromeInfo Technologies
 

What's hot (20)

AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project Updating Legacy Systems: Making the Financial Case for a Modernization Project
Updating Legacy Systems: Making the Financial Case for a Modernization Project
 
Connected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationConnected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems Integration
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Enterprise Solutions
Enterprise SolutionsEnterprise Solutions
Enterprise Solutions
 
The Top 10 IT Issues in Higher Ed
The Top 10 IT Issues in Higher EdThe Top 10 IT Issues in Higher Ed
The Top 10 IT Issues in Higher Ed
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
 
eCare Presentation ORL Alex2
eCare Presentation ORL Alex2eCare Presentation ORL Alex2
eCare Presentation ORL Alex2
 
How to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access RightsHow to Stay on Top of Users' Identities and their Access Rights
How to Stay on Top of Users' Identities and their Access Rights
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the Cloud
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Facts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To KnowFacts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To Know
 

Viewers also liked

Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel
Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel  Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel
Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel Incisive_Events
 
Influence and Leadership - Simon Edwards
Influence and Leadership - Simon EdwardsInfluence and Leadership - Simon Edwards
Influence and Leadership - Simon EdwardsIncisive_Events
 
Alain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producersAlain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producersIncisive_Events
 
Louise Corti Data scientists
Louise Corti Data scientistsLouise Corti Data scientists
Louise Corti Data scientistsIncisive_Events
 
Phil Bradley The future of Search
Phil Bradley The future of SearchPhil Bradley The future of Search
Phil Bradley The future of SearchIncisive_Events
 
Open source @ FAO - Rachele Oriente
Open source @ FAO - Rachele OrienteOpen source @ FAO - Rachele Oriente
Open source @ FAO - Rachele OrienteIncisive_Events
 
david nicholas - consequences for information seeking and reading behaviours ...
david nicholas - consequences for information seeking and reading behaviours ...david nicholas - consequences for information seeking and reading behaviours ...
david nicholas - consequences for information seeking and reading behaviours ...Incisive_Events
 
Supporting the Knowlege Sharing in DECC - C. Harding
Supporting the Knowlege Sharing in DECC - C. Harding Supporting the Knowlege Sharing in DECC - C. Harding
Supporting the Knowlege Sharing in DECC - C. Harding Incisive_Events
 
Social Business - Alpesh Doshi
Social Business - Alpesh DoshiSocial Business - Alpesh Doshi
Social Business - Alpesh DoshiIncisive_Events
 
The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard Incisive_Events
 
Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley Incisive_Events
 
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom CraneManaging Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom CraneIncisive_Events
 
James Andrews User Engagement
James Andrews User EngagementJames Andrews User Engagement
James Andrews User EngagementIncisive_Events
 
From Discovery to Delivery - Daniel Mayer
From Discovery to Delivery - Daniel MayerFrom Discovery to Delivery - Daniel Mayer
From Discovery to Delivery - Daniel MayerIncisive_Events
 
Big Data as Opposed to Small Data Mark Whitehorn
Big Data as Opposed to Small Data Mark WhitehornBig Data as Opposed to Small Data Mark Whitehorn
Big Data as Opposed to Small Data Mark WhitehornIncisive_Events
 
Ellyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information servicesEllyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information servicesIncisive_Events
 
Putting Parsimonious Preservation Into Practice - Tim Gollins
Putting Parsimonious Preservation Into Practice - Tim GollinsPutting Parsimonious Preservation Into Practice - Tim Gollins
Putting Parsimonious Preservation Into Practice - Tim GollinsIncisive_Events
 
Facebook Social Readers - Martin Belam
Facebook Social Readers - Martin BelamFacebook Social Readers - Martin Belam
Facebook Social Readers - Martin BelamIncisive_Events
 
Theresa Regli Content Management Strategies for a multi-platform world
Theresa Regli Content Management Strategies for a multi-platform worldTheresa Regli Content Management Strategies for a multi-platform world
Theresa Regli Content Management Strategies for a multi-platform worldIncisive_Events
 

Viewers also liked (20)

Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel
Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel  Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel
Lending Ipads to Medical Staff; Tablets in the Workplace – Guus Van Den Brekel
 
Rachel Green Jove
Rachel Green JoveRachel Green Jove
Rachel Green Jove
 
Influence and Leadership - Simon Edwards
Influence and Leadership - Simon EdwardsInfluence and Leadership - Simon Edwards
Influence and Leadership - Simon Edwards
 
Alain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producersAlain Frey Research Data for universities and information producers
Alain Frey Research Data for universities and information producers
 
Louise Corti Data scientists
Louise Corti Data scientistsLouise Corti Data scientists
Louise Corti Data scientists
 
Phil Bradley The future of Search
Phil Bradley The future of SearchPhil Bradley The future of Search
Phil Bradley The future of Search
 
Open source @ FAO - Rachele Oriente
Open source @ FAO - Rachele OrienteOpen source @ FAO - Rachele Oriente
Open source @ FAO - Rachele Oriente
 
david nicholas - consequences for information seeking and reading behaviours ...
david nicholas - consequences for information seeking and reading behaviours ...david nicholas - consequences for information seeking and reading behaviours ...
david nicholas - consequences for information seeking and reading behaviours ...
 
Supporting the Knowlege Sharing in DECC - C. Harding
Supporting the Knowlege Sharing in DECC - C. Harding Supporting the Knowlege Sharing in DECC - C. Harding
Supporting the Knowlege Sharing in DECC - C. Harding
 
Social Business - Alpesh Doshi
Social Business - Alpesh DoshiSocial Business - Alpesh Doshi
Social Business - Alpesh Doshi
 
The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard
 
Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley
 
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom CraneManaging Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
 
James Andrews User Engagement
James Andrews User EngagementJames Andrews User Engagement
James Andrews User Engagement
 
From Discovery to Delivery - Daniel Mayer
From Discovery to Delivery - Daniel MayerFrom Discovery to Delivery - Daniel Mayer
From Discovery to Delivery - Daniel Mayer
 
Big Data as Opposed to Small Data Mark Whitehorn
Big Data as Opposed to Small Data Mark WhitehornBig Data as Opposed to Small Data Mark Whitehorn
Big Data as Opposed to Small Data Mark Whitehorn
 
Ellyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information servicesEllyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information services
 
Putting Parsimonious Preservation Into Practice - Tim Gollins
Putting Parsimonious Preservation Into Practice - Tim GollinsPutting Parsimonious Preservation Into Practice - Tim Gollins
Putting Parsimonious Preservation Into Practice - Tim Gollins
 
Facebook Social Readers - Martin Belam
Facebook Social Readers - Martin BelamFacebook Social Readers - Martin Belam
Facebook Social Readers - Martin Belam
 
Theresa Regli Content Management Strategies for a multi-platform world
Theresa Regli Content Management Strategies for a multi-platform worldTheresa Regli Content Management Strategies for a multi-platform world
Theresa Regli Content Management Strategies for a multi-platform world
 

Similar to Mobile in the Workplace - Alan Shields

Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan
 
Securing the Remote Working Environment
Securing the Remote Working EnvironmentSecuring the Remote Working Environment
Securing the Remote Working Environment
Dizzion, Inc.
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
Robert Kleinschmidt
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
DevOps.com
 
Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101
QOS Networks
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
VMware
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
VishnuGone
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
Chris Pepin
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and Growth
IBM Danmark
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
Wolters Kluwer Tax & Accounting US
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
Joseph Williams
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
jaredcarst
 
Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -
Experitest
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
Alistair Croll
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 

Similar to Mobile in the Workplace - Alan Shields (20)

Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Securing the Remote Working Environment
Securing the Remote Working EnvironmentSecuring the Remote Working Environment
Securing the Remote Working Environment
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and Growth
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

More from Incisive_Events

Gaby Lutgens Edl@b experiment
Gaby Lutgens Edl@b experimentGaby Lutgens Edl@b experiment
Gaby Lutgens Edl@b experimentIncisive_Events
 
Richard Wallis Linked Data
Richard Wallis Linked DataRichard Wallis Linked Data
Richard Wallis Linked DataIncisive_Events
 
Andrew Cox Research data management
Andrew Cox Research data managementAndrew Cox Research data management
Andrew Cox Research data managementIncisive_Events
 
Anne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your researchAnne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your researchIncisive_Events
 
Mahendra Mahey British Library Labs
Mahendra Mahey British Library LabsMahendra Mahey British Library Labs
Mahendra Mahey British Library LabsIncisive_Events
 
Arthur Weiss Google vs other search tools
Arthur Weiss Google vs other search toolsArthur Weiss Google vs other search tools
Arthur Weiss Google vs other search toolsIncisive_Events
 
James Bennett CLA Search and Licence System
James Bennett CLA Search and Licence SystemJames Bennett CLA Search and Licence System
James Bennett CLA Search and Licence SystemIncisive_Events
 
Lucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly booksLucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly booksIncisive_Events
 
Max Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open AccessMax Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open AccessIncisive_Events
 
Jacob Morgan The Future of Work
Jacob Morgan The Future of WorkJacob Morgan The Future of Work
Jacob Morgan The Future of WorkIncisive_Events
 
Mark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing worldMark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing worldIncisive_Events
 
Alex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environmentAlex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environmentIncisive_Events
 
Sarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your TeamSarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your TeamIncisive_Events
 
Heini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes HomeHeini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes HomeIncisive_Events
 
Henry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information ProfessionalsHenry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information ProfessionalsIncisive_Events
 
Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration Incisive_Events
 
Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC Incisive_Events
 

More from Incisive_Events (20)

Gaby Lutgens Edl@b experiment
Gaby Lutgens Edl@b experimentGaby Lutgens Edl@b experiment
Gaby Lutgens Edl@b experiment
 
Hugh Davis MOOCs
Hugh Davis MOOCsHugh Davis MOOCs
Hugh Davis MOOCs
 
Richard Wallis Linked Data
Richard Wallis Linked DataRichard Wallis Linked Data
Richard Wallis Linked Data
 
Andrew Cox Research data management
Andrew Cox Research data managementAndrew Cox Research data management
Andrew Cox Research data management
 
Jan Reichelt Mendeley
Jan Reichelt MendeleyJan Reichelt Mendeley
Jan Reichelt Mendeley
 
Anne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your researchAnne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your research
 
Mahendra Mahey British Library Labs
Mahendra Mahey British Library LabsMahendra Mahey British Library Labs
Mahendra Mahey British Library Labs
 
Arthur Weiss Google vs other search tools
Arthur Weiss Google vs other search toolsArthur Weiss Google vs other search tools
Arthur Weiss Google vs other search tools
 
James Bennett CLA Search and Licence System
James Bennett CLA Search and Licence SystemJames Bennett CLA Search and Licence System
James Bennett CLA Search and Licence System
 
Lucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly booksLucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly books
 
Max Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open AccessMax Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open Access
 
Jacob Morgan The Future of Work
Jacob Morgan The Future of WorkJacob Morgan The Future of Work
Jacob Morgan The Future of Work
 
Mark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing worldMark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing world
 
Alex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environmentAlex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environment
 
Sarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your TeamSarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your Team
 
Heini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes HomeHeini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes Home
 
Henry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information ProfessionalsHenry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information Professionals
 
Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration
 
Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC
 
Kate Grady polka
Kate Grady polkaKate Grady polka
Kate Grady polka
 

Mobile in the Workplace - Alan Shields

  • 1. Bring Your Own Device Alan Shields Cambridgeshire County Council
  • 2.
  • 3.
  • 5. B YOD U Use your Own Device
  • 6. Infrastructure must cover: Connection As these devices will not be directly connected to your network, you need a secure method of connection. Authentication If you can, best to use something you already use such a Active Directory or other similar LDAP services. Security Beyond the network connection, you must have a means of managing/ administrating these devices. This is often called “Mobile Device Management”. Data access Not all these devices will have the capability to connect to your normal network file storage so consider more agnostic methods of data access such a SharePoint, internal versions of “DropBox” or other WebDAV/FTP functionality.
  • 7. Possible Uses for BYOD Communication Information Transaction Other
  • 8.
  • 9. So, what are we doing in Cambridgeshire?
  • 10. So, what are we doing in Cambridgeshire? Dynamic Mobile Exchange (DME) by Excitor Good for Enterprise by Good Technology
  • 11. The Pilot was run to determine some of the following: Suitability of the software (incl. usability and security) Acceptance by staff to use their own devices Effectiveness of “light-touch” training and support To determine and calculate any cost savings/benefits
  • 14. Acceptance The Pilot was limited to 50 users and to get volunteers, messages were posted on the Council’s intranet pages. Within 3 days we had over 150 requests. Whilst that does not seem many out of a 5,000-strong user base, it proved there was some appetite for staff wanting to use their own devices.
  • 16. Suitability 70% of pilot users found sending and receiving emails as “Easy” or “Very Easy”. 69% found handling attachments “Easy” or “Acceptable”. 50% rated the calendar functionality as “Easy” or “Very Easy”. Other functionality (i.e. Contacts, Tasks etc.) was only used by a very small number of pilot users. Acceptance 69% of pilot users rated the DME product as either “Essential” or “Very Useful”. Only 4% of pilot users stated that running the DME client affected either their handset’s performance and/or battery life. 77% of pilot users wished to continue using the service after the pilot had ended. Training and Support 98% of pilot users rated downloading and installing the software as “Easy” or “Very Easy”. 77% of pilot users rated the training documentation as either “Good” or “Excellent”.
  • 18. In summary In summary, BYOD (or UYOD) is here to stay and will become a demand from both your current and future employees. However, don’t (seriously) comprise your security – get the right product and have a clearly defined BYOD user policy that outlines what you expect from the employee and what they can expect from you. Indeed, BYOD is s culture change for you IT department. No longer will they have ultimate control of who uses what and where. However, in reality, that control is probably being lost already by staff using their own devices in a non-managed, unsecure way. Introducing a proper BYOD strategy will wrestle just enough of that control back to hopefully make everyone happy.
  • 19. Next Steps… …in Cambridgeshire? Plan to have the DME product in full production and available to all suitable users by the end of the calendar year. This includes a slight delay as we are also migrating our email system from Exchange 2003 to 2010.
  • 20. Thank you. Email: alan.shields@cambridgeshire.gov.uk Excitor: www.excitor.com CNS: www.cnsuk.co.uk

Editor's Notes

  1. Good morning/afternoon.[Comment on time slot if appropriate]I’m Alan Shields, Strategy and Architecture Team Manager for Cambridgeshire County Council.Don’t be confused about the LGSS logo, Cambridgeshire has a shared services agreement with Northampton County Council and Norfolk City Council, and that’s what we call ourselves. However, I am still and employee of and get paid by Cambridgeshire County Council.
  2. Currently, it is very difficult to miss the many news articles and web sites either extolling the virtues or warning of the dangers of either “Consumerisation” or “Bring Your Own Device (BYOD)”. Now, just a point of clarification - Consumerisation is not BYOD. However BYOD is a subset of the overall Consumerisation trend.[click]It’s even got a T Shirt!!!
  3. Going back to BYOD, it also appears that many companies, even with a very tenuous linkage to the subject, see themselves as the panacea to every IT Manager’s dreams. [click]However, in my opinion, BYOD is nothing new and not really what we should all be talking about. [click]
  4. On a personal note, I have been “bringing my own device” to work ever since I got my first mobile phone in 1999. I loved my WAP-enabled Nokia 7110! I might have even used it to make business related calls, before I got the privilege of a corporate mobile. If you extend the definition of “device” a little further, then by using my own car for company purposes, would also falls into the area of BYOD or BYOC.[click]At this point I am not going to cover the once popular initiative of “bring your daughter to work” which is a completely different flavour of BYOD![click]
  5. So, what has changed and created this explosion in the media. True, more people now have smart phones and are very comfortable in using them as part of their everyday life. This is very attractive to businesses that see possible savings in equipment costs and training. I do not doubt these drivers, but “bringing” you own device is only part of the story. Once I have my device at work, what can I use it for? Therefore, I propose a change of title. Not BYOD, but UYOD – “Use Your Own Device”. [click] [click]And this is the point companies should start developing their strategy and polices to allow their staff the freedom to choose how they interact with the business and their colleagues.Now, if you accept the premise that allowing staff to bring and use their own devices, is a valuable strategy, the next two tasks are to setup a suitable infrastructure to accommodate BYOD and define how what “uses” they want to put these devices to. Let’s first concentrate on the infrastructure required: [click]
  6. [Talk to slide]
  7. Communication: The first and obvious use would be communication. As well as making phone calls, this would include access to the corporate email system and a global directory. There a many companies that offer products that enable such use, depending on your businesses’ security requirements.[click]Information: A second use is access to information. As stated earlier, examples would be the ability to access a company’s intranet, SharePoint sites and other web-based resources. Again, many suppliers offer solutions that have a level of granularity that can control what device can access what resource and have the ability to clearly distinguish between corporately owned devices and ones owned by staff.[click]Transaction: Lastly, (as I am not going to cover “Others”) one of the most valuable aspects of general mobile computing is to complete transaction at the point of delivery. Now I’m not proposing that staff use their own devices for the majority of transactions, but internal ones such as expense or over-time claims could be candidates. [click] Others [click]
  8. Now, it must be remembered that a business will not have the same control over some else’s equipment as they would have their own. Ideally you want a “light-touch” approach either requiring the user to download and install a simple app or to get them to use a web-based or thin application. This could be internally hosted or even cloud-based.Also remember not to take the “O” on BYOD to literally. The device can be corporately owned, but maintained and supported by the users. This still gives organisation control over device types.[click]Now I know the soothsayers of the security industry will be up in arms with all the potential for data leakage and security breaches. I do not disagree. But we must move with the times and there are solutions in the market place now that are achieving the right balance between protecting our valuable data and allowing users a high level of flexibility when it comes to accessing this data.[click]
  9. So, what are we doing in Cambridgeshire? We decided to run a small pilot and evaluated two potential products that both met our functional and security requirements.[click]
  10. •Dynamic Mobile Exchange (DME) by Excitor•Good for Enterprise by Good TechnologyBoth products allow access to corporate email, calendar and contacts from a user’s personal device, without compromising security. After a short “desktop” exercise evaluating both functionality and cost of each product, DME was chosen to take forward to the pilot stage. We partnered with CNS in the implementation and support of the product.[click] Wait [click]
  11. [Talk to slide]
  12. Security:Once downloaded and installed (via the appropriate “App” store), (pilot only covered iOS and Android devices) by the user, the DME product creates a virtual container on your device. This is often called “Containerisation”, and in my opinion is the only way to implement BYOD. Within this secure container are tools that allow you to access Council resources in an extremely secure manner. These include you usual PIM applications and a secure Web browser. Any data (i.e. emails, attachments etc.) that are accessed via DME, remain in that container and cannot “leak” out onto the rest of the device. If you want to edit documents, DME comes with its own document editor. Nothing needs to “leave” the container.There is also the ability to write your own applications that can sit within the container, but this was not part of the pilot.All data remains encrypted at all times using strong encryption, and is only decrypted to memory while it is displayed on screen. Equally, all communication with the server is also encrypted.If in the unfortunate event that the device is lost, because all Council data is held within this separate container, if a device is lost, we can send out a command to delete this container if and when the device connects to a network again. This will not affect and data, applications etc. that are outside of the container.[click]
  13. Security:Once downloaded and installed (via the appropriate “App” store), (pilot only covered iOS and Android devices) by the user, the DME product creates a virtual container on your device. This is often called “Containerisation”, and in my opinion is the only way to implement BYOD. Within this secure container are tools that allow you to access Council resources in an extremely secure manner. These include you usual PIM applications and a secure Web browser. Any data (i.e. emails, attachments etc.) that are accessed via DME, remain in that container and cannot “leak” out onto the rest of the device. If you want to edit documents, DME comes with its own document editor. Nothing needs to “leave” the container.There is also the ability to write your own applications that can sit within the container, but this was not part of the pilot.All data remains encrypted at all times using strong encryption, and is only decrypted to memory while it is displayed on screen. Equally, all communication with the server is also encrypted.If in the unfortunate event that the device is lost, because all Council data is held within this separate container, if a device is lost, we can send out a command to delete this container if and when the device connects to a network again. This will not affect and data, applications etc. that are outside of the container.[click]
  14. Acceptance:The Pilot was limited to 50 users and to get volunteers, messages were posted on the Council’s intranet pages. Within 3 days we had over 150 requests. Whilst that does not seem many out of a 5,000-strong user base, it proved there was some appetite for staff wanting to use their own devices.[click]
  15. Training and Support:This was a difficult issue as we were dealing with other people’s property. However, for the Pilot, we decided to take an extremely light-touch approach to both support and training. After all, these were devices people were already using and should be familiar with them already.Users were asked to download and install the application themselves, with a set of simple instructions and the generic user guides (from Excitor) were posted onto a corporate SharePoint site. We also created a discussion forum on the same site and set-up a dedicated support email address. They were told the email address was there only means of support. As a result we only had one member of staff who did not successfully get up and running, without additional help. [click]
  16. Before I go on to Savings & Benefits, towards the end of the pilot we sent all users an evaluation questionnaire to complete. Briefly these are the results:[click]
  17. To be honest, the pilot was too small and short to gain any reliable conclusions. That said, yes you do save on not supplying the devices, paying for the data tariffs and training costs can be parried down, but you still need an infrastructure and support is still an unknown quantity. However, a benefit could easily be user satisfaction. After all they aren’t going to complain about a device they got themselves and even if they do, then they will replace it for something better. Also, there is the “cool” factor of using the latest technology which will no doubt rub off onto the image of you organisation.As an aside, in the evaluation questionnaire, approximately 66% of pilot users that already have a BlackBerry stated they would prefer to use the DME product.[click]
  18. [Talk to slide][click]
  19. Next steps In Cambridgeshire? Well we plan to have the DME product in full production and available to all suitable users by the end of the calendar year. This includes a slight delay as we are also migrating our email system from Exchange 2003 to 2010.[click]
  20. Thank you. Any questions?