SlideShare a Scribd company logo
1 of 24
Download to read offline
Consumerization of IT –
Bring Your Own Device
Tim Groenwals
Technology Innovation Manager
2
3
4
5
Setting THE
SCENE
6
7
Generation Y… they arrived
8
Reality check : different device for
business use and personal use
9
Evolution and Convergence of
Technology
10
Stay up-to-date
Work, read, play
Specialized work
Best of both worlds
High performance
Different devices are being used for
different functions and on different
times
Source : Microsoft / Getronics
11
Setting the Scene : bpost
•About 1500 plain gsm’s and 500 Blackberry’s
•Lifecycle management challenges
•Employer attraction for new potential hirees
•No data on company SIM cards
APPROACH
12
13
Our approach
• From within the ICT Innovation
team, we started a small pilot
with our Dircom
• In a few days, it extended to
senior management
• In parallel we were running a RFP for Mobile Device
Management solution for our Mail business (mobile
devices for postmen)
BYOD-smartdevices BYOD-laptops
(smartphone, tablet)
• We started to create a vision build on 2 pillars :
14
BYOD basic model
“Here's Your Own”
Hardware, specs defined
and managed by
company, strict policies
and rules
“Choose Your Own”
Whitelist of allowed
hardware, managed,
possibly less tight
policies and rules
“Bring Your Own”
Freedom of choice for
hardware, relatively
unmanaged, loose
policies and rules
“Own Your Own”
Freedom of choice for
hardware, unmanaged,
barely policies and rules
T
R
U
S
T
F
R
E
E
D
O
M
Source : Microsoft / Getronics
15
Bring-Your-Own-Device
Smartphone / Tablet
•Target audience : all employees under the corporate
mobile phone policy
•new employees receive only SIM card, no physical phone
anymore. Data included. No goodie budget.
•Blackberry users (in pilot) : replace BB service by data
subscription (ongoing)
•Security imposed : MDM app, pincode, remote wipe, no
jailbreak / rootkitted device
•Wifi access in HQ
•for employees not willing to join, or need a replacement
device, a small stock of refurbished gsm and blackberry will be
maintained.
•Scope : secure mail, calendaring, “My Documents”, Lync
•Attention : no ICT support for personal devices, only for
SIM card, user-community WIKI available
• Benefits :
•positive employer image and attraction for new hirees
• employee satisfaction
•saving of up to 180 € / device / year for ICT (support,
logistics, user management, device)
16
Bring-Your-Own-Device
Smartphone / Tablet
 Final MDM (Mobile Device Management) solution
selected & implemented
 BYOD policy (HR – ICT – Legal) written
 Trial with cloud-based storage ongoing
 Lync setup from BYOD ongoing
 Corporate mobile subscriptions, including data,
under final negotiation
 No single Android is standard
 Final approval Dircom planned
17
Bring-Your-Own-Device Laptop
•Target audience : mandatory for all externals
(contractors, bodyshop) and voluntary² for employees
•currently small & limited pilot to test functionalities
and design architecture
•Scope : secure bpost environment (mail, calendaring,
Lync , “My Documents” and business applications) on
personal laptop
•Security : via strong authentication and secured VDI
environment.
•Attention : no ICT support for personal devices, only for
the standardized secure bpost environment, user-
community WIKI available, no offline VDI yet.
• Benefits :
• no delay in onboarding externals
• € savings unclear at this moment
(cost VDI versus cost “managed laptop”)
² to avoid additional tax rulings, little appetite to bring own
laptop
18
Bring-Your-Own-Device
Laptop
 Architecture ready
 BYOD policy (HR – ICT – Legal) written
 Business Impact Analysis done, but to be approved
 Calculating business case ongoing
 Printing solution to be defined
 Unclarity about license obligations
 Contract renegotiation with bodyshop suppliers to be done
 Final approval Dircom planned
19
The future employee…
… will be able to use his private phone, tablet or laptop to access his mail,
calendar and business applications in a secure way².
² following rules of corporate mobile phone policy. Own laptop mandatory for externals
Some final
words
20
21
Enterprise Mobility
• Apart from the vision on “Consumerization of IT”
and BYOD, we discovered the need for an
“Enterprise Mobility” approach as well
• Accountmanagers, client
advisors, fleet, postmen, ….
• Gathering business reqs just
started
22
• Cost cutting should never be the main reason to start a BYOD
traject.
• DO NOT assume BYOD is ONLY an ICT-project or ONLY an
HR&O-project.
• Start AS SOON as possible with Mobile Device Management and Network Access
Control implementation to guide the current BYOD culture.
• The security architecture that emerges due to BYOD leads to an IT-infrastructure that is
future ready. ICT wil not only facilitate internal staff, but also external people, as it will
facilitate co-operation with partners and suppliers.
• a complete BYOD traject can be very complex and takes some time before it is realized, but
this only increases the requirement to start the definition of the BYOD policy as soon as
possible. This way, we will be ready as a company to start fishing in the (small) pool of
young talent.
• spend plenty of time to evangelize throughout the organisation. Not all decision-makers are
into new technology, nextgen expectations or benefits.
23
Questions ?
24
Tim Groenwals
Technology Innovation Manager
bpost
http://www.linkedin.com/in/tgroenwals
@tgroenwals
http://www.slideshare.net/tgroenwa/

More Related Content

What's hot

ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
Around a Few Big Buttons
Around a Few Big Buttons Around a Few Big Buttons
Around a Few Big Buttons Suo&Co Oy
 
Designing a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's RoleDesigning a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's RoleNJ_OTI
 
Strategy Institute Smartbuilding
Strategy Institute SmartbuildingStrategy Institute Smartbuilding
Strategy Institute SmartbuildingCABA
 
New ways of working with Fujitsu
New ways of working with FujitsuNew ways of working with Fujitsu
New ways of working with FujitsuTon Schuiten
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materAPPAU_Ukraine
 
Smart Buildings Action Cluster
Smart Buildings Action ClusterSmart Buildings Action Cluster
Smart Buildings Action Clusterinside-BigData.com
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTJohn Breitenbach
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Ishay Tentser
 
IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018LoQutus
 
Iit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbIit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbGraham Bleakley
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Graham Bleakley
 

What's hot (20)

ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Around a Few Big Buttons
Around a Few Big Buttons Around a Few Big Buttons
Around a Few Big Buttons
 
Designing a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's RoleDesigning a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's Role
 
Strategy Institute Smartbuilding
Strategy Institute SmartbuildingStrategy Institute Smartbuilding
Strategy Institute Smartbuilding
 
IIoT and JD Edwards
IIoT and JD EdwardsIIoT and JD Edwards
IIoT and JD Edwards
 
Presentasi Awingu DCMS
Presentasi Awingu DCMSPresentasi Awingu DCMS
Presentasi Awingu DCMS
 
New ways of working with Fujitsu
New ways of working with FujitsuNew ways of working with Fujitsu
New ways of working with Fujitsu
 
Intel Mini case Study
Intel Mini case StudyIntel Mini case Study
Intel Mini case Study
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that mater
 
Ch 18
Ch 18Ch 18
Ch 18
 
Smart Buildings Action Cluster
Smart Buildings Action ClusterSmart Buildings Action Cluster
Smart Buildings Action Cluster
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoT
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
 
IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018IoT from Hype to Reality - Connected Brains 2018
IoT from Hype to Reality - Connected Brains 2018
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
 
Iit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbIit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gb
 
Wp byod
Wp byodWp byod
Wp byod
 
Industry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADAIndustry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADA
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2
 

Similar to Byod bpost

Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions Troy C. Fulton
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Prasant Mishra
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Prasant Mishra
 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at MerakiCisco Canada
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of ThingsBrian Pereira
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018MayankAgrawal205
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2Jorge Rivero Sanchez
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Prasant Mishra
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIxonos Plc
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueDan Mårtensson
 

Similar to Byod bpost (20)

Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
01 ondrej felix [režim kompatibility]
01   ondrej felix [režim kompatibility]01   ondrej felix [režim kompatibility]
01 ondrej felix [režim kompatibility]
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013Bizconnect from MMFSL for eOdisha Award 2013
Bizconnect from MMFSL for eOdisha Award 2013
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
 
The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020The Silicon Review | 50 Leading Companies of The Year 2020
The Silicon Review | 50 Leading Companies of The Year 2020
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at Meraki
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
 
Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013Bizconnect for eOdisha Award 2013
Bizconnect for eOdisha Award 2013
 
GilbertoJulio CV 2015 (Ingles)
GilbertoJulio  CV 2015 (Ingles)GilbertoJulio  CV 2015 (Ingles)
GilbertoJulio CV 2015 (Ingles)
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Byod bpost

  • 1. Consumerization of IT – Bring Your Own Device Tim Groenwals Technology Innovation Manager
  • 2. 2
  • 3. 3
  • 4. 4
  • 5. 5
  • 8. 8 Reality check : different device for business use and personal use
  • 10. 10 Stay up-to-date Work, read, play Specialized work Best of both worlds High performance Different devices are being used for different functions and on different times Source : Microsoft / Getronics
  • 11. 11 Setting the Scene : bpost •About 1500 plain gsm’s and 500 Blackberry’s •Lifecycle management challenges •Employer attraction for new potential hirees •No data on company SIM cards
  • 13. 13 Our approach • From within the ICT Innovation team, we started a small pilot with our Dircom • In a few days, it extended to senior management • In parallel we were running a RFP for Mobile Device Management solution for our Mail business (mobile devices for postmen) BYOD-smartdevices BYOD-laptops (smartphone, tablet) • We started to create a vision build on 2 pillars :
  • 14. 14 BYOD basic model “Here's Your Own” Hardware, specs defined and managed by company, strict policies and rules “Choose Your Own” Whitelist of allowed hardware, managed, possibly less tight policies and rules “Bring Your Own” Freedom of choice for hardware, relatively unmanaged, loose policies and rules “Own Your Own” Freedom of choice for hardware, unmanaged, barely policies and rules T R U S T F R E E D O M Source : Microsoft / Getronics
  • 15. 15 Bring-Your-Own-Device Smartphone / Tablet •Target audience : all employees under the corporate mobile phone policy •new employees receive only SIM card, no physical phone anymore. Data included. No goodie budget. •Blackberry users (in pilot) : replace BB service by data subscription (ongoing) •Security imposed : MDM app, pincode, remote wipe, no jailbreak / rootkitted device •Wifi access in HQ •for employees not willing to join, or need a replacement device, a small stock of refurbished gsm and blackberry will be maintained. •Scope : secure mail, calendaring, “My Documents”, Lync •Attention : no ICT support for personal devices, only for SIM card, user-community WIKI available • Benefits : •positive employer image and attraction for new hirees • employee satisfaction •saving of up to 180 € / device / year for ICT (support, logistics, user management, device)
  • 16. 16 Bring-Your-Own-Device Smartphone / Tablet  Final MDM (Mobile Device Management) solution selected & implemented  BYOD policy (HR – ICT – Legal) written  Trial with cloud-based storage ongoing  Lync setup from BYOD ongoing  Corporate mobile subscriptions, including data, under final negotiation  No single Android is standard  Final approval Dircom planned
  • 17. 17 Bring-Your-Own-Device Laptop •Target audience : mandatory for all externals (contractors, bodyshop) and voluntary² for employees •currently small & limited pilot to test functionalities and design architecture •Scope : secure bpost environment (mail, calendaring, Lync , “My Documents” and business applications) on personal laptop •Security : via strong authentication and secured VDI environment. •Attention : no ICT support for personal devices, only for the standardized secure bpost environment, user- community WIKI available, no offline VDI yet. • Benefits : • no delay in onboarding externals • € savings unclear at this moment (cost VDI versus cost “managed laptop”) ² to avoid additional tax rulings, little appetite to bring own laptop
  • 18. 18 Bring-Your-Own-Device Laptop  Architecture ready  BYOD policy (HR – ICT – Legal) written  Business Impact Analysis done, but to be approved  Calculating business case ongoing  Printing solution to be defined  Unclarity about license obligations  Contract renegotiation with bodyshop suppliers to be done  Final approval Dircom planned
  • 19. 19 The future employee… … will be able to use his private phone, tablet or laptop to access his mail, calendar and business applications in a secure way². ² following rules of corporate mobile phone policy. Own laptop mandatory for externals
  • 21. 21 Enterprise Mobility • Apart from the vision on “Consumerization of IT” and BYOD, we discovered the need for an “Enterprise Mobility” approach as well • Accountmanagers, client advisors, fleet, postmen, …. • Gathering business reqs just started
  • 22. 22 • Cost cutting should never be the main reason to start a BYOD traject. • DO NOT assume BYOD is ONLY an ICT-project or ONLY an HR&O-project. • Start AS SOON as possible with Mobile Device Management and Network Access Control implementation to guide the current BYOD culture. • The security architecture that emerges due to BYOD leads to an IT-infrastructure that is future ready. ICT wil not only facilitate internal staff, but also external people, as it will facilitate co-operation with partners and suppliers. • a complete BYOD traject can be very complex and takes some time before it is realized, but this only increases the requirement to start the definition of the BYOD policy as soon as possible. This way, we will be ready as a company to start fishing in the (small) pool of young talent. • spend plenty of time to evangelize throughout the organisation. Not all decision-makers are into new technology, nextgen expectations or benefits.
  • 24. 24 Tim Groenwals Technology Innovation Manager bpost http://www.linkedin.com/in/tgroenwals @tgroenwals http://www.slideshare.net/tgroenwa/