Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.

Slides:



Advertisements
Similar presentations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
National Aeronautics and Space Administration NASA Mobility.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Yammer for Executives Introductions.
Emerging Trends for Jobs in IT Sector & Business IT.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Customer Overview Aligning Technology evolution to Strategic Business Imperatives.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Help enable mobile productivity. For years, companies have leveraged Microsoft solutions for their productivity needs. In an evolving cloud-first and mobile-first.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Consumerisation of IT James Lockyer Windows Product Manager.
Steve Lamb - QAD QAD Enterprise Applications and Mobile Devices.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Android in the Cloud Chromebooks, BYOD and Wearables Joel Isaacson Copyright 2014 Joel Isaacson
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Services Flexible Workstyle and People-Centric IT Windows Accelerate: Deployment Windows 8.1 Proof of Concept (Window 8.1 PoC) will demonstrate how the.
Module 1: Overview of Information System in Organizations Chapter 2: How Organizations use IS.
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
Introduction to E-Business. 2 “It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change” Charles.
Darren Strange Head of Environmental Sustainability Microsoft Ltd.
1 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore Cisco Case Study: Cisco field office in São Paulo, Brazil Cisco Information.
Solution Briefing Business Productivity in Action Keynote.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Getting Smarter with Information An Information Agenda Approach
Empower your workers and boost productivity Microsoft ® Windows ® Vista Business and Office Small Business 2007 on HP desktops, notebooks and workstations.
Sheila Brisland Product Manager Software as a Service (SaaS)
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Gauteng Provincial Government
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Richard Tworek VP, Enterprise Communication Servers 2006 Technology Focus Enhancing the Human Experience with Enterprise Real-Time and Secure Converged.
What is e-business?. 2 Agenda Regional Training Workshop for Enterprise Support Agencies to Promote E-business for SMEs in the Greater Mekong Subregion.
VDI for Clinical Researchers TEAM 2 Mimoza Dimodugno Ian Goodsell Robert McPherson Mathew Olsen Jesse Rivera 12/15/2012.
Spectrum and Mobile Broadband Beyond Mobile Evolution in Australia G CDMA GSM AMPS First fully automatic mobile system Australian.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Mobile Device Policy What is your policy? Are new approaches being considered for –Device ownership (IRU v. CRU)? –Procurement? –Full, partial or NO reimbursement.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco “Your Way” Experience Customer Overview April 2012.
Building a Fully Trusted Authentication Environment
KRISHNA The State of Mobile Security in India The 23 rd IFIP World Computer Congress 2015 October 5 A Market Analysis and Recommendations for Enterprises.
User and Device Management
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Grew jobs nearly 2 times faster… Grew revenue 15 percentage points faster… …than small and midsize businesses using less advanced technology Brand X Brand.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
SDN & NFV Driving Additional Value into Managed Services.
Mobile Devices in the Corporate World
Mobile device Management & BYOD in a mobile world
Transforming business
Digital Workplace.
Create, Manage RDSH Farms in Azure to Offer Any Windows App as a Service from Anywhere MINI-CASE STUDY “Our partnership with Microsoft has opened up new.
Impact of IT Consumerisation on Enterprise Security
Microsoft Services Cloud Productivity Solutions
esteem systems ltd Virtualisation driving change in a tough economy
2/25/2019.
Microsoft Virtual Academy
Presentation transcript:

Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions

Agenda  Facts & Figures  What is BYOD?  What is driving BYOD?  Technology Ecosystem  Enabling BYOD  Defining Policy  Adoption Strategy  BYOD Financial Models  Benefits of BYOD  Challenges  Steps to BYOD Success

Facts and Figures  Gartner: By 2013, 33% of business intelligence will be consumed from a mobile device., remarkable considering a couple of years ago it was 0%.  20 to 50% additional devices that aren’t known nor controlled in the enterprise management systems are already present on the network  Gartner states that by 2014 some 80 percent of professionals will use at least two personal devices to access corporate systems and data.  Avanade - 88% of executives said employees were using their own personal computing tech for business purposes  41 percent of 229 CEOs surveyed use iPad’s at work

What is BYOD? “Employees using their own devices in a place of work to access business applications or information to conduct their work”

What is driving BYOD? The iPad toting CEO? Mobility hungry Generation Y? Social savvy next generation?

What is driving BYOD? Our work and personal lives have progressively merged because of the consumerisation of IT. But why?  Increased accessibility of information.  Advances in personal technology are now driving corporate technology  Simplicity of applications and delivery mechanism.  Reduced device cost.  Devices more desirable, visually and functionally.  Changing expectations of employees, employers and customers.  Green initiatives - less devices, less carbon footprint.

What is driving BYOD? Define your objectives  Boost Overall Productivity and Worker Mobility  Reduce Company’s Mobile Spending  Satisfy User Demands for Device Choice

Technology Ecosystem  Everyone's got a story!  Key to success  MDM  Application publishing VDI Device Security Mobile Device Management Wireless Networks Access Control Device App s

Enabling BYOD It’s all about the application Productivity apps Collaboration apps Remote desktop apps

Enabling BYOD Application Strategies  Native  Browser  Virtual (VDI)

Defining Policy 1.What Devices? 2.Security Policy 3.Service Policy 4.Data & Apps Ownership 5.Which Applications? 6.Acceptable use policy 7.Employee exit strategy ACME BYOD Policy

Adoption Strategy

BYOD financial models One size doesn’t fit all  Company owned devices  Full stipend  Partial Stipend  Employee Paid  Alternative - $1 model

Benefits of BYOD  Lower costs  Increased productivity, information accessibility  Accelerated business innovation  Shorter learning curve, employee buy in  Work-home balance  Business differentiation

Challenges Security - provide access without compromising security Defining boundaries - between personal & work data Usability - make secure the easiest option Manageability - simplify to make it easier Costs - managing the true cost of mobility Cultural - building an environment of trust Legality - business have different responsibilities Control - maintaining control of such a fluid & dynamic working environment

Steps to BYOD Success  Define the business case  Determined application and device strategy  Draft an understandable policy  Consult stakeholders  Define roll out parameters - time, size, financial model  Present to employees  Participation is a privilege, Not a right Checklist