© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.

Slides:



Advertisements
Similar presentations
> THIS IS THE WAY > THIS IS. The Virtual Enterprise Distributed Workforce Increasing Mobility Demanding Customers Hungry Competitors Budget Crunch The.
Advertisements

Enabling VDI & Application Virtualization
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Building the case for Windows 8.1 Flexible Workstyle deployment Windows 8.1 Business Value Workshop Microsoft Consulting Services can help you build the.
Training solution for Mobile Workforce. People expect to consume content when and where they want to. Training for Mobile Workforce.
The future of Desktops Transform Your Desktop with Virtualization.
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
© 2014 Citrix. Confidential. Mobile Workstyles & Mobile Workspaces The new reality Q
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Services Flexible Workstyle and People-Centric IT Windows Accelerate: Deployment Windows 8.1 Proof of Concept (Window 8.1 PoC) will demonstrate how the.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Solution Briefing Business Productivity in Action Keynote.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Mobility Project iPad Experiences & Results Child Welfare Technology Conference October 23, 2013 PRESENTED BY County of Ventura, Human Services Agency.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Introduction Challenges of Managing in a Network Economy.
TELUS Work Styles Copyright © TELUS Corporation. All rights reserved. Neither the whole nor any part of this work maybe copied, scanned, reproduced, or.
It’s a Mixed Up World Deploying Unified Communications and Collaboration in Mixed Environments David J. Wippich Chief Executive Officer Ensim Corp.
Empowering Your Users-Security & Mobility Bil Martin 1.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Richard Tworek VP, Enterprise Communication Servers 2006 Technology Focus Enhancing the Human Experience with Enterprise Real-Time and Secure Converged.
Felicia Flippen Crystal Thompson Kevin Hulsey. Outline What is BYOD Trends of BYOD Advantages of BYOD Disadvantages of BYOD Summary.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1 TEXAS LAWYER IN-HOUSE COUNSEL SUMMIT General Counsel: The Global Corporation’s Next Agent of Change Katie Bullard, VP Product Management & Marketing,
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Hosted Voice & Hosted Contact Center
Winning Wireless Applications Corina Moore PrinterOn Corporation
© 2012 Citrix | Confidential – Do Not Distribute Prepare by reviewing the Selling & Positioning deck and leveraging the Solution Selling Reference Card.
Mobility in the Government Workforce Presentation at an ACT-IAC Partners Breakfast June 16, 2011 Thom Rubel, Research Vice President Beth Jolles, IDC Government.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
Seagate Confidential Battle Card: Seagate Business Storage Windows ® Server 4-bay NAS THE BASICS Target Customers & Relevant Value KEEP IN MIND “Need-To-Know”
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
The time to address enterprise mobility is now
How to Define a Successful Mobility Strategy
Transforming business
Customer Guide to Limited-Time Offer
Technology Strategy for an Inclusive Workplace
Styr på filopbevaring og fildeling
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
<Service provider solution name>
2/25/2019.
FastTrack for Microsoft 365
Helping You Be What’s Next Eric Boustouller President
Microsoft Virtual Academy
Presentation transcript:

© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014

Presentation Guidelines Building executive champions is a key factor in the long-term success of a BYOD initiative. This BYOD Champion presentation can be used to drive discussions and get buy-in from key cross-functional stakeholders. This is a template PPT that should be tailored with your organizations objectives, priorities and challenges in mind. The PPT is structured to help you make a few key points:  The trend of consumerization and employee-owned devices is real  You have a clear vision and set of goals to address this trend with a BYOD initiative  There are proven benefits to developing a BYOD initiative  The majority of your peers and competitors will move in this direction – soon  You have outlined your organization’s BYOD program structure Each slide includes notes on slide purpose and real samples.

Meeting Agenda The Consumerization of IT Trend BYOD Vision & Objectives BYOD Program Definition Program Approach Project Timeline

Consumerization …will force more IT change over the next 10 years than any other trend Enterprise IT Consumer Capability

BYOD Vision Embrace consumerization in the workplace to deliver employees a simple, ubiquitous access experience whether at the office, at home or abroad, regardless of their computing device Choice | Simple | Secure | Self-Service

BYOD Program Goals Increase employee productivity through mobility Drive employee satisfaction and retention Drive competitive differentiation Reduce security threats from employees using their own devices Reduce device management and procurement time and cost Reduce time and costs associated with support calls Simplify employee and contractor onboarding

Empower people and departments  To choose their own devices to improve productivity and help with talent acquisition/retention Protect sensitive information  From loss and theft while addressing privacy, compliance and risk Simplify IT and reduce costs  From device procurement/configuration & app compatibility/support Embrace consumerization. Empower employees. Simplify IT. BYOD Benefits

52% 57% 51% 46% “What are the benefits of employee owned devices?” Worldwide Survey of Corporate Employees. February 2011, Citrix Systems

94% of organizations expect to have a BYO policy by mid–2013

Challenges & opportunities  Lower IT & business costs  Workforce flexibility, recruitment & efficiency The solution  BYOD initiative – any device, self-service  Desktop & app virtualization, follow-me data Result  ~20% cost savings & lower support requests  Choice drives productivity – 46% select Macs  Citrix named among “Top 50 Best Places to Work” © 2012 Citrix | Confidential – Do Not Distribute

Challenges & opportunities  Field engineer productivity  IP protection & speed-to-market The solution  Secure by design BYO  Seamless access to desktops & apps Result  Reduced time to recovery – from days to minutes  Speeds product time to market while protecting IP  Faster customer response = competitive advantage © 2012 Citrix | Confidential – Do Not Distribute

Secure-by-Design BYOD Approach Any device, personal or business Self-service app store with secure access Enterprise mobility management Windows apps and desktop virtualization File sharing and collaboration Remote support

BYOD Program Considerations Eligibility – which users will have access? Devices – what devices will we allow – all/any device or a limited set? Apps & Data – what apps and data can users access? Support – how will support work? Services – what services will IT offer and not offer? Financial – what is the cost model/approach? Legal –what are the legal implications and terms of use?

BYOD Initiatives Take on a variety of different approaches INFORMAL Users can access apps and data from their personal device FORMAL BYO policy, stipend, self-service web site and support We are here

Understand Best Practices Engage Stakeholders Define Policies Develop Technology Solution Prepare for Rollout Next Steps

BYOD Project Timeline APR 2008 MAYJUNJULAUGSEP Stakeholder Feedback Program & Policy Definition Solution Definition Website Build Pilot launch

Work better. Live better.