Preparing an Effective BYOD or Mobility Strategy
-
Upload
logicalis-australia -
Category
Technology
-
view
2.160 -
download
1
description
Transcript of Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
Martin LindemanSolution Architect
Agenda
1. Intro - What Are The Benefits?
2. Do You Need a Strategy?
3. Creating a BYOD Strategy
4. Questions
2
What is ‘Bring Your Own Device’?
3
Bring Your Own Device enables end users to securely use devices they choose to increase their productivity and mobility
These can be devices purchased by the employer, the employee, contractors, suppliers
“BYOD means any device, with any ownership, used anywhere”
BYOD Mobility Landscape
4
Smartphones and Tablets
Two year mobile device growth rate is 102%
PlatformJune 2010
June 2011
June 2012
iPhone 3,554 16,857 23,258
iPad 150 5,418 10,779
BlackBerry 14,802 14,233 9,724
Android 40 3,526 6,592
Others 7,005 1,406 1,010
Total 25,401 41,440 51,36319% 45%
21%
13%
Win – WinBYOD Delivers Benefits to Employees and the Enterprise
5
Employees get greater control of their work experience through choice of device
75% of IT execs report that allowing employees to bring consumer devices to work has increased employee morale
1
Employers get a more productive workforce and lower costs
72% of IT execs say that employees who bring consumer devices into the workplace are more productive
1
Annual benefits from BYOD to enterprises ranges from $300 to $1,300 per employee depending on job role2
1. 2011 IDC Consumerization of IT Study2. 2012 Cisco IBSG Horizons Study
Do You Need a Strategy?
This is What We are Facing
7
Reduce Security RiskImprove End-User
Productivity Increase Operation Efficiencies
Over 15 billion devices by 2015, with average worker with 3 devices
New workspace: anywhere, anytime
71% of Gen Y workforce do not obey policies
60% will download sensitive data on a personal device
End – User Behaviours IT Trends
Must control the multiple devices and guests
Security: Top concern for BYOD
Mobile malware quadrupled (from 2010 to 2012)
IT consumed with network fragmentation
The BYOD Spectrum
8
Denied orRestricted
Allowed Encouraged Mandated
Environment requires tight control:
Corp Only DeviceMfg EnvironmentTrading FloorClassified Gov NetworksTraditional Enterprise
Focus on basic services, easy access, almost anybody
Broader Device Types But Internet OnlyEdu EnvironmentPublic InstitutionsSimple Guest
Enable differentiated services, on-boarding with security but no ownership
Multiple Device Types + Access Methods, VDIHealthcareEarly BYOD Enterprise AdoptersContractors
Corp native apps, new services, full control
Multiple Device Types Corp Issued, MDMInnovative EnterprisesRetail on DemandMobile Sales Service (Video, Collaboration, etc)
Creating a Desktop BYOD Strategy
Five Steps to Create a BYOD Strategy
10
Step 1
Develop a Business
Plan
Step 2
Segment the Workforce
Step 3
Create a Service Strategy
Step 4
Define the Policy
Step 5
Develop User Support
Model
Step 1: Developing a Business CaseCalculate an ROI for multiple scenarios
11
Operating CostPotential Savings
Return on Investment
Current TCOUpfront
Investment
Calculate the Total Cost of Ownership for existing fleet
Include OS, Software, Hardware, Security, Asset Management, Support, Storage, Lost & Stolen Devices
Add the upfront investment required to move to BYOD
Include VDI, licensing, software & content virtualisation, infrastructure, resource costs
Add the ongoing costs of a BYOD program
Include all incremental costs to deliver BYOD
Include tax implications of any employee allowance
Subtract the savings that can be generated in each TCO line item through BYOD
Include savings generated by retiring old services
Calculate potential ROI then adjust the elements of your strategy to model multiple scenarios
Model different scope, timing, employee entitlements
Step 2: Workforce Segmentation
12
Work Styles
Workstation Anchored
Local Collaborator
Remote WorkerHighly Mobile
Offsite External
Select some key dimensions to segment the workforce (e.g. 'need for mobility’ & ‘need for support’)
Group users based on common “work styles” regardless of role and department
Identify common use cases that apply to each set of users
Step 3: Creating a Service StrategyMap Workforce Segments to Planned Service Offerings
13
Corporate Laptop VDI End Point
Mobile Device
Non-Corp Laptop
Workstation Anchored
Local Collaborator
Remote Worker
Highly Mobile
Offsite External
Prioritise Use Cases for Implementation
Step 4: Defining the PolicyBYOD Policy Design
14
Designing the right policies is critical to controlling costs - 86% of BYOD costs are non-device-related1
IT should drive the policy design however buy-in needed from HR, Finance, Tax, Legal, and Corporate Security
Policy must define minimum acceptable standards for Hardware, Operating System, and Security software
A clear entitlement policy is necessary to ensure the right tools and services are offered to the right users for the right cost
Rules of Use are necessary to set clear expectations around user behaviours
15
Corporate Rules of Use
1) Allows Business to remotely wipe the device
2) Requires an acceptable password and 10 minute timeout
3) Require users to immediately report a lost or stolen device.
All users must accept rules of use when signing up for service
Trade off between employee trust and IT control
There is no IT jargon – the rules are simple for end-users to understand
Step 4: Defining the PolicyBYOD Rules of Use
16
Corporate Policies Service
Entitlement Rules of Use Device Purchase
Local Directives• Geography• Business
Functions
Approvals MD for Policy
Variations Manager for
Individual Liable Employee for Self
Support Agreement
Step 4: Defining the PolicyBYOD Policy Implementation
17
BYOD without a corresponding strategy generates more work for IT – 80% of IT respondents had increased support workloads from consumerisation1
IT budgets are not scaling at the same rate
A new support model is required:
IT supports connectivity problems and issues with the corporate applications and the operating system
Hardware support provided by device manufacture or user
Community support forums for knowledge sharing and best practices
Step 5: Developing a User Support ModelDesigning a Support Model
1. 2011 IDC Consumerization of IT Study
ConclusionsKey Takeaways
18
1. BYOD is happening - with or without IT
2. Position IT as an enabler - not a barrier
3. Leverage the BYOD trend and target high value use cases
4. Test the waters first before wide-scale deployment
5. Find your right balance between security and client experience
6. Leverage the latest tools out there: eg) MDM and Posture Assessment