Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

BYOD: Challenges, Strategies & Best Practices

No description
by

David Carter

on 13 July 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of BYOD: Challenges, Strategies & Best Practices

Common Challenges
Strategies of Approach
Best Practices
Resources
Bring your own Device: Challenges, Strategies and Best Practices
Presented by Advanced Logic Industries
Questions and some Polling Along the Way
Introductions
Misconceptions about BYOD
ONE SIZE FITS ALL
Polling Question:
?
Misconceptions about BYOD
Users will take responsibility for your organizations data.
Misconceptions about BYOD
Implementing BYOD will save "Money"
Adoption By Industry and Size
User/Employee Expectations
Compliance
How do I ensure Compliance?
HIPAA / HITECH
FOIA
eDiscovery
SOX
Goals for Today's Session:
Get a Snapshot of BYOD adoption
Outline Challenges in Implementation
Discuss Strategies for Delivering BYOD
Review Emerging Best Practices
How do I protect my network and data from;
Unauthorized Access
Malware
Device Loss/Theft
How do I implement multiple policies per user/device/location/etc.
Security
How do we ensure a consistent experience
How do we troubleshoot App vs. Network vs. Device problems
How do we Ensure Application interoperability
Application Support
What devices are on my Network?
Which users are using what devices?
What apps are being accessed?
What are real-time performance metrics
Operations
How do we troubleshoot access problems
How do we separate Device Issues from Network or Policy Issues
How do we ensure user experience
Engineering
How and what do we Support
How do we handle asset management
End Point Devices
Is your organization currently allowing personal devices for regular use?
?
What is Motivating your organizations
consideration of BYOD?
Polling Question:
?
What is your greatest concern about BYOD?
Compliance
Security
Support Complexity
Application Compatibility
We're not concerned at all
The "unknown"
All of the Above
Application Evaluation
Native Support
Web based Apps
Apps with dedicated mobility support

Examples:
Jabber (Cisco)
Most Email Platforms
Angry Birds
Custom Support
Most Data Management Systems (ERP/MRP/SIS)
Legacy Apps

Examples:
Pentamation
SAP
PeopleSoft
PowerSchool
BlackBaud
GOOD/BAD with Native Support Applications
Good
Apps are specifically designed for platform
Tend to be Faster
Security tied directly to infrastructure
Bad
Minor Platform changes can drastically effect user experience
Apps are often subsets of primary functionality
Quality Control
GOOD/BAD with Custom Support Applications
Bad
Difficult to fit a legacy App onto a 4" Screen
Emulation (VMWare / Citrix / Etc/) adds a layer of complexity
Good
Training easier to facilitate
End User experience consistent
Minor platform changes do NOT effect experience significantly
Operations / Engineering
Onion Layer Security Strategy (Defense in Depth)
Big Brother your Infrastructure with the ability to answer the 5W's and the H.
Operations / Engineering
Clearly Defined and Enforced Edges of Responsibility
Operations / Engineering
End Point Devices
Be Honest about limitations, both for users and for IT
Keep as many supported platforms on hand as possible
Develop a feedback mechanism for customer advocacy
Mobile Device Management
For IT
For IT: MDM
MDM must be able to accomplish the following:
Device agnostic
Content Usage Can Be Tracked
Content Usage Can be Terminated
Content is easy for End Users to View Securely
For End Users: Access
A successful End User Community should:
Have a known and accessible power user community
Platforms must be Sand Boxed prior to approval
Access is rolled out in Silo's and Phases
For The Org: Policy
Policy should address:
Org/User responsibility and support
Reimbursements / Stipends clearly defined
Content Usage Can be Terminated
?
Q&A
David Carter, ITIL, CGCIO
Chief Technology Officer
Advanced Logic Industries
dcarter@ali-inc.com
Parker Pearson
Vice President, Marketing
Advanced Logic Industries
parker@ali-inc.com
Discussion Question:
Full transcript