Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


BYOD Think Tank - September 24, 2012

Presentation on Bring Your Own Device to Work

walid boukhdhir

on 23 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of BYOD Think Tank - September 24, 2012

The Bring Your
Own Device to
Work Phenomenon How has it changed life? Corporate changes Work Shifting Walid Boukhdhir
EDF SA What can employers expect? Work shifting Downtime, lunch breaks Start/end times Change in work culture Change in 40 hours work week Where do people work?
Who works with a flexible schedule?
Why is flexibility important? BYOD: When do people work? Work shifting will continue
More employees will expect work shifting
Essential to recruitment So What's the Big Deal?
Why Not BYOD? Employees bring their own smart phones to work in 86% of surveyed organizations Tablets (iPads) 77% Information Week
"2012 Mobile Security Survey" Basic cell phones 71% Laptops 65% The recent trend of providing employees with a choice of devices to use at work in order to access corporate applications and data
This could be a combination of employee-owned and corporate-supplied devices
BYOD includes smartphones, tablets and computers What is BYOD Security of professional data
Data Loss
Malicious Access
Network Upgrade
Devices constantly moving
Network Access
Broken devices Legal Challenges Enough to Make You Turn Off Your Phone and Throw it in the Lake Lost or Theft
Personal vs Professional data
How is it misappropriation if you allowed your employee to keep the information on his personal mobile device?
Access to personal Data?
Data Ownership
Employee-Purchased apps
Software Licensing

Wage & Hour Claims How do you tell your employees what they can and can't do with their own phones?
Expense Reimbursement?
Do your employees really want to pay for their own iPad, iPhone, and laptops? Is it really less expensive?

Is your IT department ready to support dozens of devices? What are the Benefits of BYOD? For the Company Fulfills the needs of the company
May be cost-saving measure
Worker satisfaction
Higher productivity
Increased quality of work
BYOD devices more up-to-date For the Employee Better life/work balance
More satisfied with the equipment they use
Less training time
More efficient and productive
Personal freedom = greater position longevity Best Practices Implement New Policies
Implement a New Architecture Steps: Segment the workforce Create a Service Strategy Develop a Business Case Define BYOD Policy Sample Policy Develop User Support model NAC Not Everyone Should Participate in BYOD Well communicate around BYOD. Security Security Public transfer programs should be disabled Configure device for remote access/ remote wipe Use remote location features Password protection a must! Force wipe after 10 unsuccessful password attempts Encryption is worth considering Use Mobile Device Management Software No "Jailbreak" Phones Services Mobile Devices
Limited Access to Enterprise Applications
Some Enterprise Intranets
Enterprise Applications
Enterprise Intranets
Active Directory
File Systems Personal, Not Enterprise Devices
Mac OS, Windows, Linux
WIFI/Wired Access
iOS, Android, Windows Phone
Qualified devices
Tolerated devices
Current Support
No hardware support
Best Effort Questions? Consumerization of IT IT now has to compete against public alternatives
dropbox, Google docs...
Users own the apps - not IT
Need to provide flexible, standard based architecture for network and infrastructure and applications
Users don't tolerate delay or lag Generation Y In 3-5 Years 50% of the workforce will be from the "millennial" generation
Today's employees are completely wireless and many use Mac, Linux...
They naturally work with multiple devices that they choose
The best and brightest candidates would go to the companies they would feel more comfortable working for Mobility Mobile devices are valuable tools for conducting business
1 out 3 young employees considers the internet to be as important as water, food and shelter
1 out 5 would accept a lower-paying job to have more flexibility in regard to device choice, social media access and mobility
80 % of workers have broken corporate social media security policies IT Challenges No such thing as "one size for all"
Select criteria :
Need for Mobility
Need for Performance
Identify common use cases for each group Prioritize use cases for implementation
"Col Blanc" - Multiple Devices/Access
"Col Bleu" - Corporate or own PC/ Wired Access
External Consultant - Own PC/Wireless Access Develop TCO model
Should have ongoing and management costs
Upfront Investment
Licensing, infrastructure
Potential Savings on current TCO
Calculate ROI IT should engage stakeholders form Security, HR, legal and/or compliance departments during the process
Policy design is critical to controlling cost
The policy must be clear on who is entitled to BYOD and who is not
Rules of Use are necessary to set expectations of behavior
Periodically review the policy document to ensure it is up to date with the business needs and related regulations User Roles and Responsibilities
User Responsibilities
Loss and Theft
Applications and Downloads
Backup and File Sharing or Synchronization
Functionality and Feature Management
User Safety
Data and System Security
Support BYOD
Reimbursement Guidelines
EDF Discounts
Technical Support Processes
How to Get Support
Warranty and Replacement Responsibility
Termination of Employment
E-Discovery Poorly implemented BYOD initiatives can increase the support costs
Develop self-support capability. Either establish internal sites or publish external sites with common support answers
Broken Devices
Spare devices
List of approved devices Technical

Solutions Wireless Access Citrix NetScaler Devices Plan for BYOD Security Control and manage Access to the corporate infrastructure and data : Network Access Control solutions
Desktop and application virtualization
The device doesn't contain any sensitive corporation information
A lost device doesn't spell a disaster!!
Security groups
Full transcript