1 / 34

BYOD

BYOD. Should We Do It?. Our Team. Presentation Agenda. Introduction BYOD and Intel Issues & Implications Implementation Conclusion. Introduction. IT Consumerization. The Post-PC Era Increased consumerization of technology Increased adoption of mobile devices

iniko
Download Presentation

BYOD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BYOD Should We Do It?

  2. Our Team

  3. Presentation Agenda Introduction BYOD and Intel Issues & Implications Implementation Conclusion

  4. Introduction

  5. IT Consumerization The Post-PC Era Increased consumerization of technology Increased adoption of mobile devices Evolution of ubiquitous services Cloud and social media technologies Blurring lines of work and personal Many organizations are supporting it 62% to support by year’s end

  6. Strengths • Costs savings & ROI • Connected mobile workforce • Appeals to younger workforce • Weaknesses • System integration & interoperability • Needs additional policies & measures SWOT Analysis • Opportunities • Freedom of choice for employees • Apps for mobile productivity • Maintain competitive edge • Threats • Increased security risks • Causes blurring of work & personal

  7. BYOD @ Intel

  8. Advantages Productivity gains Work outside office hours Real-time collaboration Cost reduction Hardware and support costs Employees to take on the costs Competitive advantage Attract young innovative talent IT savvy employees

  9. Issues Security Technology and people Legal and ethical E-Discovery and privacy concerns Financial considerations Incentives and costs

  10. Issues & Implications

  11. Financial Implications

  12. Considered Options: • Incorporate incentives for purchasing devices with specific support provisions • “Approved” device: Pick up the entire tab for both device and service • “Unapproved” device: Pay only for the cost of service Financial Considerations

  13. Financial Considerations • Pros: • Easier for IT staffs to provide support and troubleshooting • Decreases costs of evaluating, configuring and supporting large pool of devices • Cons: • No significant cost-savings on device procurement • Does not eliminate problem of lost devices • Still required to provide support for “unapproved” devices

  14. Do not restrict employee’s choice of devices • Do not sponsor employee’s devices and/or service • Better utilize funds to improve support infrastructure • Additional firewall controls • Information delivery methods to tablets, Windows PCs, Macs etc. • Most commonly: Web portals *10,000 SFF devices Assuming 6000 smartphones at $500, 1000 tablets at $200, and 3000 laptops at $2,000 = $1,200,406,000,000 Recommendation

  15. Result: • Employees can use desired devices • Intel able to provide sufficient support and configuration for employee’s devices • Better utilization of funds • Eliminate Intel’s obligation to replace lost devices Recommendation

  16. Employee’s productivity! • BYOD employees  additional 57 mins daily • Burden rate: $100/hr • Approximately $238 million / year Assume 251 working days in 2010 10,000 employees $95/57 min 251 * 10000 * 95 = $238,450,000 a year in increased productivity Dollarized risks/returns of BYOD?

  17. Security

  18. Considered Options Deny “unmanaged” devices Pro: BYOD devices would be fully “managed” Con: Promote shadow IT Client-server solution Pro: Secure data from unmanaged device Con: Attacks via compromised unmanaged device

  19. Technology Mobile device management Increase visibility Gain control Wipe rule Application management Blacklist of apps Containerisation/App-wrapping

  20. Technology Network Management Control access to corporate network Data management Document repositories Collaboration tools

  21. People Communicate with End Users & Key Stakeholders Education Training User, Service Desk & Developers Code of Conduct Risk awareness

  22. Legal and Ethics

  23. E-Discovery Considered Options: Signing Agreement on legal safeguards Allow Information to flow through corporate servers Collaborate with Device Manufacturers to install e-Discovery

  24. Signing Service Agreement Data storage and Backup Monitoring and Audit Rights

  25. Information flow through corporate servers Compliance with privacy laws Impossible for all data to flow through servers

  26. Install E-Discovery in Device Restricts employees to buying devices from specific manufacturers Defeats the purpose of BYOD Cost of Collaboration

  27. How to solve the issues? Provide apps that use make use of corporate servers Manage Data Retrieval Process Proper Handling of Data

  28. Implementation Challenges

  29. Stakeholders Human Resource Legal Finance IT

  30. Implementation Plan

  31. Implementing BYOD Device Support Handling OS Updates Managing Lost Devices Roll-out Plan Pilot Program

  32. Conclusion

  33. Conclusion BYOD: more than a passing fad Source of competitive advantage Issues and Implications Security, financial, legal and ethical Recommendations and implementation plan Should we implement BYOD? Not about technology, but about people Encourage and embrace innovation

  34. Questions & Answers

More Related