slide1
Download
Skip this Video
Download Presentation
Consumerization of IT

Loading in 2 Seconds...

play fullscreen
1 / 30

Consumerization of IT - PowerPoint PPT Presentation


  • 597 Views
  • Uploaded on

Consumerization of IT. (Bring Your Own Device ). The C onsumerization of IT is Driven by…. Cloud Computing. Data Explosion. Social Computing. Browser-based Apps. Ecosystem of Computers. Personal Devices in the Workplace. Ubiquitous Connectivity. Natural Interaction.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Consumerization of IT' - jasia


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1
Consumerization of IT

(Bring Your Own Device)

the c onsumerization of it is driven by
The Consumerization of IT is Driven by…

Cloud Computing

Data Explosion

Social Computing

Browser-based Apps

Ecosystemof Computers

Personal Devicesin the Workplace

Ubiquitous Connectivity

Natural Interaction

the consumerization of it is d riven by
The Consumerization of IT is Driven by…

Cloud Computing

Data Explosion

Social Computing

Browser-based Apps

Ecosystem of Computers

Personal Devices in the Workplace

Ubiquitous Connectivity

Natural Interaction

the consumerization brings a lot of issues
The Consumerization Brings a Lot of Issues
    • Infected managed PCs on the network
    • Accessing corporate content from unmanaged devices
    • VPN support
    • Unable to manage PCs and phones on the Internet
  • Access and identity
  • Device management
  • Business productivity
  • Remote access
  • Application development
  • Remote wipe devices
  • Authorized mobile device access
  • Increasing support costs
  • No data access strategy
  • Prevent data leakage
  • Confidential information on personal devices
  • Sensitive data on lost or stolen laptop
  • Compliance
  • Unmanaged device access to sensitive data
  • Personal devices on the corporate network
a minute in the history of the work e nvironment
A Minute in the History of the Work Environment
  • Two billion mobile Internet devices today in the world
  • 2/3 of companies worldwide have adopted tablets
  • Only 20% of tablet owners use the device for content creation
  • Around 371 million computers sold in 2011
  • Around 6 billion mobile phones worldwide
  • 16 phones per PC
  • Around 21 million tablets worldwide
  • 17 PCs per tablet, 285 phones per tablet

Location

Screen

An activity

We are all consumers and workers already.

Just depending on what you are doing

CONSUMERIZATION HAS ALREADY HAPPENED

Sources: International Telecommunications Union, “Tablet Demand and Disruption” Morgan Stanley, IDC

people consumers workers

WORK

LIFE

balance

“People = Consumers = Workers”

Want to:

Connect

Collaborate

Create

Customize

Do things faster

We are:

Complex

Technically capable

Self-supported

Cost-aware

Worried about security

Create and protect our intellectual property

Expect:

24/7

Instant response

Instant information

Share

The world to be relevant to us

Evolution

Revolution

LIFE

family

friends

work

what is your strategy

Bring your own computer

Thin clients

Virtual desktop interface

Consumer devices

Smart phones

Managed desktops

Managed laptops

Environment

Desktop …

What Is Your Strategy?
what is your strategy1

Environment

Desktop …

What Is Your Strategy?
  • Bring your own computer
  • Managed laptops
  • Managed desktops
  • Smart phones
  • Consumer devices
  • Virtual desktop interface
  • Thin clients
microsoft is embracing the c onsumerization of it four components to the strategy
Microsoft is Embracing the Consumerization of ITFour Components to the Strategy:

Security and management to support flexible workstyles

Windows-based devices that people love

Best productivity experience

Unified application development

three dimensions
Three Dimensions

Who

User

Need

Where

Device + location

Choice

What

Apps+ data

Enterprise control

bring your own framework
Bring Your Own Framework

Choose Your Own

White-listing devices Loose policies

  • On Your Own
  • Any device
  • No policies

Choose Your Own

White-listing devices Loose policies

On Your Own

Any device

No policies

Bring Your Own

Freedom of devices

Loose policies

Here is Your Own

Predefined device Strict policies

Here is Your Own

Predefined device Strict policies

  • Bring Your Own
  • Freedom of devices
  • Loose policies
bring your own framework1
Bring Your Own Framework

Choice

On Your

Own

Bring Your

Own

Choose Your Own

Here Is Your

Own

Enterprise control

Your decision should be based on the level of freedom vs. control you need

one who
One:Who?
  • Enablement
  • Proxy LOB applications
  • Public collaboration
  • Mobility
  • Business value
  • Collaboration needs
  • LOB applications
  • Engagement with technology
  • Mobility
  • Secure and compliant environment
  • LOB applications
  • Business value
  • Collaboration needs
  • Mobility

Contractor

Project Manager

Account Manager

Stock Trader

Nothing

Simplified enablement

Enterprise enablement

Compliancy enterprise

enablement

one who1
One:Who?

Contractor

Project Manager

Account Manager

Stock Trader

  • Enablement
  • Proxy LOB applications
  • Public collaboration
  • Mobility
  • Business value
  • Collaboration needs
  • LOB applications
  • Engagement with technology
  • Mobility
  • Secure and compliant environment
  • LOB applications
  • Business value
  • Collaboration needs
  • Mobility

Compliancy enterprise

enablement

Nothing

Simplified enablement

Enterprise enablement

two where
Two: Where?

On Your Own

Bring Your Own

Choose Your Own

Here Is Your Own

three what
Three: What?

None

User

Public Data

Low

Medium

High

business

impact

Device + location

Zero Leakage

Apps+ data

Business impact of data loss, corruption, or exposure?

bringing it together
Bringing it Together

Unified access gateway

Low

Email

  • Seamless access

Presence and IM

Voice/communications

Project Manager

Account Manager

Moderate

Stock Trader

CRM

Central documents

Secure

<

High

>

Virtualization

Business intelligence

LOB applications

Public web

Contractor

assess the impact to your organization
Assess the Impact to Your Organization

Ambition

Program Plan

On Your Own

Bring Your Own

Choose Your Own

Here’s Your Own

Policies

  • User
  • Basic
  • Domain
  • Enterprise

Policy

/ legal

impact

Security

Financial impact

Vendor contractual changes

  • User-managed
  • Local admin
  • Local admin
  • Basic policy enforcement:
  • Encryption check
  • Virus scanned check
  • Password policy, remote wipe
  • Central managed
  • Local user
  • Authentication (password complexity)
  • Device policies
  • Application access
  • Central managed
  • Strong authentication (SmartCard)
  • Drive encryption

Data availability changes

Employee benefits changes

Impact Assessment

IT

  • LEGAL

Health

  • User-driven health management
  • Health assessment
  • Quarantined access
  • Health enforcement
  • Patch, firewall, configuration
  • Lock down templates
  • Device policies

Application changes

Infrastructure changes

Concerns

Support process changes

Security policy changes

Financial

Compliance

Data

Apps

IT

Infra

  • FINANCE
  • HR
understand people business
Understand People + Business

High Autonomy

5%

20%

15%

Low Mobility

High Mobility

60%

Low Autonomy

establish policies
Establish Policies

Devices

Management

Assets

Bring Your Own

Choose Your Own

Here is Your Own

Corporate

Public

Low Business Impact

Medium Business Impact

High Business Impact

  • Bring Your Own
  • Choose Your Own

Partial

  • Public
  • Low Business Impact
  • Medium Business Impact

On Your

Own

  • Bring Your Own
  • Choose Your Own

Proxied

  • Public
  • Low Business Impact
  • Medium Business Impact
  • High Business Impact

On Your

Own

  • Bring Your Own
  • Choose Your Own

Public

  • Public
establish service p ortfolio
Establish Service Portfolio

Consumer Devices

IT services portfolio

Consumer Devices

IT Services Portfolio

On Your Own

  • Client Services
  • Client Services

Data Center Services

Data Center Services

User interface

Application

Services

Application

Services

Business Productivity

Services

Business Productivity

Services

  • Document authoring and publishing

Local, RemoteApp

File and print

Web

Collaboration

  • Social and communication

Application delivery

LOB Platform

Enterprise content management

Bring Your Own

  • User state

Hosted Desktop

Remote Web Access

Desktop delivery

Process management

Enterprise search

  • User authentication

CYO,HYO

Identity and access

Integration

Reporting and analysis

  • Content synchronization

CYO,HYO

Consumer Devices

Consumer Devices

Service delivery

Reporting and analysis

Unified communications

  • File discovery and sharing

Choose Your Own

CYO,HYO

Direct Access NAP, Access Gateway, Remote Desktop Gateway,

  • Protection

Protection

Data warehouse

Messaging and calendering

BYO, CYO,HYO

  • Virtualization

Advanced networking

Development

LOB suite

CYO,HYO

  • Management agent

Here Is Your Own

  • Devices and peripherals

Basic Infrastructure

Basic Infrastructure

Service operations

Processing

Basic networking

Storage

  • Connectivity
build a roadmap
Build a Roadmap

Contractor

Project Manager

Account Manager

Stock Trader

IT Assessment

What

Where

Who

IT Assessment

start delivering s ervices
Start Delivering Services

Who

User

Need

Identity management

Identity federation + directory services

Where

Location + devices

Choice

Access management, device management

Network access services,

asset + config. management,

virtualization

What

Apps + data

Enterprise control

Information protection,

app delivery

Digital rights management,

encryption,

virtualization

slide29
Q&A

Aka.ms\ConsumerizationStrategy