Consumerization of IT
This presentation is the property of its rightful owner.
Sponsored Links
1 / 30

Consumerization of IT PowerPoint PPT Presentation


  • 366 Views
  • Uploaded on
  • Presentation posted in: General

Consumerization of IT. (Bring Your Own Device ). The C onsumerization of IT is Driven by…. Cloud Computing. Data Explosion. Social Computing. Browser-based Apps. Ecosystem of Computers. Personal Devices in the Workplace. Ubiquitous Connectivity. Natural Interaction.

Download Presentation

Consumerization of IT

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Consumerization of it

Consumerization of IT

(Bring Your Own Device)


The c onsumerization of it is driven by

The Consumerization of IT is Driven by…

Cloud Computing

Data Explosion

Social Computing

Browser-based Apps

Ecosystemof Computers

Personal Devicesin the Workplace

Ubiquitous Connectivity

Natural Interaction


The consumerization of it is d riven by

The Consumerization of IT is Driven by…

Cloud Computing

Data Explosion

Social Computing

Browser-based Apps

Ecosystem of Computers

Personal Devices in the Workplace

Ubiquitous Connectivity

Natural Interaction


The consumerization brings a lot of issues

The Consumerization Brings a Lot of Issues

  • Infected managed PCs on the network

  • Accessing corporate content from unmanaged devices

  • VPN support

  • Unable to manage PCs and phones on the Internet

  • Access and identity

  • Device management

  • Business productivity

  • Remote access

  • Application development

  • Remote wipe devices

    • Authorized mobile device access

    • Increasing support costs

    • No data access strategy

    • Prevent data leakage

    • Confidential information on personal devices

    • Sensitive data on lost or stolen laptop

    • Compliance

    • Unmanaged device access to sensitive data

    • Personal devices on the corporate network


    A minute in the history of the work e nvironment

    A Minute in the History of the Work Environment

    • Two billion mobile Internet devices today in the world

    • 2/3 of companies worldwide have adopted tablets

    • Only 20% of tablet owners use the device for content creation

    • Around 371 million computers sold in 2011

    • Around 6 billion mobile phones worldwide

    • 16 phones per PC

    • Around 21 million tablets worldwide

    • 17 PCs per tablet, 285 phones per tablet

    Location

    Screen

    An activity

    We are all consumers and workers already.

    Just depending on what you are doing

    CONSUMERIZATION HAS ALREADY HAPPENED

    Sources: International Telecommunications Union, “Tablet Demand and Disruption” Morgan Stanley, IDC


    People consumers workers

    WORK

    LIFE

    balance

    “People = Consumers = Workers”

    Want to:

    Connect

    Collaborate

    Create

    Customize

    Do things faster

    We are:

    Complex

    Technically capable

    Self-supported

    Cost-aware

    Worried about security

    Create and protect our intellectual property

    Expect:

    24/7

    Instant response

    Instant information

    Share

    The world to be relevant to us

    Evolution

    Revolution

    LIFE

    family

    friends

    work


    Microsoft vision for consumerization

    Microsoft Vision for Consumerization


    Consumerization of it

    Strategy


    What is your strategy

    Bring your own computer

    Thin clients

    Virtual desktop interface

    Consumer devices

    Smart phones

    Managed desktops

    Managed laptops

    Environment

    Desktop …

    What Is Your Strategy?


    What is your strategy1

    Environment

    Desktop …

    What Is Your Strategy?

    • Bring your own computer

    • Managed laptops

    • Managed desktops

    • Smart phones

    • Consumer devices

    • Virtual desktop interface

    • Thin clients


    Microsoft is embracing the c onsumerization of it four components to the strategy

    Microsoft is Embracing the Consumerization of ITFour Components to the Strategy:

    Security and management to support flexible workstyles

    Windows-based devices that people love

    Best productivity experience

    Unified application development


    Consumerization of it

    Start Here


    Three dimensions

    Three Dimensions

    Who

    User

    Need

    Where

    Device + location

    Choice

    What

    Apps+ data

    Enterprise control


    Bring your own framework

    Bring Your Own Framework

    Choose Your Own

    White-listing devices Loose policies

    • On Your Own

    • Any device

    • No policies

    Choose Your Own

    White-listing devices Loose policies

    On Your Own

    Any device

    No policies

    Bring Your Own

    Freedom of devices

    Loose policies

    Here is Your Own

    Predefined device Strict policies

    Here is Your Own

    Predefined device Strict policies

    • Bring Your Own

    • Freedom of devices

    • Loose policies


    Bring your own framework1

    Bring Your Own Framework

    Choice

    On Your

    Own

    Bring Your

    Own

    Choose Your Own

    Here Is Your

    Own

    Enterprise control

    Your decision should be based on the level of freedom vs. control you need


    One who

    One:Who?

    • Enablement

    • Proxy LOB applications

    • Public collaboration

    • Mobility

    • Business value

    • Collaboration needs

    • LOB applications

    • Engagement with technology

    • Mobility

    • Secure and compliant environment

    • LOB applications

    • Business value

    • Collaboration needs

    • Mobility

    Contractor

    Project Manager

    Account Manager

    Stock Trader

    Nothing

    Simplified enablement

    Enterprise enablement

    Compliancy enterprise

    enablement


    One who1

    One:Who?

    Contractor

    Project Manager

    Account Manager

    Stock Trader

    • Enablement

    • Proxy LOB applications

    • Public collaboration

    • Mobility

    • Business value

    • Collaboration needs

    • LOB applications

    • Engagement with technology

    • Mobility

    • Secure and compliant environment

    • LOB applications

    • Business value

    • Collaboration needs

    • Mobility

    Compliancy enterprise

    enablement

    Nothing

    Simplified enablement

    Enterprise enablement


    Two where

    Two: Where?

    On Your Own

    Bring Your Own

    Choose Your Own

    Here Is Your Own


    Three what

    Three: What?

    None

    User

    Public Data

    Low

    Medium

    High

    business

    impact

    Device + location

    Zero Leakage

    Apps+ data

    Business impact of data loss, corruption, or exposure?


    Bringing it together

    Bringing it Together

    Unified access gateway

    Low

    Email

    • Seamless access

    Presence and IM

    Voice/communications

    Project Manager

    Account Manager

    Moderate

    Stock Trader

    CRM

    Central documents

    Secure

    <

    High

    >

    Virtualization

    Business intelligence

    LOB applications

    Public web

    Contractor


    Consumerization of it

    Steps to Consumerization


    Assess the impact to your organization

    Assess the Impact to Your Organization

    Ambition

    Program Plan

    On Your Own

    Bring Your Own

    Choose Your Own

    Here’s Your Own

    Policies

    • User

    • Basic

    • Domain

    • Enterprise

    Policy

    / legal

    impact

    Security

    Financial impact

    Vendor contractual changes

    • User-managed

    • Local admin

    • Local admin

    • Basic policy enforcement:

    • Encryption check

    • Virus scanned check

    • Password policy, remote wipe

    • Central managed

    • Local user

    • Authentication (password complexity)

    • Device policies

    • Application access

    • Central managed

    • Strong authentication (SmartCard)

    • Drive encryption

    Data availability changes

    Employee benefits changes

    Impact Assessment

    IT

    • LEGAL

    Health

    • User-driven health management

    • Health assessment

    • Quarantined access

    • Health enforcement

    • Patch, firewall, configuration

    • Lock down templates

    • Device policies

    Application changes

    Infrastructure changes

    Concerns

    Support process changes

    Security policy changes

    Financial

    Compliance

    Data

    Apps

    IT

    Infra

    • FINANCE

    • HR


    Understand people business

    Understand People + Business

    High Autonomy

    5%

    20%

    15%

    Low Mobility

    High Mobility

    60%

    Low Autonomy


    Establish policies

    Establish Policies

    Devices

    Management

    Assets

    Bring Your Own

    Choose Your Own

    Here is Your Own

    Corporate

    Public

    Low Business Impact

    Medium Business Impact

    High Business Impact

    • Bring Your Own

    • Choose Your Own

    Partial

    • Public

    • Low Business Impact

    • Medium Business Impact

    On Your

    Own

    • Bring Your Own

    • Choose Your Own

    Proxied

    • Public

    • Low Business Impact

    • Medium Business Impact

    • High Business Impact

    On Your

    Own

    • Bring Your Own

    • Choose Your Own

    Public

    • Public


    Establish service p ortfolio

    Establish Service Portfolio

    Consumer Devices

    IT services portfolio

    Consumer Devices

    IT Services Portfolio

    On Your Own

    • Client Services

    • Client Services

    Data Center Services

    Data Center Services

    User interface

    Application

    Services

    Application

    Services

    Business Productivity

    Services

    Business Productivity

    Services

    • Document authoring and publishing

    Local, RemoteApp

    File and print

    Web

    Collaboration

    • Social and communication

    Application delivery

    LOB Platform

    Enterprise content management

    Bring Your Own

    • User state

    Hosted Desktop

    Remote Web Access

    Desktop delivery

    Process management

    Enterprise search

    • User authentication

    CYO,HYO

    Identity and access

    Integration

    Reporting and analysis

    • Content synchronization

    CYO,HYO

    Consumer Devices

    Consumer Devices

    Service delivery

    Reporting and analysis

    Unified communications

    • File discovery and sharing

    Choose Your Own

    CYO,HYO

    Direct Access NAP, Access Gateway, Remote Desktop Gateway,

    • Protection

    Protection

    Data warehouse

    Messaging and calendering

    BYO, CYO,HYO

    • Virtualization

    Advanced networking

    Development

    LOB suite

    CYO,HYO

    • Management agent

    Here Is Your Own

    • Devices and peripherals

    Basic Infrastructure

    Basic Infrastructure

    Service operations

    Processing

    Basic networking

    Storage

    • Connectivity


    Evaluate c urrent capabilities

    Evaluate Current Capabilities

    IT Assessment


    Build a roadmap

    Build a Roadmap

    Contractor

    Project Manager

    Account Manager

    Stock Trader

    IT Assessment

    What

    Where

    Who

    IT Assessment


    Start delivering s ervices

    Start Delivering Services

    Who

    User

    Need

    Identity management

    Identity federation + directory services

    Where

    Location + devices

    Choice

    Access management, device management

    Network access services,

    asset + config. management,

    virtualization

    What

    Apps + data

    Enterprise control

    Information protection,

    app delivery

    Digital rights management,

    encryption,

    virtualization


    Consumerization of it

    Q&A

    Aka.ms\ConsumerizationStrategy


    Backup

    Backup


  • Login