1 / 24

BYOD, BYOA and Consumerization

A quick look at the BYOD or Bring Your Own Device trend in business from a Channel point of view. Includes a number of sources such as CompTIA, Forbes, Techaisle, VDC, IANS and IDC

jmcbain
Download Presentation

BYOD, BYOA and Consumerization

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BYOD, BYOA and Consumerization Jay McBain Co-Founder

  2. How Did We Get Here? MILLENIALS UBIQUITOUS CONNECTIVITY MATURITY OF CLOUD BYOD PERVASIVE COMPUTING COST OF CLIENT/ SERVER GROWTH OF VIRTUALIZATION

  3. Just the Facts Where are we now?

  4. Just the Facts 87% of workers travel 84% use a smartphone for work BYOD is not coming 85% of workers bring work home …it is here Only 22% of companies have a formal mobility policy in place Where are we now? Source:

  5. Just the Facts BYOD, mostof them define it as email/calendar While 60% of IT leaders say they support First, we need to be careful how we define BYOD “Enterprise mobility is still in its infancy” Source: Where are we now? BYOC stalled at 15%, 75% of SMB’s against

  6. • Chance to add new managed devices • Ability to make the customer's end users happy • Make customer more productive by adding new services (if they can be added safely) • Keeps the MSP close to the customer What side are you on? • Disruption of existing IT policies and procedures • Introduction of new and un-verified third party cloud applications into the company network • Higher potential for data leakage and exposure • Greater costs to MSPs resulting in lower profits Source:

  7. Questions to ask your customer  Are you offering more than email and calendaring?  Are you enabling corporate access via a mobile VPN? If so, what does that experience look like? Does it feel seamless or clunky?  Do you have a plan for accessing legacy application data on a mobile device?  Do you really think desktop virtualization on an iPad is the experience your users want?  Are you offering BYOD on any platform or just on “iDevices”

  8. Top Customer Fears % of SMB respondents 68% 49% 35% 31% 31% 29% 27% 1. Accidental loss of devices with sensitive data 2. Threats from mobile viruses and malware 3. Access to mobile apps by unauthorized users 4. Lack of Strong Authentication standards 5. Inability to manage mobile devices 6. Configurations don’t comply with policy 7. Lack of VPN software/compatibility to enterprise Source:

  9. Healthcare is the fastest growing industry 85% of doctors own a smartphone, 56% use it in clinical practice Pharmaceuticals, Manufacturing and Retail are also HOT Where are the opportunities? Field Mobility Organizations are laggards Source:

  10. Just the Facts concern by 48% of respondents Downloading unauthorized apps serious Source: What is BYOA? 750,000+ APPS 600,000+ APPS 70,000+ APPS Where are we now? 80,000+ APPS

  11. Opportunity for Triple Play Current Channel Specialties Source:

  12. OPPORTUNITY 1 Risk Assessment/Opportunity What can you do that protects your customer and that they are comfortable with vs. what is good for their employee? 3 Key Focus Areas: 1. Information protection: Determine information that is and is not deemed “cleared” for consumption on mobile devices either due to its sensitivity or due to the compliance burdens associated with handling it. 2. User sensitivity: Creating a profile of at-risk users and the security required for their access to critical information. 3. System risk: Take advantage of features such as on-device encryption, the use of VPNs and multi-factor authentication provides a line of safety between users, their devices and the back-end. Tiered information access. Source:

  13. OPPORTUNITY 2 Create a Mobility Policy/Deploy Questions to consider:  How are you going to protect the data?  How are employees going to log in?  What devices are you going to allow on the network?  What employee security mandates are you going to impose?  Are you going to allow Personal Identifiable Information (PII) or Protected Health Information (PHI) on the devices?  What are data compliance/privacy requirements for your customers industry? (ie. Privacy Act, PIPA (AB), HIPAA, GLBA, PCI, SOC, etc.) Source:

  14. OPPORTUNITY 3 Mobile Device Management Over a hundred choices …and counting

  15. OPPORTUNITY 4 Infrastructure and Support 1. WLAN Coverage/Performance 2. Employee Support/Helpdesk 3. Device Provisioning 4. Line of Business Consulting 5. Device Hot Spare programs 6. Audio/Video Upgrades 7. Mobile Printing/Document Management 8. Building/Electrical Upgrades

  16. Let’s make some predictions!

  17. Prediction #1 Pervasive computing has arrived…but you haven’t seen anything yet!

  18. BYOD is more than just smartphones and tablets

  19. Prediction #2 Ubiquitous connectivity changes the business landscape forever “Device wireless access with overtake wired computer access by 2015”

  20. Prediction #3 100,000 vendors driven by new cloud economy, compete for your attention

  21. Prediction #4 will be the new reality “Downloading unauthorized apps serious concern by 48 percent of respondents”

  22. Prediction #5 Managing security, compliance, data portability, fragmentation and device support drives: Channel Opportunity IDC Canada projects that over the next five years, BYOD will be a $2.2 billion market

  23. Prediction #6 ChannelEyes becomes the single place for BYOD and all Channel Program Information!

More Related