What Does Bring Your Own Device (BYOD) Do To Your IT Strategy?

Size: px
Start display at page:

Download "What Does Bring Your Own Device (BYOD) Do To Your IT Strategy?"

Transcription

1 What Does Bring Your Own Device (BYOD) Do To Your IT Strategy? George Spalding Executive Vice President, Pink Elephant 1 st Annual IT Service Management Leadership Forum

2 Introductions Martin Erb Director, Professional Services Pink Elephant Phil Day Chief NIH IT Service Desk 2

3 Benefits & Pitfalls Of A BYOD Strategy It is all about productivity. When it includes BYOD, this is not without cost or risk. A McAfee survey reports 45% of organizations feel that managing BYOD within the enterprise network is critical. How should Information Security Management allow for nonstandard devices? Can the Service Desk still provide a valuable support service in a BYOD environment? If so, how? Is it incumbent on ITSM to define policies around BYOD? And, apart from productivity, are there also worthwhile cost savings? 3

4 Trends? Cloud Is it the same conversation? Consumerization of IT Has nothing to do with Social Media Has everything to do with Dropbox BYOD Bring Your Own Device Who pays for what? Is it cheaper? Who is liable? Finger pointing? SYOD Support Your Own Device Stealth Outsourcing? Crowd Sourcing? 4

5 Challenges? Pitfalls? Data Security Where is my data? In the Cloud? On the hard drive in the cloud? Dropbox just reported a security breach On the device? Yours? Mine? Across the wire? In the Air? Wi-Fi? 3G? Just exactly where is the outside perimeter of my network infrastructure? Compliance Will employees adhere to policies? 5

6 Employee Compliance? Recent ComputerWorld Survey (6/12) of college grads, ages 21-29, in 15 countries revealed: More than half see BYOD as a right not a privilege Most already use their own device at work regardless of any policies 66% admitted they already have or would contravene policies banning BYOD device use 30% of all those surveyed indicated they'd contravene policy on non-approved applications 69% want a "Bring Your Own Application" environment where users create and use their own custom applications at work Two-thirds of those surveyed believe they, not the company, should be responsible for the security of devices used for work purposes 6

7 Conclusions The Cloud is Inevitable Adopt a Cloud Strategy BYOD is Inevitable Create a BYOD policy today Design the Service with BYOD and the Cloud in Mind Take Special Care with Service Levels for the Business Understand their true requirements in detail Understand your Accountability and Liability with regard to Corporate Compliance and the Business Negotiate SLA s with the Business that include BYOD 7

8 Thank You! Session Evaluation Please take a few minutes to fill out an evaluation on this session. We greatly appreciate your feedback! 8

9 APPENDIX 9

10 Tips For BYOD Policies What are you waiting for? Educate yourself now! Corporate-liable? Individual-liable? Create policies governing where corporate data can be stored? In the Cloud? On the device? Virtualization Virtual Desktop Infrastructure (VDI) may be the ultimate solution Compliance Is your organization subject to data security regulations? Will BYOD pass muster? Educate employees about policies! WIIFM? 10

11 BYOD: Productive Or Counter-Productive? Summarized results of 2012 Symantec Survey: State of Mobility, quoted from the BYOD Best Practices, Secure Data not Devices article written by Thor Olavsrud, and published in CIO magazine, July 17th, 2012) 59 percent of the 6,275 respondents reported that their organizations are making line-of-business applications accessible from mobile devices, and 71 percent said their organization is looking at implementing a corporate "store" for mobile applications Organizations believe embracing mobile computing increases the efficiency and effectiveness of their workforces. Symantec's survey found that 73 percent of respondents expected to increase efficiency through mobile computing, and all of them did realize that increased efficiency 11

The Future Of The Service Desk: Is It Going Away, Changing Or Staying The Same?

The Future Of The Service Desk: Is It Going Away, Changing Or Staying The Same? The Future Of The Service Desk: Is It Going Away, Changing Or Staying The Same? Gary Case Principal Consultant, Pink Elephant g.case@pinkelephant.com 1 st Annual IT Service Management Leadership Forum

More information

What Emerging Technologies Will I Be Worrying About Next Year?

What Emerging Technologies Will I Be Worrying About Next Year? What Emerging Technologies Will I Be Worrying About Next Year? George Spalding Executive Vice President, Pink Elephant g.spalding@pinkelephant.com 1 st Annual IT Service Management Leadership Forum Introductions

More information

New Rules, New Roles, New People New Organization For ITSM?

New Rules, New Roles, New People New Organization For ITSM? New Rules, New Roles, New People New Organization For ITSM? Troy DuMoulin Vice President, Professional Services, Pink Elephant t.dumoulin@pinkelephant.com 1 st Annual IT Service Management Leadership Forum

More information

What s The Perspective & Challenges Of Managing A Diverse Supplier Group?

What s The Perspective & Challenges Of Managing A Diverse Supplier Group? What s The Perspective & Challenges Of Managing A Diverse Supplier Group? George Spalding Executive Vice President, Pink Elephant g.spalding@pinkelephant.com 1 st Annual IT Management Leadership Forum

More information

What Does Today s ITSM Leader Need To Know About The Cloud?

What Does Today s ITSM Leader Need To Know About The Cloud? What Does Today s ITSM Leader Need To Know About The Cloud? Troy DuMoulin Vice President, Professional Services, Pink Elephant tdumoulin@pinkelephantcom 1 st Annual IT Service Management Leadership Forum

More information

Key Strategies To Capture And Measure The Value Of Consumerization Of IT

Key Strategies To Capture And Measure The Value Of Consumerization Of IT A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro Key Strategies To Capture And Measure The Value Of Consumerization Of IT Enterprises Achieve A Wide Range Of Benefits By Deploying

More information

Interacting with End Users re: Security

Interacting with End Users re: Security Interacting with End Users re: Security How to Strike the Balance between Security and Convenience for the "Normal" User Adam Haeder Vice President of Information Technology, AIM The job of a security

More information

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Management Experience

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Management Experience Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Management Experience Emerging Trends Create New Business and Consumer Expectations It s no secret that the enterprise IT landscape

More information

IT Executive and CEO Survey

IT Executive and CEO Survey Mobile Consumerization Trends & Perceptions IT Executive and CEO Survey FINAL REPORT COMPARISONS: WAVES 1 AND 2 PREPARED FOR: TREND MICRO, INC. BY: DECISIVE ANALYTICS, LLC Cheryl Harris, Ph.D. Chief Research

More information

Consumerization/User-Provisioned Technology Survey

Consumerization/User-Provisioned Technology Survey EDUCAUSE Center for Applied Research Consumerization/User-Provisioned Technology Survey Thank you for participating in this ECAR survey. This study is designed to develop a framework for the important

More information

How To Get Cloud Computing To Work For You

How To Get Cloud Computing To Work For You Employing Cloud Matt Quinn, Managing Director, IQ Cloud Consulting Content by Ian Moyse, Sales Director Workbooks.com In collaboration with Cloud Essentials Training from ITpreneurs White Paper We re pleased

More information

The Connected Enterprise Driving Business Value with Mobility Collaboration and Trust

The Connected Enterprise Driving Business Value with Mobility Collaboration and Trust The Connected Enterprise Driving Business Value with Mobility Collaboration and Trust Enzo Signore - AVAYA Vice President, Enterprise Collaboration Product Strategy 2013 Avaya Inc. All rights reserved.

More information

The flexible workplace: Unlocking value in the bring your own device era

The flexible workplace: Unlocking value in the bring your own device era IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring

More information

The New Workplace: Supporting Bring your own

The New Workplace: Supporting Bring your own IBM Global Technology Services Thought Leadership White Paper December 2011 The New Workplace: Supporting Bring your own 2 The New Workplace: Supporting Bring your own Contents 2 Consumerization takes

More information

1st Annual IT Service Management Leadership Forum. Scottsdale, AZ August 16-17, 2012

1st Annual IT Service Management Leadership Forum. Scottsdale, AZ August 16-17, 2012 NEW EVENT! Early Bird Ends May 25th IT Service Management Leadership Forum A must-attend event for anyone charged with implementing any aspect of ITSM process improvement programs. The unique program features

More information

Ubiquitous Wireless Network for Law Firms and Legal Offices

Ubiquitous Wireless Network for Law Firms and Legal Offices Ubiquitous Wireless for Law Firms and Legal Offices white paper Ubiquitous Wireless Network for Law Firms and Legal Offices Empowering attorneys, legal agency workers and enforcement personnel with Simple,

More information

How To Manage A Mobile Device In An Enterprise

How To Manage A Mobile Device In An Enterprise An Mformation Whitepaper MOBILITY MANAGEMENT: MANAGING THE BRING-YOUR- OWN-DEVICE (BYOD) PHENOMENON 1 Mobility Management: Managing the Bring-your-own-device (BYOD) Phenomenon In many organizations, the

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Hosted Exchange for Business

Hosted Exchange for Business Your complete guide to Hosted Exchange Hosted Exchange for Business 1 Table of Contents Hosted Desk- 3 What is Hosted Exchange? 3 What are the benefits of Hosted Exchange? 4 How easy is it to migrate to

More information

Work From Anywhere With Unified Communications. gsolutionz.com

Work From Anywhere With Unified Communications. gsolutionz.com Work From Anywhere With Unified Communications gsolutionz.com Work From Anywhere With Unified Communications 2 gsolutionz.com Microsoft discovered the average worker is only at his or her desk about 40%

More information

Service Desk Institute 10 Steps To Successful ITSM Tool Selection

Service Desk Institute 10 Steps To Successful ITSM Tool Selection Service Desk Institute 10 Steps To Successful ITSM Tool Selection Introduction The one decision that really makes a difference for both consumers of IT and our service desk analysts is the one to replace

More information

CLOUD SECURITY: Secure Your Infrastructure

CLOUD SECURITY: Secure Your Infrastructure CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED

More information

A 4- Letter Acronym Sending CIOs Running Scared - BYOD

A 4- Letter Acronym Sending CIOs Running Scared - BYOD A 4- Letter Acronym Sending CIOs Running Scared - BYOD What This Means for the other 4- Letter Acronym - ITSM Karen Ferris ABSTRACT Bring Your Own Device (BYOD) or Bring Your Own Computing (BYOC) is being

More information

Shadow IT: data protection and cloud security

Shadow IT: data protection and cloud security Shadow IT: data protection and cloud security George Crump November 17, 2014 This report is underwritten by CipherCloud. TABLE OF CONTENTS Executive summary... 3 Views on shadow IT and data security from

More information

M A N A G I N G C O N U S U L T A N T

M A N A G I N G C O N U S U L T A N T UNDERSTANDING MANAGED SERVICES RUSS HENDERSON M A N A G I N G C O N U S U L T A N T AGENDA Define Compare Implement DEFINE DEFINE Managed Services is the proactive management of an IT asset or object,

More information

Cloud Computing 101: Improve the Value of IT

Cloud Computing 101: Improve the Value of IT Cloud Computing 101: Improve the Value of IT May 02, 2011 2 Cloud Computing 101: Improve the Value of IT Introduction In a fast-moving and volatile market, the ability to harness new technologies and remain

More information

The CIO of the Future Research Report

The CIO of the Future Research Report The CIO of the Future Research Report Becoming a Business Game-Changer Share This Report The CIO of the Future: Becoming a Business Game-Changer While most CIOs agree that their role will change in the

More information

Consumerization Survey Report The Consumerization of IT

Consumerization Survey Report The Consumerization of IT Securing Your Journey to the Cloud Consumerization Survey Report The Consumerization of IT An increasing number of organizations are taking a strategic approach to Consumerization. Learn what they are

More information

ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices

ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices The Landscape of IT Services Provision is Changing! Customers and users are demanding a higher level of customer service

More information

Bringing wisdom to ITSM with the Service Knowledge Management System

Bringing wisdom to ITSM with the Service Knowledge Management System Processes 415 Bringing wisdom to ITSM with the Service Knowledge Management System 7.3 Bringing wisdom to ITSM with the Service Knowledge Management System nowledge is a process of piling up facts; wisdom

More information

Free ITIL v.3. Foundation. Exam Sample Paper 3. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass

Free ITIL v.3. Foundation. Exam Sample Paper 3. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass Free ITIL v.3. Foundation Exam Sample Paper 3 You have 1 hour to complete all 40 Questions You must get 26 or more correct to pass Compliments of Advance ITSM www.advanceitsm.com 1 A Service Level Package

More information

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors

More information

How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency

How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency WHITE PAPER Getting Secure in the Cloud How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency JULY 2011 2 Summary Three out of five study participants trust cloud

More information

The Pitfalls of DIY Approaches to Disaster Recovery

The Pitfalls of DIY Approaches to Disaster Recovery Business Continuity & Resiliency Services The Pitfalls of DIY Approaches to Disaster Recovery Interactivity Tips 1. Ask A Question 2. Download a PDF copy of today s presentation 3. Social Networking Tools

More information

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored

More information

Summary... 1 What s New in This Brief... 1 Details... 1 Customer Scenarios... 3 Frequently Asked Questions... 6

Summary... 1 What s New in This Brief... 1 Details... 1 Customer Scenarios... 3 Frequently Asked Questions... 6 Volume Licensing brief Licensing the Enterprise Cloud Suite This brief applies to the Microsoft Enterprise Agreement program. Table of Contents Summary... 1 What s New in This Brief... 1 Details... 1 Customer

More information

When Computers really become Personal

When Computers really become Personal When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation

More information

The coming obsolescence of the enterprise network

The coming obsolescence of the enterprise network The coming obsolescence of the enterprise network Highlights Adoption of new technologies has traditionally begun in enterprises and then shifted to consumers. Over the past decade during the mobile boom,

More information

Desktop-as-a-Service Gaining Ground

Desktop-as-a-Service Gaining Ground Desktop-as-a-Service Gaining Ground In This Paper A DaaS desktop removes much of the upfront cost and complexity of traditional desktop computing DaaS and VDI are poised for growth: 33 percent of respondents

More information

White Paper. The CIO s Guide to Mobility Lifecycle Management: Managing the Mobility Mix to Embrace BYOD. Improved Process. Real Results.

White Paper. The CIO s Guide to Mobility Lifecycle Management: Managing the Mobility Mix to Embrace BYOD. Improved Process. Real Results. White Paper The CIO s Guide to Mobility Lifecycle Management: Managing the Mobility Mix to Embrace BYOD With 66% of the 25 34 age group using smart devices (source: Nielson), CIOs are recognizing that

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

A 4- Letter Acronym Sending CIOs Running Scared - BYOD

A 4- Letter Acronym Sending CIOs Running Scared - BYOD A 4- Letter Acronym Sending CIOs Running Scared - BYOD What This Means for the other 4- Letter Acronym - ITSM Karen Ferris ABSTRACT Bring Your Own Device (BYOD) or Bring Your Own Computing (BYOC) is being

More information

Crossing the Shadow IT chasm

Crossing the Shadow IT chasm Crossing the Shadow IT chasm The CIO s guide to avoiding IT irrelevance 1 2 3 4 Beating Shadow IT replacing the corporate IT stick with the BYO carrot BYOD starts and finishes with understanding your users!

More information

10/10. Fortescue Metals Group VDI Case Study. The Dashboard. Overview. Key Findings. Recommendations

10/10. Fortescue Metals Group VDI Case Study. The Dashboard. Overview. Key Findings. Recommendations 1 Fortescue Metals Group VDI Case Study By Trevor Clarke, Lead Analyst Asia Pacific Overview This Tech Research Asia end user case study analyses the adoption of a Citrix virtual desktop infrastructure

More information

Embracing Employee-Acquired Smartphones without Compromising Security

Embracing Employee-Acquired Smartphones without Compromising Security Embracing Employee-Acquired Smartphones without Compromising Security Best practices for managing individual-liable devices with BlackBerry Enterprise Server Express. Table of Contents Introduction 1 BlackBerry

More information

Choosing a Consultant

Choosing a Consultant Appendix 4 Choosing a Consultant Guidelines on Selecting a Consultant Properly selecting a consultant is not an easy task. The payoff of taking the time required to make a good choice can be worthwhile,

More information

CIO First 90 Days. The First 90 Days for New Chief Information Officers and Chief Technology Officers. 2008 Benjamin Lichtenwalner

CIO First 90 Days. The First 90 Days for New Chief Information Officers and Chief Technology Officers. 2008 Benjamin Lichtenwalner CIO First 90 Days The First 90 Days for New Chief Information Officers and Chief Technology Officers. Outline Introduction Background Overview Three P s People Products Process TimeLine First 30 Mid 30

More information

Implications of BYOD & the Cloud for Enterprises

Implications of BYOD & the Cloud for Enterprises Implications of BYOD & the Cloud for Enterprises Clive Longbottom, Service Director, Quocirca Ltd BYOD Bring your own device It s not just smartphones, tablets, etc There is also: BYOS (software) Generally

More information

North Carolina's Information Technology Consolidation Audit

North Carolina's Information Technology Consolidation Audit STATE OF NORTH CAROLINA PERFORMANCE AUDIT INFORMATION TECHNOLOGY CONSOLIDATION JANUARY 2013 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR PERFORMANCE AUDIT INFORMATION TECHNOLOGY CONSOLIDATION

More information

BYOD in a private cloud environment

BYOD in a private cloud environment BYOD in a private cloud environment BYOD in a private cloud environment SITUATION OVERVIEW Cloud computing has become more than a buzz word. CIOs and IT managers are seeing a real opportunity to bring

More information

Transforming Customer Relationships and Your Business through Integration: Why Trust Is the New Currency

Transforming Customer Relationships and Your Business through Integration: Why Trust Is the New Currency White Paper Transforming Customer Relationships and Your Business through Integration: Why Trust Is the New Currency Executive Summary Your company needs to earn the trust of its customers; simply because

More information

The ITIL Service Desk. Common Sense Comes To Life. Version : 1.3 Date : August 13, 2003 : Pink Elephant Global Hosting Services www.pinkghost.

The ITIL Service Desk. Common Sense Comes To Life. Version : 1.3 Date : August 13, 2003 : Pink Elephant Global Hosting Services www.pinkghost. The ITIL Service Desk Common Sense Comes To Life Version : 1.3 Date : August 13, 2003 Location : Pink Elephant Global Hosting Services Table Of Contents 1 ITIL DEFINED... 3 2 ITIL S BUSINESS BENEFITS...

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

synetra.com (432) 561-7200 Work From Anywhere With Unified Communications

synetra.com (432) 561-7200 Work From Anywhere With Unified Communications Work From Anywhere With Unified Communications Work From Anywhere With Unified Communications Microsoft discovered the average worker is only at his or her desk about 40% of the time. Despite the trend

More information

With the adoption of the technology of Cloud Computing (Cloud. Computing), virtual desktop solutions represent one of the most

With the adoption of the technology of Cloud Computing (Cloud. Computing), virtual desktop solutions represent one of the most Virtual Desktops By: Italo E. Ayesteran R. With the adoption of the technology of Cloud Computing (Cloud Computing), virtual desktop solutions represent one of the most powerful ways to increase performance

More information

State of Cloud Survey GLOBAL FINDINGS

State of Cloud Survey GLOBAL FINDINGS 2011 State of Cloud Survey GLOBAL FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Acronis 2002-2014 BRING YOUR OWN DEVICE

Acronis 2002-2014 BRING YOUR OWN DEVICE Acronis 2002-2014 BRING YOUR OWN DEVICE Introduction With over a billion smartphones and tablets at arms length, a majority of your global workforce already possesses the technology needed to better connect

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT

More information

Cloud Computing in Vermont State Government

Cloud Computing in Vermont State Government Cloud Computing in Vermont State Government Analysis of Opportunities Duncan Goss, Legislative Director of Information Technology David Tucker, State CIO Introduction Legislation passed during the 2009

More information

Subject: Overview of Information Technology Services and the Strategic Technology Plan. Proposed Committee Action No Action Required Information Only.

Subject: Overview of Information Technology Services and the Strategic Technology Plan. Proposed Committee Action No Action Required Information Only. AGENDA ITEM: IV Florida Polytechnic University Board of Trustees Technology Committee Subject: Overview of Information Technology Services and the Strategic Technology Plan Proposed Committee Action No

More information

RUNNING HEAD: BRING YOUR OWN DEVICE 1

RUNNING HEAD: BRING YOUR OWN DEVICE 1 RUNNING HEAD: BRING YOUR OWN DEVICE 1 Bring Your Own Device: The Advantages and Disadvantages of BYOD Network Policies Benjamin Fuller BRING YOUR OWN DEVICE 2 Introduction The world of mobile devices continues

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

Snohomish County PUD. Service Management Journey. Chris Thorpe Tina Myren June 16, 2010

Snohomish County PUD. Service Management Journey. Chris Thorpe Tina Myren June 16, 2010 Snohomish County PUD Service Management Journey Chris Thorpe Tina Myren June 16, 2010 Topics Snohomish County PUD How We Started Our Approach Change Management ITSM Tool Top Ten Tips Who Is Snohomish County

More information

A Checklist for Software as a Service (SaaS) Vendors and Application Service Providers

A Checklist for Software as a Service (SaaS) Vendors and Application Service Providers A Checklist for Software as a Service (SaaS) Vendors and Application Service Providers This checklist is a longer version of a SaaS Checklist that appeared in the July 2009 issue of LAWPRO Magazine at

More information

Iowa State University Proposal for HR-01 ISU HR Operating Model

Iowa State University Proposal for HR-01 ISU HR Operating Model Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and

More information

Peer Research Report Insights on the Current State of BYOD

Peer Research Report Insights on the Current State of BYOD october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your

More information

HARDWARE BE FREE OF DESKTOPS SERVICE CORE

HARDWARE BE FREE OF DESKTOPS SERVICE CORE BE FREE BE FREE OF HARDWARE BE FREE OF DESKTOPS SERVICE CORE TALK TO OUR EXPERTS 1.877.222.8615 www.bestit.com Copyright 2013 BestIT.com Inc. DESKTOP-AS-A-SERVICE Desktop-as-a-Service (DaaS) is a comprehensive

More information

Could Knowledge Management Help You Operate A More Effective & Efficient It Service Desk?

Could Knowledge Management Help You Operate A More Effective & Efficient It Service Desk? Could Knowledge Management Help You Operate A More Effective & Efficient It Service Desk? Challenges Of The Modern Day Service Desk With ITIL an established framework for delivering quality IT service,

More information

Cybersecurity: You re Doing IT Wrong

Cybersecurity: You re Doing IT Wrong SESSION ID: CXO-F01 Cybersecurity: You re Doing IT Wrong Jared Carstensen Chief Information Security Officer (CISO), CRH Plc @jaredcarstensen Introduction My Journey Every kid has dream jobs growing up

More information

Bring Your Own Device Policy. Report to the Joint Legislative Oversight Committee on Information Technology

Bring Your Own Device Policy. Report to the Joint Legislative Oversight Committee on Information Technology Bring Your Own Device Policy Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer March 2014 This page left blank intentionally Contents

More information

A Real View of Mobile Expenses

A Real View of Mobile Expenses Thought Leadership SERIES OCTOBER 2013 A Real View of Mobile Expenses What do companies need to do to make better business decisions? They need to have access to information that is actionable. No business

More information

State of Cloud Survey SOUTH AFRICA FINDINGS

State of Cloud Survey SOUTH AFRICA FINDINGS 2011 State of Cloud Survey SOUTH AFRICA FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT

More information

Rx for mthreats in Today s Healthcare Institutions. Daniel W. Berger, President and CEO, Redspin, Inc. P: 805.576.7158 E: dberger@redspin.

Rx for mthreats in Today s Healthcare Institutions. Daniel W. Berger, President and CEO, Redspin, Inc. P: 805.576.7158 E: dberger@redspin. Rx for mthreats in Today s Healthcare Institutions Daniel W. Berger, President and CEO, Redspin, Inc. P: 805.576.7158 E: dberger@redspin.com Meaningful Healthcare IT Security Technical Expertise Penetration

More information

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management Alexa Bona s research currently focuses on IT management. As part of the IT Procurement and Asset o Workshop: Six Steps to Preparing and Negotiating Software Contracts o Negotiating effective sustainable

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN. Version : 1.0 Date : April 2009 : Pink Elephant

DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN. Version : 1.0 Date : April 2009 : Pink Elephant DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN Version : 1.0 Date : April 2009 Author : Pink Elephant Table of Contents 1 Executive Overview... 3 2 Manager Responsibilities... 4 2.1 Before

More information

TWENTY-FIVE TIPS FOR EMPLOYEE TRAINING AND SUPERVISION (INCLUDING AVOIDANCE OF UNAUTHORIZED PRACTICE OF LAW)

TWENTY-FIVE TIPS FOR EMPLOYEE TRAINING AND SUPERVISION (INCLUDING AVOIDANCE OF UNAUTHORIZED PRACTICE OF LAW) TWENTY-FIVE TIPS FOR EMPLOYEE TRAINING AND SUPERVISION (INCLUDING AVOIDANCE OF UNAUTHORIZED PRACTICE OF LAW) BY DIANE M. ELLIS FORMER DIRECTOR LAW OFFICE MANAGEMENT ASSISTANCE PROGRAM STATE BAR OF ARIZONA

More information

2015 Analyst and Advisor Summit. Cloud & Infrastructure Services Steve Nunn, Vice President, Global Cloud and Infrastructure Services

2015 Analyst and Advisor Summit. Cloud & Infrastructure Services Steve Nunn, Vice President, Global Cloud and Infrastructure Services 2015 Analyst and Advisor Summit Cloud & Infrastructure Services Steve Nunn, Vice President, Global Cloud and Infrastructure Services Cloud & Infrastructure Services Overview Key Facts Offerings and Capabilities

More information

Riding technology waves

Riding technology waves BT Assure Riding technology waves Making the bring your own device (BYOD) trend work for you Making the bring your own device (BYOD) trend work for you Your data is everywhere. It s on devices you own

More information

How To Choose Help Desk Software For Your Company

How To Choose Help Desk Software For Your Company With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer

More information

White Paper. Benefits and Challenges for Today s Online B- to- B Research Methodology. By Pete Cape, Director, Global Knowledge Management.

White Paper. Benefits and Challenges for Today s Online B- to- B Research Methodology. By Pete Cape, Director, Global Knowledge Management. White Paper Benefits and Challenges for Today s Online B- to- B Research Methodology By Pete Cape, Director, Global Knowledge Management March 2015 Survey Sampling International, 2015 ABOUT THE AUTHOR

More information

A Guide to Enterprise Mobility Management

A Guide to Enterprise Mobility Management Published by FierceMarkets Custom Publishing A Guide to Enterprise Mobility Management Enterprises today are going mobile, because competitive pressures and modern workforces demand it. If not properly

More information

Debunking the Top 10 CloudHosted Virtual Desktop Myths

Debunking the Top 10 CloudHosted Virtual Desktop Myths Debunking the Top 10 CloudHosted Virtual Desktop Myths Page 1 Summary Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service offered by a service provider. DaaS has

More information

Business Value Dashboards

Business Value Dashboards Business Value Dashboards Clive Smith Julie L. Mohr JLM1 ITSM - DASHBOARDS Some Key Factors In Dashboard Design Easy to use Interactive Targeted to the user / audience Drill through to detail Reference

More information

Payroll Outsourcing Guide

Payroll Outsourcing Guide The vast majority of businesses quickly find the decision to manage their own payroll to be all consuming and costly in more ways than they imagined. Payroll Outsourcing Guide Tristan Ruhland Director

More information

Enterprise Mobility Survey. Read What Matters as IT Reflects on Mobile Boom

Enterprise Mobility Survey. Read What Matters as IT Reflects on Mobile Boom 2013 Enterprise Mobility Survey Read What Matters as IT Reflects on Mobile Boom Summary Mobile Mania as a Focal Point of Modern Enterprises Mobile is not only the new face of engagement it is fast becoming

More information

Securing Data across the Dynamic Enterprise

Securing Data across the Dynamic Enterprise Securing Data across the Dynamic Enterprise By Topia Technology Challenge 2014: Ensuring enterprise data security and accessibility Enterprise data must be both secure and accessible tough challenges,

More information

A matter of trust Fujitsu Managed Mobile

A matter of trust Fujitsu Managed Mobile Mobility at enterprise level A matter of trust Fujitsu Managed Mobile Worry-free mobility. Take your mobile environment to the next level. Mobility motivates. Mobile devices such as smartphones and tablet

More information

Best Practices for Building a Mobility Strategy

Best Practices for Building a Mobility Strategy Best Practices for Building a Mobility Strategy May 2014 Prepared by: Zeus Kerravala Best Practices for Building a Mobility Strategy by Zeus Kerravala May 2014 º º º º º º º º º º º º º º º º º º º º º

More information

Data loss prevention and endpoint security. Survey findings

Data loss prevention and endpoint security. Survey findings Data loss prevention and endpoint security Survey findings Table of Contents Overview 3 Executive summary 4 Half of companies have lost confidential information through removable media 5 Intellectual property

More information

Respect the Service Desk. SITS14 Presentation April 2014

Respect the Service Desk. SITS14 Presentation April 2014 Respect the Service Desk SITS14 Presentation April 2014 Agenda Question The real issues - holding back service desks The Elephant in the Service Desk Practical Tips Questions Question SITS14 Presentation

More information

Case Study: citizenm Hotels

Case Study: citizenm Hotels Case Study: citizenm Hotels How The Trendiest Hotel In The World Manages their Online Reputation with ReviewPro Case Study: citizenm Hotels, June 2011 About citizenm The citizenm concept began with the

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

Thought Rock Live K n o w l e d g e w o r t h s h a r i n g

Thought Rock Live K n o w l e d g e w o r t h s h a r i n g IT Outsourcing Trends in 2012. Is Outsourcing Still Considered a Bad Word? Presented by Mark Latham, Founder of RHL Success Is outsourcing still considered a bad word? For more than two decades, the service

More information

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS

More information

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987 BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information

More information

What s New In ITIL V3?

What s New In ITIL V3? What s New In ITIL V3? George Spalding VP, Global Events Pink Elephant Pink Elephant Leading The Way In IT Management Best Practices The ITIL Books (V2) T h e B u s i n e s s Planning To Implement Service

More information

UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS. Security for Virtual and Cloud Environments

UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS. Security for Virtual and Cloud Environments UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS Security for Virtual and Cloud Environments PROTECTION OR PERFORMANCE? The number of virtual machines exceeded that of the physical ones back in 2009.

More information

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest

More information

Learning in the Social Workplace

Learning in the Social Workplace Learning in the Social Workplace Jane Hart Social technologies are impacting the way we learn and work in the workplace. Here I want to take a look at three key areas: 1. How individuals are using social

More information