1 An Mformation Whitepaper MOBILITY MANAGEMENT: MANAGING THE BRING-YOUR- OWN-DEVICE (BYOD) PHENOMENON 1
2 Mobility Management: Managing the Bring-your-own-device (BYOD) Phenomenon In many organizations, the traditional enterprise where hardware and software assets are owned, distributed and managed for and by enterprise IT is changing. The emergence of bring-your-own-device (BYOD) programs in the enterprise is one trend that is changing the old IT control-oriented paradigm. Although the BYOD model creates new issues for IT, it also creates a range of organizational benefits, from increased productivity to increased flexibility, which top-performing employees have begun to expect. Work is no longer seen as a 9-to-5 job, and those individuals who set out to build fulfilling careers need the support to work anytime, anywhere efficiently and conveniently. This is the kind of employee that top organizations want to attract and retain, making BYOD a trend that enterprises need to embrace with both arms. The Consumerization of IT With the advent of smartphones and other mobile devices, strong user preferences and widespread application availability, the trend to bring your own device (BYOD) to work is fast taking hold in the enterprise. It is no longer the IT department that solely dictates what devices employees will be given to do their work, but rather it is the employees who are increasingly asking (and sometimes dictating) what mobile devices, applications and services IT needs to support The fact is that employees are consumers too. They have developed mobile device preferences, and want to use the devices with which they are most comfortable, both inside and outside their employer s environment. They use their mobile devices regularly for personal activity as well as business activity, which is driving an increased merging and overlap between these two spheres of life. As Internet connectivity and mobility become more 1
3 integral parts of all aspects of daily life, employees are seeking more mobile, flexible solutions from their employers. In the past, enterprise mobility was generally limited to providing executives and key staff with mobile access to corporate on company-issued BlackBerry devices. In stark contrast, many mobile employees purchase -capable smartphones or other mobile devices, set them to access their own personal and data sources, and then bring the devices into work, expecting, at a minimum, to be able to configure them to connect to their office Wi-Fi network and access their company servers. Consumers today are the number 1 users of semiconductors; they passed over IT and government in Paul Otellini, CEO, Intel There are currently three different approaches being taken by enterprises with respect to devices and the overall liability for the devices and device activity: Individual-Liable: With this approach, the individual employee is responsible for procuring the mobile device they own it, the contract is in their name, and they are responsible for paying the recurring charges. Corporate-Liable: With this approach, the enterprise procures the device, arranges for the service plan, and is responsible for paying the recurring charges. Corporate-Sponsored/Individual-Liable: With this approach, the enterprise sets up a standard list of authorized devices from which the employee can choose. The individual chooses a device from the list, procures the device, and then expenses the cost of the device, together with the recurring charges up to a pre-defined limit. These liability models then need to be spliced in with the enterprise s overarching mobility management style. A company needs to determine its overarching view of mobility and then, within this structure, determine the best approach to take with regard to device liability. The simple command-and-control days for the enterprise are largely gone. At one end of the spectrum, a few companies will still be able to set and determine the devices, applications and mobile services that will be used by their employees. For these companies, corporate-liable will be the sole device liability model that is relevant in the organization. At the other end of the spectrum, a few companies will have a laissez faire approach to the mobile devices, applications and mobile services that will be used within the company. In these organizations, an individual-liable approach will be the relevant device liability model. Most organizations will sit somewhere in between these two poles. Even with a laissez faire approach, although the organization is not determining which devices will be 2
4 used by their employees, there will still be an underlying IT role regarding the security and other core polices that IT needs to determine and apply. BYOD Some Management Considerations As enterprises consider their mobility management models and mix of device liability types, there are some underlying management activities that should be considered. In this section we discuss the specific management issues and challenges brought out when enterprises adopt bring-your-own-device policies: Device Inventory: In any context, IT needs to know the devices and employees accessing the company network this is the baseline. However, as more and more devices come into the enterprise with individual employees, IT often has less and less of a clear idea about what devices are accessing what resources within the company. For example, if IT enables individual-liable devices to connect to the corporate network using Exchange and ActiveSync, then there is no way of taking an inventory of how many devices are on the network. Mobile device management (MDM) capabilities that provide a range of inventory capabilities can alleviate this issue, giving IT a clear picture of exactly what devices and employees are accessing company resources. Security: Security in general and security for mobility remain core responsibilities for IT regardless of the mobility management model being used or the approach being taken to device liability. The proliferation of individual-liable smartphones and tablets puts additional challenges in front of IT. IT departments need remote diagnosis, troubleshooting and updating capabilities for individual-liable devices that can help them keep the corporate network and data secure. The sheer number of different device makes, models, OS platforms, firmware versions and software coming into the company on individual-liable devices is the biggest issue. A mobile device management solution that supports a broad range of devices and that has processes for supporting new devices as they come to market is a necessity for keeping the enterprise and enterprise data secure. Heterogeneous vs homogeneous device populations: As the population of individual-liable devices grows within an enterprise, there will be a broader range of different types of devices to manage. Because the choice is completely in the hands of the individual and the choices are many and varied, the population of individual-liable devices in a particular enterprise will be, by definition, heterogeneous. Management of a heterogeneous group of mobile devices is far more complex than management of the more homogeneous that tends to result from control-oriented mobile management 3
5 models and corporate-liable devices. With a more heterogeneous device population, a mobile device management solution that supports a broad range of devices and has processes to support new devices as they come to market is a necessity. Known vs unknown device capabilities: Individual-liable devices tend to be unknown to the enterprise, and managing them can become a very complex process. Beyond basic inventory information, an understanding of the capabilities of the different devices is needed so that the IT department understands the capabilities and limitations of the devices employees are bringing in. Expanding on basic device inventory functionality, once the device type information has been obtained, a mobile device management solution should be able to populate all of the necessary device capability information automatically and then manage the devices against their capabilities. Lifecycle management: Controlling the lifecycle and activity of corporate-liable devices is a central activity for IT, which can plan and budget for the hardware purchases/activation and for device end-of-life. Lifecycle management of individualliable and corporate-sponsored/individual-liable devices, on the other hand, varies in many respects to the management of corporate-liable devices. Both activation and end-of-life of individual-liable devices occur at different points for the corporation with less pre-warning, visibility or corporate control. The initial connection of a new device to the enterprise network is a key trigger event for IT. A mobile device management solution that can see into the device, recognize it and determine access policies is critical at this point. It is also important that when a user leaves a company, IT can clear away any enterprise policies, applications or data on an individual-liable, without affecting the individual s personal data on that same device. The Bottom Line When allowed to use their own devices, employees enjoy increased flexibility, higher job satisfaction, and improvements in efficiency and productivity. This, in turn benefits the enterprise; according to a worldwide survey of 1,100 mobile workers by enterprise mobility vendor ipass, employees who use mobile devices for both work and personal issues put in 240 more hours per year than those who do not. Managing this new environment will bring new challenges. There will be different mixes of mobility management models and device liability approaches with a few organizations maintaining strict control over all of the devices used within the enterprise at one end of the spectrum, a few organizations adopting an exclusively individual-liable approach at the other end, and the majority of organizations falling somewhere in between. IT must respond to the 4
6 challenge of different mobile management models combined with a mix of individual-liable, corporate-liable and corporate-sponsored/individual-liable approaches. From an enterprise standpoint, the innovative BYOD business model and its attractiveness to employees provide a number of advantages. BYOD policies can help to attract and retain top performers, who seek to work flexibly and often put in time outside of traditional work hours. An enterprise can use a BYOD policy as a differentiator in their hiring efforts; not only can it be seen as an advantage to tech-savvy potential employees, it also shows that the enterprise is on the cutting edge of new practices and technology. In addition, employee on-boarding and training time is reduced with a BYOD approach, and employees are more efficient and productive all benefits that can directly impact the bottom line. However enterprise IT still needs to retain ultimate responsibility for security of corporate information and activity on the corporate network. An enterprise mobility management (EMM) solution is a critical tool for enabling IT to support these much more complex organizational approaches and device liability models. 5
7 CONTACT US If you would like to receive additional information on our company and our innovative mobility management solutions, please feel free to contact us. Mformation Software Technologies, LLC 581 Main Street, Suite 640 Woodbridge, NJ Tel: Fax: Mformation Software Technologies LLC. All rights reserved 6
A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro Key Strategies To Capture And Measure The Value Of Consumerization Of IT Enterprises Achieve A Wide Range Of Benefits By Deploying
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
CONSUMERLAB BUSINESS USERS GO MOBILE A study of enterprise mobility transformation An Ericsson ConsumerLab Insight Summary Report December 2014 ERICSSON CONSUMERLAB GAMING IN THE NETWORKED SOCIETY 1 contents
THE FUTURE OF INSURANCE IT INFRASTRUCTURE A SURVEY OF GLOBAL INSURANCE LEADERS This is an authorised reprint of an independently researched and executed report granted by Celent exclusively to Wipro Technologies.
october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your
white paper Public or Private Cloud: The Choice is Yours Current Cloudy Situation Facing Businesses There is no debate that most businesses are adopting cloud services at a rapid pace. In fact, a recent
The Definitive IP PBX Guide Understand what an IP PBX or Hosted VoIP solution can do for your organization and discover the issues that warrant consideration during your decision making process. This comprehensive
Telecom, Media & High Tech Extranet BYOD: From company-issued to employee-owned devices No.20 RECALL A publication of the Telecommunications, Media, and Technology Practice June 2012 Copyright McKinsey
Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging
Identity and access management as a driver for business growth February 2013 Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
Learn what an IP PBX system can do for you and understand what issues you should consider during your decision-making process. IP PBX Buyer s Guide Copyright 2007, Tippit, Inc., All Rights Reserved Contents
A Custom Technology Adoption Profile Commissioned By Sybase/SAP Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy July 2012 Forrester Surveys Show Surging Demand For Consumerization
Introduction.... 1 Emerging Trends and Technologies... 3 The Changing Landscape... 4 The Impact of New Technologies... 8 Cloud... 9 Mobile... 10 Social Media... 13 Big Data... 16 Technology Challenges...
Thought Leadership SERIES AUGUST 2011 Unlocking the Power of Mobile Device Management Mobile device management (MDM) is about more than technology it s also about skillful strategic resource management.
Kaseya White Paper Managing the Complexity of Today s Hybrid IT Environments There are many factors driving the increasing complexity of IT today. The rapid adoption of cloud computing, big data and mobile
White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Reinvent 2 Rethink, Refine, Reinvent 2 Rethink, Redefine, Reinvent Why rethink customer service? Consumers have become more diverse, more demanding and less loyal than ever. The problem of consumers switching
Your complete guide to Business VoIP Telephony Hosted VoIP for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 VoIP today 3 What is Hosted VoIP? 4 How does Hosted VoIP work? 4 Is Hosted VoIP
IT Best Practices: Mobile Policies and Processes for Employeeowned Smartphones By: Maribel Lopez, Principal Analyst April 2010 Lopez Research 9793 S. Burberry Way Littleton, Colorado 80129 T 617-872-8631
WHITEPAPER Get the Right People: 9 Critical Design Questions for Securing and Keeping the Best Hires Steven Hunt & Susan Van Klink Get the Right People: 9 Critical Design Questions for Securing and Keeping
www.pwc.com PwC Advisory Oracle practice 2012 How to drive innovation and business growth Leveraging emerging technology for sustainable growth 1 Heart of the matter Top growth driver today is innovation
WHITEPAPER Hosted vs. On-Premise PBX a Comparison of Direct Costs & Indirect Benefits The adoption of Voice over Internet Protocol (VoIP) solutions across the world and within Canada continues to rise.
Enterprise PBX Buyer s Guide Focus Research May 2009 Focus Research 2009 All Rights Reserved Table of Contents Executive Summary... p. 3 Premise PBX Overview... p. 4 Market Overview... p. 6 The Benefits