A Bring Your Own Device (BYOD) Overview
|
|
|
- Alicia Daniels
- 10 years ago
- Views:
Transcription
1 A Bring Your Own Device (BYOD) Overview As Presented At AMARC Workshop: Developing A BYOD Framework March 6, 2014 All copyrightable text and graphics, the selection, arrangement, and presentation of all materials included in this presentation are the property of Censeo Consulting Group, Inc. Permission is granted to download and print materials for the purpose of viewing, reading, and retaining for reference. Any other copying, distribution, retransmission, or modification of information or materials, whether in electronic or hard copy form, without the express prior written permission of Censeo Consulting Group, Inc., is strictly prohibited.
2 BYOD Timeline Through the Years The original BYOD : Commoditization of laptops force companies to issue foreign laptop policies Great Recession forces companies to look at BYOD as an effectiveness tool AND a cost-cutting measure 1990s Mid- 2000s Today Cheap data drives proliferation of personal smartphones such as Blackberrys; companies slowly react with policies 95% of private sector companies have BYOD strategies Page 1
3 Summary of key BYOD statistics On average in the U.S., CIOs expect ~40% of their workforce to use personal devices for business needs; this number will increase in the next few years Most BYOD policies cover smartphones and tablets; less than 5% of U.S. companies have policies that cover personal computers On a global level, 50% of companies with BYOD smartphone programs offer reimbursement; only 20% of companies with BYOD tablet programs offer reimbursement Only 22% of IT leaders believe they have a strong business case for BYOD adoption The Big Takeaway: the private sector does not use a universal BYOD policy. Companies select policies based on their needs. SOURCE: Forrester, The Global BYOD Management Services Ecosystem, September 2013; Gartner, Bring Your Own Device: The Facts and The Future, April 2013 Page 2
4 Moving to the Federal context.proponents of BYOD identified convenience and productivity gains as reasons for a BYOD program GENERAL REASONS CITED FOR INTEREST IN BYOD 2013 CASE STUDY*: TOP 5 REASONS GFE USERS CITED FOR INTEREST IN BYOD Cost effective Increased employee efficiency Increased employee satisfaction and productivity Reduces hardware purchasing costs organization to employee Minimizes certain aspects of administration Inconvenient to carry two phones Using personal device provides flexibility Carrying two phones is wasteful Prefer using personal device Minimal impact to personal plan costs 15% 34% 31% 40% 73% * Based on Censeo analysis of mid-size agency; survey sample ~1,500
5 but there are still numerous concerns around implementing BYOD GENERAL REASONS CITED FOR HESITANCE TO ADOPT BYOD 2013 CASE STUDY*: TOP 5 CONCERNS CITED BY GFE USERS FOR AGAINST BYOD Increases risk of security breaches Places burden on employee to protect data Increases employee liability Reimbursements pose increased administrative burden on finance Increases administrative burden on Help Desk/Hardware Support team Phones are potentially subject to confiscation (e.g., discovery, FOIA, etc.) Functionality Implications Personal Privacy Implications Usage Policy Contents Security Concerns Cost Implications 3 - Neutral 4 - Agree 5 - Strongly Agree * Based on Censeo analysis of mid-size agency; survey sample ~1,500
6 So are federal employees truly interested in BYOD? Answer: It s Complicated! 2013 CASE STUDY*: INTEREST IN BYOD FOR FEDERAL EMPLOYEES WITH GFE SMARTPHONES Interested Interested, with Reimbursement Not Interested 29% 41% 30% 100% Making BYOD a voluntary program - as several agencies have sought - adds a cost burden to agencies as they have to maintain the support infrastructure for both GFE and BYOD smartphones. * Based on Censeo analysis of mid-size agency; survey sample ~1,500
7 BYOD is an unavoidable trend that enables workforce mobility; there are several factors to consider when deciding on a BYOD policy POLICY What devices will you cover? Who will be covered by BYOD (only traditional GFE users or everyone)? Will you implement reimbursement policies? If so, how much? Will staff accept decrease of privacy to discovery or FOIA requirements? SECURITY What security posture does your agency need to take? What s your BYOD strategy? (Virtualization? Walled Garden with MDM? Limited Separation?) Are employees comfortable with increased security responsibilities? INFRASTRUCTURE Will there need to be an investment in infrastructure (i.e., Wi-Fi repeaters)? What burden are you placing on your finance office if you implement reimbursements? What burden do you place on your IT Service Desk by introducing new phones and operating systems? BUSINESS CASE Is there a cost or a benefit to adopting BYOD? What are the hidden costs? upfront costs? Will BYOD truly increase productivity or retention? Have you coordinated policies and expectations with OCIO, OGC, OCFO, Personnel, OAM, Privacy and the Unions? Page 6
8 The Takeaways The demand for BYOD will increase over time There is no one-size-fits-all approach to BYOD. Every agency has to determine what it values and what it s willing to trade-off before deciding on a BYOD policy (i.e., security, privacy, etc.) GFE users are fairly polarized on the need for BYOD some love it (29%); some don t (30%). BYOD is not necessarily a cost-cutting tool; in fact, it may increase costs if you do not limit eligibility and reimbursement amounts Agencies that have successfully implemented BYOD (EEOC, MSPB) have been smaller in size and possessed relatively homogenous workforces. Creating BYOD policies are not easy especially for large, de-centralized agencies but addressing it is necessary! Page 7
9 Censeo Consulting Group A Passion for Public Value Censeo Consulting Group Overview Focused on applying proven management practices to create public value and social impact Experienced staff from preeminent strategy and operations firms and top business schools, with a passion for the public good Integration of strategy and policy with operational execution Objective executive advisors with no interest in downstream work Speed to Results Proven record of helping our clients achieve measurable results through ROPS TM National Recognition Best Small Workplaces Awarded by Wall Street Journal Awarded Consulting Magazine s Seven Small Jewels award for innovative business practices Ranked Top 20 among national ranking of consulting firms Page 8
10 Censeo Contact Information Kareem El-Alaily Managing Director (202) Censeo Consulting Group 1331 H Street, NW Suite 600 Washington, DC [email protected] Phone: Fax: Visit us at Page 9
Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology
Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED
SM BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED HOW DO YOU BYOD? A popular topic for hospitals right now is whether to allow employees to use their personal smartphones
IT TECHNOLOGY ACCESS POLICY
IT TECHNOLOGY ACCESS POLICY Effective Date May 19, 2016 Cross- Reference 1. IT Access Control and User Access Management Policy Responsibility Director, Information 2. IT Acceptable Use Policy Technology
Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy
A Custom Technology Adoption Profile Commissioned By Sybase/SAP Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy July 2012 Forrester Surveys Show Surging Demand For Consumerization
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
Key Strategies To Capture And Measure The Value Of Consumerization Of IT
A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro Key Strategies To Capture And Measure The Value Of Consumerization Of IT Enterprises Achieve A Wide Range Of Benefits By Deploying
THE REAL BENEFITS OF BYOD
THE REAL BENEFITS OF BYOD THE REAL BENEFITS OF BYOD - WHITE PAPER - 01 THE REAL BENEFITS OF BYOD Contents 03 Introduction 04 BYOD: A Business Enabler, Not A Cost Saver 04 Employee Satisfaction, Attracting
A matter of trust Fujitsu Managed Mobile
Mobility at enterprise level A matter of trust Fujitsu Managed Mobile Worry-free mobility. Take your mobile environment to the next level. Mobility motivates. Mobile devices such as smartphones and tablet
The flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
BEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Your BYOD Strategy Checklist
Your BYOD Strategy Checklist A 5-STEP GUIDE TO CREATE A BRING YOUR OWN DEVICE STRATEGY FOR YOUR ORGANIZATION [email protected] @SHOWPAD WWW.SHOWPAD.COM Pieterjan Bouten is an IT entrepreneur and Co-Founder/CEO
Privacy and Security Law Report
Privacy and Security Law Report Reproduced with permission from Privacy & Security Law Report, 12 PVLR 1929, 11/18/13. Copyright 姝 2013 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
HDAA BYOD Workshops May 2013
HDAA BYOD Workshops May 2013 Discussion Mobility Trends in Australia BYOD and Consumerisation of IT Implications Checklist 2 Macro Trends GEOGRAPHIES Asia Pacific fastest growing Smart Mobile Device market
WINNING THE BYOD GAME
How to Create a Realistic Governance Strategy WINNING THE BYOD GAME Presented by Cask, LLC and Cherwell Software Webinar March 2012 Agenda 2» Introductions» How did we get here?» Where do we start?» Governance
Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
Managing the Growing Appification of Business
Managing the Growing Appification of Business Since the iphone mobile device burst onto the scene in 2007, companies have spent a lot of time, money and attention developing apps that enable them to engage
#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s
#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges
The Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle
The Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle Presented by Gary Langfitt, President of Expense Management Services Carl Friedholm,
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy [email protected] The Mobile Service Line A commitment
YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Protection in the Age of BYODs 1.0 As the workplace
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch 2016 VMware Inc. All rights reserved. A Leader in Enterprise Mobility Management & Security
BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL
WHITEPAPER BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL Corporate-Owned, Business-Only Enterprise Mobility Option for Regulated and High-Security Environments 2 BLACKBERRY COBO: ENTERPRISE MOBILITY
A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT
A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT DATASHEET 1 EXECUTIVE SUMMARY Problem: Along with many potential benefits, Bring Your Own Device (BYOD) brings new challenges for the IT department. As
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
The Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
BYOD Strategies: Chapter I
Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones
Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology
Policy Checklist Name of Policy: Purpose of Policy: Directorate responsible for Policy Name & Title of Author: Does this meet criteria of a Policy? Trade Union consultation? Equality Screened by: Date
Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It
WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Buyer Conversation: Enterprise Mobility Deployment in an ICT Era
BUYER CASE STUDY Buyer Conversation: Enterprise Mobility Deployment in an ICT Era Adrian Dominic Ho Sherlin Pang IDC OPINION Asia/Pacific Headquarters: 80 Anson Road, #38-00 Singapore 079907 P.65.6226.0330
How To Manage A Mobile Device In An Enterprise
An Mformation Whitepaper MOBILITY MANAGEMENT: MANAGING THE BRING-YOUR- OWN-DEVICE (BYOD) PHENOMENON 1 Mobility Management: Managing the Bring-your-own-device (BYOD) Phenomenon In many organizations, the
Time better spent. Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business
Time better spent Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business Welcome to What would it mean to your organisation if your people were able
TODAY S KEY CHALLENGES FACING HIGHER ED FACILITIES MANAGEMENT PROFESSIONALS
Higher Ed Facilities Management Survey Key Challenge #5 TODAY S KEY CHALLENGES FACING HIGHER ED FACILITIES MANAGEMENT PROFESSIONALS (...AND HOW TO OVERCOME THEM) KEY CHALLENGE #5: Increased Classroom Technology
Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Addressing the BYOD Challenge with Okta Mobility Management Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Executive Summary The Impact of BYOD BYOD can be a very polarizing
Don t Let A Security Breach Put You Out of Business
Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device
Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us
Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca
Commercial Mobile Device Project Overview. 2020 Census Program Management Review 12/20/13
Commercial Mobile Device Project Overview 2020 Census Program Management Review 12/20/13 Presentation Format What is the opportunity? How this work fits in the 2020 Program? What options exist? How is
Is It Time To Refresh Your Wireless Infrastructure?
A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies October 2015 Is It Time To Refresh Your Wireless Infrastructure? Table Of Contents Executive Summary... 1 The Age Of The
Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are marks, brands, logos, and symbols may be trademarks or
Enterprise Mobility Management 101
Instant, Secure and Accountable Enterprise Mobility Management 101 Why a complete Enterprise Mobility Management strategy is crucial in today s mobile-first workplace Executive Summary Mobile devices have
A Real View of Mobile Expenses
Thought Leadership SERIES OCTOBER 2013 A Real View of Mobile Expenses What do companies need to do to make better business decisions? They need to have access to information that is actionable. No business
Mobility in Claims Management
January 2014 Mobility in Claims Management Aparna Krishnan, SENIOR BUSINESS ANALYST, BFSI-Insurance Practice 2 CONTENTS CLAIMS TRANSFORMATION IS THE WAY TO GO 3 BUSINESS DRIVERS FOR ADOPTING MOBILE SOLUTIONS
If you had your choice of two work devices that would make you most productive in your job, which two devices would you prefer to have?
Technology analysts and journalists alike have been premature in proclaiming the death of the PC. Even in the empowered age of smartphones, netbooks, and tablets, the PC has a unique way of reinventing
BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com
BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring
Mobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
BYOD Strategy - Advantages and Disadvantages
BRING YOUR OWN DEVICE AN INTRODUCTION BYOD An Introduction 3 The Management Challenge and Opportunity 5 Adopting a Step by Step BYOD Strategy 8 BYOD It s Time 14 1NService Your BYOD Partner 15 Copyright
How To Evaluate Saas And Cloud Solutions
Written in collaboration with SaaS Marketing Strategy Advisors Evaluating SaaS and Cloud Solutions: Effective Solution Overview Organizations of all sizes and across all industries have been rapidly adopting
Bring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
Speakers. Michael R. Overly, Partner, Yusuf Cassim, Senior Corporate Counsel & VP,Charles Schwab & Co., Inc. Foley & Lardner LLP
1 Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago, IL 60654 312.832.4500
People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh
People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform
