Mobile and BYOD Strategy



Similar documents
6 Things To Think About Before Implementing BYOD

BRING YOUR OWN DEVICE

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Desktops in the Cloud: Beyond the Hype

Managing Mobility in the BYOD Era:

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

The Virtual Workspace, the Next Phase of VDI

1 Executive Summary Document Structure Business Context... 6

BT One. Analyst and consultant update, September BT One. Communications that unify 1

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Secure Enterprise Mobility Management The system integrator point of view.

Mobility Challenges & Trends The Financial Services Point Of View

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

4/28/2014. What's the Scoop on Cloud Computing. Agenda. Why you are here?

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD)

How to Turn the Promise of the Cloud into an Operational Reality

Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy

BYOD(evice) without BYOI(nsecurity)

GOVERNMENT USE OF MOBILE TECHNOLOGY

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

AirWatch Solution Overview

EMPOWERING THE DYNAMIC WORKPLACE

Hosted Virtual Desktops (VDI)

Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization

Page 2. Most Of The Information Workforce Now Works Remotely

How To Manage A Mobile Device Management (Mdm) Solution

End User Computing - Cloud Client Computing

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Matthias Kuemmel, HP Imaging and Printing Group. Date: 24/05/2011

trends and audit considerations

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software

Enterprise App Stores: An idea whose time has come?!

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE

Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

BYOD & MOBILE SECURITY

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Enterprise Mobility: The Impact of Changing Employee Behaviour

HDAA BYOD Workshops May 2013

IBM Mobile Security DELIVERING CONFIDENCE. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Generating leads with Meraki's Systems Manager. Partner Training"

What Is Cisco Mobile Workspace Solution?

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Mobile Madness or BYOD Security?

Security and Compliance challenges in Mobile environment

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

How To Support Bring Your Own Device (Byod)

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

UNIFIED COMMUNICATIONS

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Hosted Desktop for Business

Preparing your network for the mobile onslaught

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

2011 Forrester Research, Inc. Reproduction Prohibited

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

Maximizing Your Desktop and Application Virtualization Implementation

Transcription:

Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1

Agenda Introduction to Mobile Technology Mobile Computing Bring Your Own Device Mobile Computing and BYOD Benefits Mobile Computing and BYOD Challenges Comprehensive Mobile & BYOD strategy Summary 2

Digital Trends Mainframe Client/Server Internet Mobile, Social, Big Data & the Cloud Every 60 seconds: 698,445 Google searches 695,000 status updates 217 new mobile web users 100,000 tweets 168 million+ emails sent 11 million instant messages 3

Mobile Computing Mobile devices are shared more often Mobile devices have multiple personas Mobile devices are diverse. Mobile devices are used in more locations Mobile devices prioritize the user Personal phones and tablets shared with family Enterprise tablet shared with coworkers Social norms of mobile apps vs. file systems Work tool Entertainment device Personal organization Security profile per persona? OS immaturity for enterprise mgmt BYOD dictates multiple OSs Vendor / carrier control dictates multiple OS versions A single location could offer public, private, and cell connections Anywhere, anytime Increasing reliance on enterprise WiFi Conflicts with user experience not tolerated OS architecture puts the user in control Difficult to enforce policy, app lists 4

Security is the leading barrier to mobile adoption Drivers for Adopting Mobile Barriers to Adopting Mobile Base: Those who deployed/piloted/plan to adopt mobile, excluding don t know (n=1117) Base: Those who deployed/piloted/plan to adopt mobile, excluding don t know (n=1115) 5 October 2012 2012 Tech Trends Report (Weighted by GMV IBM Proprietary) IBM Market Insights IBM Confidential 5

What is BYOD? A device utilized for communicative and informational purposes in the workplace and personal life. Some prominent examples include: Smartphone ipad Laptop Tablet 6

Enterprise Mobility Terms BYOD Enterprise Mobility Mobile Device Management (MDM) Mobile Application Management (MAM) Over the Air (OTA) Transmission Virtual Desktop Infrastructure (VDI) User Experience 7

Consumerization of IT is driving BYOD adoption According to Gartner, Tablet BYOD programs are in place at 47% of companies 8

Workforce mobility trends According to the GSA, telework delivers a 200-1500% ROI through increased productivity, reduced absenteeism, lower real estate costs, and reducted recruitement needs Mobile Work Exchange April 2013 9

Mobile Computing and BYOD Benefits Increased Productivity Employee Satisfaction Scalability ( Elasticity ) Business agility Email Data Messaging Business Applications Lower Capital Expense Improved user experience Innovation 10

Mobile Computing and BYOD Challenges Top Mobile Barriers Federal IT Executives Security 73% Budgets Policies Technical Leadership Culture 35% 30% 27% 42% 60% 0% 50% 100% Federal & corporate IT leaders are struggling with: C-Level pressure to act now Security of proprietary data and systems Technology integration Service performance Budgets / BYOD hidden costs Lack of corporate policies Top Cloud Barriers IT Leaders 46% 32% 25% Security Performance Integration Mobile Work Exchange Survey May 2013 Cultural adoption & training Rapid pace of technology change Large & growing # of vendors Regulatory & mandate compliance Supporting multiple OS / Plaforms CDW 2013 State of the Cloud Report Changes to organizational R&R 11

Software solutions exists to deal with some challenges Software Mobile Device Management (MDM) Mobile Application Management Mobile Application Development Platform Network Access Control (NAC) Virtual Desktop Infrastructure (VDI) Features Software that secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over the air (OTA) distribution of applications, data and configuration settings for all types of mobile devices This applies to both company-owned and employee-owned (BYOD) devices across the enterprise or mobile devices owned by consumers Software to add, remove, or update custom or 3 rd party applications in a centralized fashion. Includes user authentication, authorization, and grouping; over the air (OTA) application provisioning, automated application provisioning, automated application configuration, application updates, application back-up, application removal, application white list and black list management A comprehensive suite of products and services that enable development and deployment of mobile applications A networking solution used to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. Aims to control access to a network with policies, i Hosting a desktop operating system within a virtual machine (VM) running on a hosted, centralized or remote server 12

Comprehensive Mobile & BYOD strategy Enterprise Strategy Enterprise strategy and vision Strategy Enterprise Strategy Workforce enablement Business processes Customer, suppliers & partners Marketing and adoption plans 13

Comprehensive Mobile & BYOD strategy Program Governance Portfolio management Performance measurement Strategy Governance Organizational structure Expense and asset management Corporate policies 14

Comprehensive Mobile & BYOD strategy Security Security Policies Risk Management Strategy Security Network access and control Device & application management 15

Comprehensive Mobile & BYOD strategy Applications Application strategy Strategy Applications Application architecture User experience and design IT capabilities & processes 16

Mobile and BYOD Assessment Tool Mobile Readiness & Maturity Score Card Category Evaluation Component Maturity Score Gaps & Summary Findings Enterprise Strategy Enterprise strategy & vision Workforce enablement Business processes Customers, suppliers, & partners Marketing & adoption plans Governance Portfolio management Performance measurement Organizational structure Expense & asset management Mobile policies Security Mobile security policies Risk management Network access & control Device & application management Applications Application strategy Application architecture User experience & design Capabilities & processes Level 0 - None Level 1 - Low Level 2 - Medium Level 3 High Level 0 - None Level 1 Low Level 2 - Medium Level 3 - High Level 0 None Level 1 Low Level 2 - Medium Level 3 - High Level 0 None Level 1 Low Level 2 - Medium Level 3 High Level 0 - None Level 1 Low 17

Mobile and BYOD Strategy Roadmap Initiative Enterprise Strategy Established Executive Steering Committee Define Mobile Vision Governance Webinars Product Reports 3 rd Party Research Develop Corporate Mobile Policies Security MDM Deployment NAC Upgrade Mobile Security Policies Applications HR Pilot App MEAP Vendor Evaluation Accounting / Finance Budget Approval Process Unified Communications RFP Workforce Training Sales and Marketing Team Business Unit 1 Team Accounting / Finance Team Sponsor PMO CIO / CMO HR VP Products R&D Legal / CIO CIO VP Eng. CSO HR / CIO CIO CFO / CIO CIO HR HR HR JUN JUL AUG SEPT OCT 18

Separate Work From Fun Make sure employees understand the rules and the risks. Work life and personal life should be kept separate. To get network access, employees must agree to acceptable use policies. IT should monitor activity. 20

References and Recommended Reports CDWs 2013 State of the Cloud Report Mobile Work Exchange Digital Government Strategy Report May 2013 Digital Government: Building a 21 st Century Platform to Better Serve the American People May 2012 23

Thank you very much. 24