HDAA BYOD Workshops May 2013
Discussion Mobility Trends in Australia BYOD and Consumerisation of IT Implications Checklist 2
Macro Trends GEOGRAPHIES Asia Pacific fastest growing Smart Mobile Device market HARDWARE 3 devices per employee; expansion of form factors APPS Complex, native v HTML5, disposable POLICY & LEGALITY CULTURAL Not moving quickly enough to match technology The soft factors become significantly harder Tech Research Asia
Australian Mobility Device Trends 54% Smartphone penetration of Australian population (Source : emarketeer/harris Interactive, Feb 2013) Penetration of Australian population 18+ (Source : emarketeer/harris Interactive, Feb 2013) 64% 130% Mobile device penetration forecast of population in 2015. (Source: Gartner) Penetration of tablets by 2016 (Source : Telsyte) ~50%
Device, OS, Platform Fragmentation Q. Which Brand do you Consider to be most useful in your role? Apple/iOS Microsoft Android/Google Other Source: TRA Future of Work Report, May 2013, prelim data, n = 260 5
DISCUSSION TOPIC How does Mobility adversely impact service level management, incident handling, reporting, etc? Does BYOD also impacts applications and employee- usability? 6
Applications & Implications Strategy Apps Performance Costs Surprises Apps Maintenance Approach Disposable Apps Image source: elie.im, jezweb.com.au, 123rf.com
The Consumerization of IT Consumerization of IT is the growing tendency for new information technology to emerge first in the consumer market and then spread into business and government organizations. Wikipedia Devices OS Apps Ecosystem
Enterprise BYOD Assumptions Consumer tech is considered better Employees want to bring their own devices Consumerisation is the primary driver of a next generation workspace Employees want flexibility with anywhere, anytime access 9 Productivity and employee satisfaction are key outcomes
and yet 94% of organisationswill have formal BYOD policy in place by mid-2013 *1 IT support for company-owned smart phones and tablets in Australian organisationshas nearly doubled from the previous year. *2 Support for BYO devices has decreased compared to 2011. *2 52% of Australian IT and business decision-makers believe that employees who encounter trouble with their personal devices contact the IT department. *2 60% of employees say they are most likely to troubleshoot the problem themselves. 14% per cent say they will ask a friend. *2 Source : 1 Citrix 2011 BYOD Survey, 2-2012 Unisys Consumerisation of IT research Forrester
DISCUSSION TOPICS How are capacity and infrastructure planning for mobility conducted? Reactively or Proactively Does mobility make asset management and configuration more complex?` 11
Mobility & BYOD Implications Connectivity Defined Triple A(ny) where, time, how Usage Push Mail, Net Connectivity Real time, Synchronous Company Kit Provided Mine, mine, mine! Work Office desk Sometimes Workplace devices Task Defined Computing Multi OS, Device, Apps Security Corporate Complexity Within the boundaries Extended Architecture Company management On All Employee Devices & SW Some User Frustration
Support Across the Mobility Ecosystem ENDUSERS APPLICATIONS DEVICES CONNECTIVITY SECURITY MIDDLEWARE INFRASTRUCTURE 13 Source: IDC, 2012
Security : The Landscape MDM landscape is evolving from single OS to multi OS to MIM and MAM Containerisation provides an efficient approach to issues of personal data loss as a result of selective / total device wipe in a BYOD environment. Containerisation also prevents the deployment of unauthorised apps direct to phone eg. It is not possible to download directly from Google s play store Expect commoditisation around MDM solutions as vendors bundle into service provider plans Despite scare-mongering, security threat is real in potentia No. of Apps installed on smartphone : 41* By 2015 mobile apps outnumber PC apps 4: 1** Look to certification credentials 14 * http://www.biztechrave.com/2012/07/27/the-great-app-splosion-infographic.html ** http://news.yahoo.com/android-ios-drive-mobile-app-explosion-infographic-230007886.html
Security : The Internal Checklist Risk vs. Reward? What s your risk profile? Who pays for mobility plans and / or hardware? Who pays if devices are lost / stolen at work? Who provides support for devices / company data? What applications are permitted / outlawed? Will employees agree to encryption of company data; monitoring of device and remote wipe if lost/stolen/leaving? Will employees agree to device monitoring to detect suspicious risk activity such as jail breaking? Start to create functional profiling of users based on mobile work style requirements 15
Legalities & Policies Data security policy must : Determine WHO has access to WHAT and HOW Risk profiles and employee role profiles need to be determined Provide for management of devices and access BYOD policy needs to: Define cost responsibilities Provide for minimisation of data & IP loss Ensure data security Provision for the management of liability and risk Ensure compliance both legal and 3 rd party Image Source : www.zynga.com Tech Research Asia
Legalities & Policies Discovery considerations In many countries, documents are defined as electronic data Discovery typically applies to all relevant company documents even if held on personal devices Have ability to provision and manage for separate work and personal profiles and device usage BACK UP, BACK UP, BACK UP Liability considerations How is this apportioned between company and employee? Who is responsible for licensing? Device lost, stolen, infected? Tech Research Asia
Checklist #1 Does your mobility strategy focus on both Internal and External goals? Does your company IT architecture support a Triple A operational approach? Does your architecture support multi-os, multi-device environment? Does policy incorporate legal, HR, IT and line of business operations? Establish clear metrics, goals and objectives. Does your App strategy reflect native, HTML5, hybrid? Image Source : www.photovalet.com
Checklist #2 Define where/when personal devices can be used for work. Define minimum specs- OS/HW/Apps Define who pays for support of the personal device. Define what ISN T supported or paid for by company. Define security policies, levels of permissible data access, lost/stolen devices, employee departures Image source : visualfunhouse.com
Email : tim@techresearch.asia Web : www.techresearch.asia 20