WINNING THE BYOD GAME



Similar documents
IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis

Transforming IT into an App Store Service Catalog Part I: Why Should I care?

ITSM 101. Patrick Connelly and Sandeep Narang. Gartner.

EMPOWERING THE DYNAMIC WORKPLACE

Workspace Management ServiceDesk, Self-Service + Service Catalog User Services

Creating and Maturing a Service Catalog

CA Service Catalog r12

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits

MANDATORY CRITERIA. 1. Does the tool facilitate the creation, modification, fulfillment and closure of Service Request records?

RSA Identity and Access Management 2014

Welcome - CompuCom's GoLiveNow Accelerators for ServiceNow. May 19, 2015

Mobile and BYOD Strategy

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis

SMART Service Desk. Implementation of ITIL Service Desk for a Leading Automotive Distributor

Transformation to a ITaaS Model & the Cloud

IT AS A SERVICE BROKER

Enterprise Project Management Buyer s Guide

Table of contents. Standardizing IT Service Management. Best practices based on HP experience in ITSM consolidation. White paper

IDENTIFYING THE RIGHT KIND OF HYBRID CLOUD FOR YOUR BUSINESS

Q&A. HP Service Anywhere Simplifying ITSM. Questions Asked by Webinar Attendee on December 12, 2012

Information Technology Strategic Plan

Vision on Mobile Security and BYOD BYOD Seminar

Request for Information (RFI) For providing An Information Technology Services Management Solution. RFI No. R25CD14213

How To Standardize Itil V3.3.5

Session 708: The Service Catalog, Rebooted PHIL TRANT MANAGING CONSULTANT AXIOS SYSTEMS

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

BOOST IT VISIBILITY AND BUSINESS VALUE

An ITIL Perspective for Storage Resource Management

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices

Information Technology Infrastructure Library (ITIL )

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

Elevate the Consumer Experience: Creating a Win-win for Both IT and its Consumers

HOW ATERNITY WORKFORCE APM FULFILLS THE PROMISE OF DIGITAL HEALTHCARE DELIVERY

Enterprise App Stores: An idea whose time has come?!

Strategic Briefing Data Center Management & Automation

IT Resource Management & Mobile Data Protection vs. User Empowerment

From Virtualized to ITaaS. Copyright 2011 EMC Corporation. All rights reserved.

4/28/2014. What's the Scoop on Cloud Computing. Agenda. Why you are here?

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

INDUSTRY OUTLOOK. The Virtual Office: The Next-Generation Workplace

CA Clarity PPM. Overview. Benefits. agility made possible

Virtualization and IaaS management

BYOD Strategies: Chapter I

Request Fulfillment Management. ITG s CENTRE Service Record Screen

ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC

Higher Productivity More Business Agility

IT Enterprise Services

A matter of trust Fujitsu Managed Mobile

ITIL: Foundation (Revision 1.6) Course Overview. Course Outline

White Paper Benefits of the Cloud

Software Defined Hybrid IT. Execute your 2020 plan

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Expert Reference Series of White Papers. Microsoft Service Manager Simplified

PowerSteering Product Roadmap Your Success Is Our Bottom Line

MS 20246C Monitoring and Operating a Private Cloud

What s New for HP Service Anywhere & Service Manager September 15, 2015

The BYOD security Battleground

Technology Plenary. Technology Trends & Implications for Economic Development. Tim Hale Managing Partner Coastal Cloud Tim.Hale@CoastalCloud.

MCSE: Private Cloud Training Course (System Center 2012)

ITIL v3 Foundation -Overview. Eric Foust, PMP, ITIL

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

Cloud Computing and Data Center Consolidation

Accenture Cloud Enterprise Services

Determining Best Fit. for ITIL Implementations

ITIL Foundation for IT Service Management 2011 Edition

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Hybrid Cloud Identity and Access Management Challenges

HP Cloud technologies

WHITE PAPER. iet ITSM Enables Enhanced Service Management

ManageEngine ServiceDesk Plus - MSP Training Agenda

BYOD (Bring Your Own Device)

Mobile Payments: The Market for Travelers, Unbanked, and No/Low Credit Users

Service Management from Serena Software. Orchestrated. Visibility, Flexibility and Ease of Use through Process-Based IT Service Management

Leveraging SaaS as Part of a Technology-led Procurement Transformation

The Cloud App Visibility Blindspot

Transcription:

How to Create a Realistic Governance Strategy WINNING THE BYOD GAME Presented by Cask, LLC and Cherwell Software Webinar March 2012

Agenda 2» Introductions» How did we get here?» Where do we start?» Governance Strategy» 4 Key Service Portfolio Considerations» Enabling customers with Service Catalog» Assessing impact with CMDB, Reporting, Incident Management and Request Fulfillment» Questions and Answers

How did we get here? 3» Rise of smartphones» Cloud accessibility» Tablet reality» Consumerization of IT» Who really wants to carry 2 phones?» Ordering equipment from Enterprise IT» Takes too long» Is too difficult

Are we ready? 4 1100 Senior Executives and Managers say they* don t have any policies, procedures or IT systems in place to manage the use of personal devices for business purposes. 67% 54% are not aware of all the devices their staff are using for business purposes. of organizations will support corporate applications on personal devices by 2014** 90% * Source: YouGov, Research Now and Citrix survey conducted between May and August 2011. ** Source: Gartner, Spring 2011

Where do we start?» Build a governance strategy» Include 6 key components User Risk and Security Privacy Financial Support Applications Cask s BYOD Strategy Framework (BSF)

Governance Strategy 6 User Risk and Security Privacy Financial Support Applications Transparency and preservation of the user experience Employee core services and ordering mechanism Defining baseline protection elements Risk and liability assessment Defining the BYOD privacy policy (i.e. monitoring) Clarifying actions IT will take for policy violations Calculating cost savings, ROI and improved productivity Understanding tax implications Leveraging self-service tools vs. Service Desk for support Communications on how BYOD is supported and why Designing mobile apps to match trust level of devices Application accessibility and apps/rights distribution Cask s BYOD Strategy Framework (BSF)

4 Key Service Portfolio Considerations 7 1. Determine what BYOD services to offer through demand, risk and financial assessments 2. Build a BYOD enablement roadmap for each service; ensure to address the 6 pillars of the BSF 3. Ensure BYOD policy document covers each service and each service in the portfolio refers to the applicable policy section 4. Level-set customers expectations through clear SLAs that are published via the Service Catalog

Enabling Customers with Service Catalog 8» Assumes an atmosphere of trust» Makes it easy for employees to register their device» Tail is NOT wagging the dog

Impact Assessment with CMDB and Reporting 9» Need a place to store the data when devices are registered» Needs to be it s own module» Allows device to be linked to employee» May also use Mobile Device Management software to assist

Impact Assessment through Incident Management and/or Request Fulfillment 10» Incidents/Service Requests do not wind up in the Other categorization.» Now ability to show the amount of time and effort that it takes to support and manage the devices» No longer qualitative analysis, but quantitative» Reports lead to modifications of governance and policy

Results 11» Consumerizing the customer experience» Improving productivity of the workforce» Leveraging Service Management best practices to manage BYOD» Continuous Service Improvement

About Cask 12» Business and Technology Management advisory firm providing Service Management strategy, process and implementation consulting and training» Cask associates have an average 16 years of industry experience; over half have Masters degrees in business, technology or engineering» Published recognition:» Cask has been selected as one of the top 15 consulting firms (small firms) to work for, to be published in Consulting Magazine next month - #3» Cask has made the 2011 Inc. 500 list of the fastest growing private companies in America - #57» Offices located across the country in San Diego, Washington DC metro, Dallas, Kansas City and New York

About Cherwell Software 13» Hosting: SaaS, On-Premises, or any data center change anytime» Licensing: purchase or subscribe - concurrent or named» Deploy as many processes as you want - without extra fees» Easily create additional applications no additional charges» Multiple interface options all included» Easily configure to match your workflows no programmer costs» Unlimited dashboards and reports view without using a license

Questions 14 Thank You! For a copy of the presentation or for more Information please contact us: Jason Rosenfeld jason.rosenfeld@caskllc.com 619-890-0184 @jasonrosenfeld Matt Neigh matt.neigh@cherwell.com 719-434-5816 @cherwell_csm