BRING YOUR OWN DEVICE

Similar documents
THE REAL BENEFITS OF BYOD

How To Support Bring Your Own Device (Byod)

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

What Is Cisco Mobile Workspace Solution?

Athena Mobile Device Management from Symantec

When Computers really become Personal

Bring Your Own Device (BYOD) and Mobile Device Management.

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Mobile and BYOD Strategy

Productive and Secure Enterprise Mobility with Cisco and Citrix

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Symantec Mobile Management for Configuration Manager 7.2

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Compliance Management for Mobile Devices

EMPOWERING THE DYNAMIC WORKPLACE

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

How VDI Reduces the Risks of BYOD

Cisco estore Modernizes Shopping for IT Services

BYOD (Bring Your Own Device)

5 Reasons Your Phone System May Be Outdated

Guideline on Safe BYOD Management

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

MDM and beyond: Rethinking mobile security in a BYOD world

How Desktop-as-a-Service Can Solve Higher Education s End-User Computing Challenges

Symantec Mobile Management 7.2

How To Manage A Mobile Device In An Enterprise

WHITE PAPER. The Business Benefits of Upgrading Legacy IP Communications Systems.

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Don t Let A Security Breach Put You Out of Business

Enterprise Mobility Empowered by Logicalis / Cisco / Citrix

Symantec Mobile Management 7.1

Agile, Secure, Reliable: World-Class Customer Service in the Cloud

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

IT Self Service and BYOD Markku A Suistola

IT Resource Management vs. User Empowerment

Mobile Device Management

The all-in-one Unified Communications solution for SMBs.

Mobile Device Inventory the first step in enterprise mobile management

BYOD. Bring Your Own Device - Mobile Device Management.

Subtitle. Business Phone Trends The Relentless March of Technology. Business Phone Trends Compare Business Products

How To Manage A Mobile Device Management (Mdm) Solution

IBM Endpoint Manager for Mobile Devices

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

The Cloud for Productivity and Mobility

MDM features vs. native mobile security

Understanding the Benefits of Unified Communications

Mobile Application Management. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions

Symantec Mobile Management 7.1

Time better spent. Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

A Mobile Architecture, Not Just a Mobile App

Enterprise mobility trends 2015 and beyond

BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED

MITEL BUSINESS COMMUNICATIONS SOLUTIONS

Grow Your Business with Confidence

Make technology your business advantage

Smartphones and ipads: mobility blessing or technology support curse?

Page 2. Most Of The Information Workforce Now Works Remotely

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

The Virtual Workspace, the Next Phase of VDI

Transcription:

WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy. Exploiting business potential in the age of IT consumerization Consumerization of IT is inevitably moving forward and more and more companies are encouraging their employees to bring their own device (BYOD) to work place. Motivated largely by the buzz surrounding the trend, companies of all size in all industries are deploying BYOD initiatives. However, one of the unusual things about this trend is that businesses are often unclear about the reasons for deploying BYOD. Though the practice of bringing your device promotes productivity and has the potential to save on hardware costs, sometimes the options available to manage personal devices can be confusing. This white paper is intended to give an insight on how to introduce BYOD programs and how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide. 1

Table of contents ---------------------------------------------------------------------------- Introduction 3 Preparing for BYOD program..3 Benefits for the enterprise 4 BYOD challenges..5 BYOD-a secure possibility..6 Business objectives and targeted benefits..6 Broader IT Strategy..6 Mobile Device Management (MDM) 6 Secure container or sandbox.7 Mobile Application Management (MAM) 7 Desktop Virtualization..7 Conclusion 8 2

Exploiting business potential in the age of IT consumerization Introduction The rising use of personal technologies for work related activities has coined the phrase Bring Your Own Device (BYOD). BYOD isn't just about allowing personal devices into corporate facilities; it also encompasses using individually owned mobile devices to access enterprise IT resources and data. Organizations are increasingly focusing attention on the productivity of their workforce. Being able to perform work whenever and wherever is a key prerequisite and driver for success leads to an increased significance in staff engagement and performance. Though BYOD can provide distinct benefits, IT managers need to be clear on how to implement it. Through a clear approach you can create flexible yet secure BYOD environment that increases efficiency, less operating cost and more productivity. Preparing for BYOD program The use of personal device as business tool changed from a largely forbidden activity to an acceptable practice. It is clear that the rise in popularity of personal smartphone devices is making its mark on the office environment. While choosing a mobile technology solution, a comprehensive enterprise mobility strategy needs to be in place. Business objectives and targeted benefits must be identified, leading to decisions on which devices are to be included and in what manner. Security and audit requirements must be taken into account and all must sit below a broadly coherent IT strategy. As a first step devices need to be registered so that users can securely and seamlessly access corporate data. To secure the sensitive data, it s important to determine which corporate applications can be accessed from an employee-owned device. BYOD is the use of employeeowned devices to access enterprise content or networks IT departments need to be able to manage device and access policies, preferably from a single point of control, so IT can ensure security policies and also able to remotely wipe corporate data if the device lost or any kind of malfunction happened. Make sure access is easy for authorized users. BYOD can also result in much higher cellular data charges for an enterprise if not managed correctly. While you are evaluating the organization and preparing your implementation plan, start thinking about 3

Exploiting business potential in the age of IT consumerization future BYOD policies. IT managers should strictly monitor to reduce the mobile data cost down. A dedicated Wi-Fi provider can be a costeffective option. By considering the capabilities of vendors, mobility platform architecture, enterprise app strategy and enterprise infrastructure strategy, companies can enjoy the many benefits of allowing BYOD. Benefit for the enterprise What are the benefits of introducing BYOD officially in an organization and who all are really benefiting from it? In order for organizations to embrace and implement BYOD, there has to be a compelling business case to support it and the rewards must outweigh the risks. In today s fast moving world, BYOD will definitely improve work/life integration. This will benefit the end users to a great extent. It allows more choice and freedom to use devices for work which fit their preferences and working styles. Unlike past, users can choose a single device for both work and life reduces complexity for them, improves user experience, increases satisfaction and engagement. Most businesses do not operate in pure BYOD environments, opting instead to pay for some or all of their employees service plans and maintenance costs. Additionally, many businesses do not understand the complexity of BYOD and end up running into problems once the plans get off the ground. But organizations can take advantage from BYOD. It can be effectively implemented as a business enabler not just a cost saver. Business can be benefited and overall productivity can be improved by empowering real talents (staff) with BYOD. With effective BYOD, a company can boost employee satisfaction by allowing workers to perform work-related tasks on the platforms of their choice. This applies to personal computers in addition to smartphones and tablets. BYOD also allows an enterprise to attract and support new talent. The flexibility provided by BYOD - especially when combined with work-fromhome opportunities - can be a major selling point for a company looking to hire new workers. This will allow the company to attract applicants who are best suited for their business. Now people have become more accustomed to web-based communication. Using their personal devices, employees can email, text, chat and even hold video conferences with their co-workers regardless of location. BYOD is an opportunity to relieve the IT 4

Exploiting business potential in the age of IT consumerization Exploiting business potential in the age of IT consumerization department from the lifecycle management of IT devices. With greater knowledge of their own devices, less user training is needed, and less support calls can be expected to the IT Service Desk. By letting employees pay for their own hardware and internet or data plans, the company has effectively unloaded a great deal of expenses that it would otherwise be responsible for. BYOD Challenges 1. Successfully managing work-related task on personally owned devices 2. Accommodating a diverse inventory of mobile devices 3. Effectively enforcing different policies for different user types 4. Minimizing the administrative burden of BYOD on staff 5. Supporting all aspects of the mobility landscape BYOD challenges Past years have seen spike in interest in BYOD with more and more organizations are exploiting the business potential of BYOD. But BYOD access task is dauntingly complex, and new unforeseen consequences are cropping up regularly bringing new security challenges for IT A big challenge is to successfully manage workrelated task on personally owned devices. Concerns arise when corporate data commingles with personal data. With the device being used for both personal and work tasks, it s not just the user s data that s at risk, but the organizations too. Accommodating a diverse inventory of mobile devices is another major challenge. With new devices with frequently upgrading services, the ability to manage and secure devices running on different operating systems is a tough task. Enforcing different policies for different user types by effectively enforcing policies for both personally owned and corporate provisioned devices is an important piece of MDM puzzle. IT managers must be able to equally grant and deny device access to network resources regardless of whether those devices are personally owned or provisioned by the organization IT staff will be in more trouble as how to manage and secure multiple platforms of which they have limited visibility and control. 5

Exploiting business potential in the age of IT consumerization Supporting all aspects of mobility landscape is yet another major challenge the IT is facing. BYOD-a secure possibility A growing number of businesses may seek to implement managed IT services to help them control their mobility strategy, as the use of personal devices in the workplace is set to grow. The growth of home computing and new mobile devices, including smart phones and tablets, has led to a business demand for simpler, easier business computing to match home use. Now there is a real demand for businesses to open up their closed corporate networks to allow access to the workforces own computing devices. However, no matter how working practices change, the fundamentals remain the same. Security of the data is critical. Organizations have developed a range of software solutions available to secure BYOD and mange associated risks. Broader IT Strategy: A number of organizations with more mature BYOD strategies emphasize the need to complement the broader IT agenda Mobile Device Management (MDM): Mobile device management is typically considered by organizations in need of a comprehensive mobile solution that incorporates a corporate app store and shared document libraries. It allows for a broader approach to productivity than merely providing access to email and calendar, which is the most common level of mobile access today. This solution enables the remote administration and enrolment of managed mobile devices. MDM solutions are designed to allow IT to manage mobile devices, and most MDM solutions enable IT to manage multiple platforms. Business objectives and targeted benefits: For setting requirements for enabling technology, a clear view of business objectives and targeted benefits should be there. If BYOD is primarily intended to increase employee satisfaction more time should be spent to understand what solution will best suit for end users. But if inclined more towards cost reduction, then the price of solution will feature more prominently in requirements. 6

Exploiting business potential in the age of IT Secure container or sandbox: This application mainly aims at securing specific apps used for business purposes. Under this, each mobile application is executed in its own separate environment. Each application is allocated its own separate storage space, is assigned to run in a specific memory location and is entitled to perform only specific set of device functionalities. It prevents one application from accessing another applications storage and memory. It helps in successfully managing work-related task on personally owned devices Mobile Application Management (MAM): It refers to software and services that accelerate and simplify the creation of internally developed corporate mobile applications. MAM secures corporate data on mobile devices, regardless of ownership. By offering enterprisegrade, app-specific security, App Center provides a unified platform for addressing diverse enterprise mobility needs, simply and seamlessly, that enables user productivity while protecting enterprise data. Desktop Virtualization: Desktop virtualization offers access to the desktop experience of an enterprise PC from a range of devices accessed through a client-server relationship. All processing is performed on the server and a simple visual output is sent to the user device with the receiver software installed. The security of these solutions are considered to be strong as data resides on data center and with a single-sign-on employees can access a range of web-based applications without entering password for each. These are the few lists of security options that an enterprise can choose to support BYOD. Whatever the solutions the organizations must incorporate it into their wider enterprise architecture. Educating employees on appropriate security behavior is also important as it ensures the technology does its job well. 7

Exploiting business potential in the age of IT Conclusion In today s workplace, workers are increasingly expecting employers to be more flexible in their practices. As such, BYOD seems more like an inevitable solution than an up-and-coming trend of the moment. BYOD may not be the right choice for every employee or every company, but it is much more probable that enterprises will operate alongside enterprise devices schemes. Organizations have to weigh up the productivity benefits this brings against the major security challenges it incurs. BYOD is not just about infrastructure; it is also about policies whose definition requires the involvement of all parts of the organization. Stylus provides everything you need for BYOD from a single source. This helps reduce complexity, implementation time and risk. Moreover, we give our customers all the flexibility they need to select the most appropriate sourcing option or combination. Contact US 924, 5 A Cross, 1st Block, HRBR Layout Bangalore-5600043 Tel -91-80-30462300 Email : salesnet@stylusinc.com 8