Byod final (2)

Post on 24-May-2015

201 views 0 download

Tags:

Transcript of Byod final (2)

IT SUPPORT & SOLUTIONS FOR WESTERN CANADIAN BUSINESSES

Bring Your Own Device Your strategy starts here…

Agenda• What is BYOD and why are we talking about it?• The impact on your organization• Our recommended approach• Developing a BYOD policy• Next steps

What Does It Mean?

Bring Your Own Device (BYOD) according to the Great God – Wikipedia

refers to employees bringing personally-owned mobile devices to their place of work, and using them to access privileged company resources.

What is this all about?• Why are they doing it?• History• Motivation – theirs / yours • Flexible: yes or no? • Research

What are the Benefits?• Your People– Employee satisfaction increases– Work life balance vs work life blending– Everyone gets the use of new, cutting edge

technology– Empowered Teams

What are the Benefits?• Your Costs– Reduces the TCO for the business– Lower communication costs– Lower support costs– Lower training costs

What are the Benefits?• Your Operation– Increased productivity– Increased employee efficiency– One less technology to worry about– Maybe even become more competitive

What are the Risks?• Security– Wireless network security– Lack of control over devices used– Protecting sensitive business data– Industry legislated compliancy

What are the Risks?• Other network concerns– The Devices themselves – Manually provisioning devices– Network Saturation– Cost– Potential interruption of daily business activities

What are the Risks?• People– Disgruntled with company not providing newest

technology– Employee stealing information– HR, Finance and Legal implications of personal

data loss– Productivity - Employees using company time on

personal social media

So, why address BYOD with a policy?

• Benefits for your people, your costs, and your operation

• Mitigate the risks to your security, network and your people

• And, employees will use their devices anyway!

Recommended Approach

Create a BYOD Policy

Upgrade IT – Security & other Infrastructure

Onboard employee personal devices

BYOD Policy• Keep it simple!– Security – Support– Acceptable Usage– Financial Management– Governance

• Understand and Balance the Benefits

SecurityYour acceptance of the level of risk will be dependent on the

trust level between your business and its team members, partners and guests.

• First of all; who can participate?• A secure IT infrastructure is needed to enforce

the policy– Mobile Device Management– Network Security– Application Security– Remote Desktop – Wireless Security

SupportWho will be on the hook for supporting personal mobile

devices?• Support costs– Technical support– Acceptable usage training for employees– Technical training for your IT department

• What devices are allowed for BYOD?• The network they connect with

Acceptable UsageEven though this is your personal device what is considered

acceptable usage while connected to your business network or applications?

• Does your business have an Acceptable Usage Policy? (not just BYOD, but in general)

• Who can have access to sensitive business data.• What can be accessed using personal devices?

What can’t? • Who can have access to the employee’s

personal device?

Financial ManagementWho is financially responsible for personal mobile devices

used in your business?

• Various models – depends on strategy– Company pays nothing– Company pays everything– Somewhere the middle?– Capital costs–Monthly costs– The device, apps, peripherals, network fees,

etc

Governance• Who owns and administers the policy?

• Will there be a reward / consequence?

• Will it be reviewed?

Successful Road Map to BYOD

Create a BYOD Policy – Decide on and institute a governance model

Upgrade IT – Security & Infrastructure

Onboard employee personal devices

IT SUPPORT & SOLUTIONS FOR WESTERN CANADIAN BUSINESSES

Thank You!Enjoy yourselves and please get home safely!