Date post: | 31-Oct-2014 |
Category: |
Technology |
Upload: | intechnology-managed-services-part-of-redcentric |
View: | 754 times |
Download: | 4 times |
Bring Your Own Device – Ifs, Buts and MobilesRichard Allgate – Mobile Services Specialist | 25 September 2013
• Introduction to InTechnology
• What is BYOD?
• The business drivers
• The employee drivers
• Is your business considering BYOD?
• So, you’re serious about implementing BYOD
• Implementing a BYOD policy?
• Mobile Device Management
• Summary
Webcast Overview
• Serving the UK IT market for nearly 30 years
• Unique position in the managed IT services market
• Full range of managed IT services delivered to over 800 UK businesses
Introduction to InTechnology
• Employees permitted to access corporate information using personal devices
• Covers all mobiles devices – mobiles, tablets, smart phones
• Approximately 44% of employees use their own technology at work. This figure is estimated to be higher in some countries
• More employers are turning to BYOD as they look to reduce costs at the same time as increasing productivity
• Allows employees to use device of their choice
What is BYOD?
• Reducing cost while increasing productivity
• Improving business continuity
• Encouraging flexible working
• Keeping staff happy
• The desire to ‘consumerise IT’
Business Drivers
• No need for two devices
• No training needed
• Get to choose their own device, rather than being told to use a specific ‘company device’
Employee Drivers
• Does your business have a mobile policy ?
• What are the financial implications of uninsured handsets ?
• How will you manage ‘personal contracts’ ?
• What support plan do you have in place for staff ?
• How will you keep up to date with the ever-changing array of
devices?
Is Your Business Considering BYOD?
• How safe is your data?
• What happens to client data when an employee leaves the company?
• What happens if a personal device is lost or stolen?
• Are you prepared for the endless OS/Software upgrades?
• How much do you know about the devices being used?
• How would you handle a data breach?
So, You’re Serious About BYOD?
• Limit the number and type of devices allowed
• Plan out your device security policy
- Screen locking
- Regular password changes
• Include employee exit plan as part of the BYOD policy
• Restrict which company applications are made available
• Plan your Mobile Device Management (MDM)…
Implementing Your BYOD Policy?
• Manage which devices see which applications
• Easier management of updates to devices
• Enabling mass-updates/installation of new applications
• Added protection for company data and applications should device
be lost/stolen or an employee leaves the company
– Locking devices to prevent access to data/applications
– Wiping devices to prevent unauthorised use of data
Mobile Device Management (MDM)
• If you are looking at a BYOD strategy, then ensure it is for the right reasons
• When you deploy BYOD consider changing or updating your mobile policy
• Try to keep it simple, and have measures in place to help prevent it becoming too resource hungry
• Consider what data will be on the devices, and what if it was in the wrong hands
• ABSOLUTELY deploy a MDM solution in tandem with BYOD• Research the pros and cons of each MDM solution – try not to be
driven by price (as a breach could be much more expensive!)
Summary
Any Questions?Thank You For Your Time
Email: [email protected]: 0800 983 2522Website: www.intechnology.comTwitter: twitter.com/intechnologyCase Studies: www.intechnology.com/case-studies