+ All Categories
Home > Documents > Five_Steps_to_Consumerization

Five_Steps_to_Consumerization

Date post: 05-Dec-2014
Category:
Upload: intel-it-center
View: 355 times
Download: 0 times
Share this document with a friend
Description:
Ready for some practical guidance on the consumerization of IT? Although many see consumerization as a growing trend, it’s fast becoming a permanent fixture in the enterprise environment. Chances are, it’s already happening in your own organization. To minimize the risks associated with unsecured and unmanaged technologies in the enterprise, it’s important to take a proactive approach. This practical guide to the consumerization of IT explains how IT managers can adopt a user-centered strategy—one designed to optimize the computing experience and keep the user productive on any device—all while maintaining the performance, security, and manageability that IT demands. Moreover, this new approach gives IT a powerful opportunity to retain the organization’s reputation as a technology innovator—especially when it comes to Bring Your Own Device (BYOD) programs. This guide also includes insights and best practices for supporting employee-owned devices and selecting the right employer-provided tools for diverse roles and responsibilities and a range of technology needs.
14
Five Steps to Consumerization Intel’s Guide to Embracing the Inevitable
Transcript
Page 1: Five_Steps_to_Consumerization

Five Steps to Consumerization

Intel’s Guide to Embracing the Inevitable

Page 2: Five_Steps_to_Consumerization

2

Intel’s Definition

Consumerization:

The technology we use in our personal lives—applications, hardware, and even Internet services—has a distinct impact on the technology experience we expect at work.

Extends beyond devices to include the entire computing experience—muchbroader than Bring Your Own (BYO)

Page 3: Five_Steps_to_Consumerization

3

Rethink Your Approach

By better aligning employees’ at-work technology experience and their at-home experience, you can:

Gain greater IT security and control over employee-owned devices

Increase productivity and improve employee morale

Retain your organization’s reputation as a technology innovator—especially when it comes to Bring Your Own Device programs

Page 4: Five_Steps_to_Consumerization

4

Manage Consumerization in Five Steps

1 Understand the powerful forces driving consumerization.

2 Rethink user computing with a user-centered strategy.

3 Create an inclusive approach by creating a two-way communication channel with users.

4 Support employee-owned devices with known best IT practices.

5 Find the right employer-provided tool for the job to give employees what they need: One size does not fit all.

Page 5: Five_Steps_to_Consumerization

5

EmergingEnd-User Needs

DRIVERS

Freedom Flexibility Individuality

Device InnovationIncreasing Mobility

Cloud ServicesIncreased Data Availability

Natural Interaction with TechnologyEvolution of the User

TraditionalIT Requirements

StandardizationCompliance

ManageabilitySecurity

+ =IT Innovation

IT must balance traditional IT

requirements with emerging

end-user needs.

Step 1. Understand the Forces at Work

Page 6: Five_Steps_to_Consumerization

6

Step 2. Rethink User Computing

Maintain the comprehensive

security, automated

management, compatibility,

and compliance that IT requires.

Rethink the compute

experience to give users the freedom and

flexibility they want.

Use centralized management

to securely deliver the right

resources.

Page 7: Five_Steps_to_Consumerization

7

Step 3. Create an Inclusive Approach

Security

Improve job satisfaction while you gain stronger

security and control.

Communication

Adopt a two-way communication channel vs. the traditional IT-to-user

model.

Page 8: Five_Steps_to_Consumerization

8

Step 4. Support Employee-Owned Devices

• Engage key stakeholders.

• Update your security model.

• Choose which operating systems and devices you will support.

• Enable the technology and plan deployment.

• Stay current with technologies and trends.

Ensure Success with Best Practices:

Engage stakeholders

Updateyour securitymodel

Decide onOS anddevices

Plandeployment

Staycurrent withtechnology

1 2 3 4 5

Page 9: Five_Steps_to_Consumerization

9

Step 5. Find the Right Tool for the Job

Information at your fingertips. Enables stand-up computing, data snacking, and usages that need lighter weight, long battery life, and an always connected experience.

A versatile two-in-one device that seamlessly adapts to your needs.

An outstanding mobile computing experience in sleek and responsive designs, with great performance and battery life.

TABLET ULTRABOOK™CONVERTIBLE1

ULTRABOOK™

OPTIMIZED FOR BATTERY LIFE OPTIMIZED FOR PERFORMANCE

CONTENT CONSUMPTION CONTENT CREATION

HIGHLY MOBILE WORKER

TASK WORKER KNOWLEDGE WORKER

1 Ultrabook products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook manufacturer. For more information and details, visit intel.com/ultrabookforbusiness.

Page 10: Five_Steps_to_Consumerization

10

Innovation for Business Ultrabook™, Inspired by Intel1

Available as a two-in-one device with a detachable touch screen that converts to a tablet

Also available in convertible models that offer swivel capabilities and slide and flip screens for standing use

Offers built-in security2 for greater protection with the 3rd generation Intel® Core™ vPro™ processor3

1 Ultrabook products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook manufacturer. For more information and details, visit intel.com/ultrabookforbusiness.

2 No computer system can provide absolute security under all conditions. Built-in security features available on select Intel Core processors may require additional software, hardware, services, and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details. For more information, visit intel.com/technology/security.

3 Intel vPro technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more about the breadth of security features, visit intel.com/technology/vpro.

Page 11: Five_Steps_to_Consumerization

11

Learn More

• Read the full planning guide, Five Steps to Consumerization: Intel’s Guide to Embracing the Inevitable.

• Find out more about managing consumerization from Intel at intel.com/consumerization.

• For more information about Ultrabook™ products, visit intel.com/ultrabookforbusiness.

Page 12: Five_Steps_to_Consumerization

12

intel.com/ITCenter

Visit the Intel® IT Center

Page 13: Five_Steps_to_Consumerization

13

Legal

The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance.

This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.

Copyright © 2012 Intel Corporation. Intel, Intel Core, the Intel logo, Intel Sponsors of Tomorrow., the Intel Sponsors of Tomorrow. logo, Intel vPro, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries.

Page 14: Five_Steps_to_Consumerization

Recommended