should we do it? byod. group x06 nah zheng xiang philsona0067379m tay wen yin (jaslyn)a0071489u wong...
TRANSCRIPT
Should We Do It?
BYOD
Group X06
NAH ZHENG XIANG PHILSON A0067379M
TAY WEN YIN (JASLYN) A0071489U
WONG CHIH YONG A0075128E
GOH AIK HWEE A0075053L
Our Team
Introduction
BYOD and IntelIssues & Implications ImplementationConclusion
Presentation Agenda
Introduction
The Post-PC EraIncreased consumerization of technologyIncreased adoption of mobile devices
Evolution of ubiquitous servicesCloud and social media technologiesBlurring lines of work and personal
Many organizations are supporting it
62% to support by year’s end
IT Consumerization
Strengths• Costs savings & ROI• Connected mobile workforce• Appeals to younger workforce
Weaknesses• System integration &
interoperability• Needs additional policies &
measures
Opportunities• Freedom of choice for
employees• Apps for mobile productivity• Maintain competitive edge
Threats• Increased security risks• Causes blurring of work &
personal
SWOT Analysis
BYOD @ Intel
AdvantagesProductivity gains
Work outside office hoursReal-time collaboration
Cost reductionHardware and support costsEmployees to take on the costs
Competitive advantageAttract young innovative talentIT savvy employees
SecurityTechnology and people
Legal and ethicalE-Discovery and privacy concerns
Financial considerationsIncentives and costs
Issues
Issues & Implications
Financial Implications
Financial Considerations
• Considered Options:– Incorporate incentives for
purchasing devices with specific support provisions• “Approved” device: Pick up the entire
tab for both device and service• “Unapproved” device: Pay only for the
cost of service
• Pros:– Easier for IT staffs to provide support and troubleshooting– Decreases costs of evaluating, configuring and
supporting large pool of devices
• Cons:– No significant cost-savings on device procurement– Does not eliminate problem of lost devices– Still required to provide support for “unapproved” devices
Financial Considerations
• Do not restrict employee’s choice of devices• Do not sponsor employee’s devices and/or
service• Better utilize funds to improve support
infrastructure– Additional firewall controls– Information delivery methods to tablets,
Windows PCs, Macs etc.• Most commonly: Web portals
Recommendation
*10,000 SFF devicesAssuming 6000 smartphones at $500, 1000 tablets at $200, and 3000 laptops at $2,000
= $1,200,406,000,000
• Result:– Employees can use desired devices– Intel able to provide sufficient support
and configuration for employee’s devices– Better utilization of funds– Eliminate Intel’s obligation to replace
lost devices
Recommendation
Dollarized risks/returns of BYOD?
• Employee’s productivity!– BYOD employees additional 57 mins daily– Burden rate: $100/hr
– Approximately $238 million / year
Assume 251 working days in 201010,000 employees$95/57 min251 * 10000 * 95 = $238,450,000 a year in increased productivity
Security
Considered OptionsDeny “unmanaged” devices
Pro: BYOD devices would be fully “managed”
Con: Promote shadow IT
Client-server solutionPro: Secure data from unmanaged deviceCon: Attacks via compromised unmanaged device
Mobile device managementIncrease visibilityGain controlWipe rule
Application managementBlacklist of appsContainerisation/App-wrapping
Technology
Network ManagementControl access to corporate network
Data managementDocument repositoriesCollaboration tools
Technology
PeopleCommunicate with End Users & Key Stakeholders
EducationTraining
User, Service Desk & Developers
Code of ConductRisk awareness
Legal and Ethics
Considered Options:Signing Agreement on legal safeguardsAllow Information to flow through corporate serversCollaborate with Device Manufacturers to install e-Discovery
E-Discovery
Data storage and Backup
Monitoring and Audit Rights
Signing Service Agreement
Compliance with privacy laws
Impossible for all data to flow through servers
Information flow through corporate servers
Restricts employees to buying devices from specific manufacturers
Defeats the purpose of BYOD
Cost of Collaboration
Install E-Discovery in Device
Provide apps that use make use of corporate servers
Manage Data Retrieval Process
Proper Handling of Data
How to solve the issues?
Implementation Challenges
Human ResourceLegalFinanceIT
Stakeholders
Implementation Plan
Device Support
Handling OS Updates
Managing Lost Devices
Roll-out PlanPilot Program
Implementing BYOD
Conclusion
BYOD: more than a passing fadSource of competitive advantage
Issues and ImplicationsSecurity, financial, legal and ethicalRecommendations and implementation plan
Should we implement BYOD?Not about technology, but about peopleEncourage and embrace innovation
Conclusion
Questions & Answers