SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Bring Your Own Device – Ifs, Buts and Mobiles
Richard Allgate – Mobile Services Specialist | 25 September 2013
• Introduction to InTechnology
• What is BYOD?
• The business drivers
• The employee drivers
• Is your business considering BYOD?
• So, you’re serious about implementing BYOD
• Implementing a BYOD policy?
• Mobile Device Management
• Summary
Webcast Overview
• Serving the UK IT market for nearly 30 years
• Unique position in the managed IT services market
• Full range of managed IT services delivered to over 800 UK businesses
Introduction to InTechnology
• Employees permitted to access corporate information using
personal devices
• Covers all mobiles devices – mobiles, tablets, smart phones
• Approximately 44% of employees use their own technology at work.
This figure is estimated to be higher in some countries
• More employers are turning to BYOD as they look to reduce costs at
the same time as increasing productivity
• Allows employees to use device of their choice
What is BYOD?
• Reducing cost while increasing productivity
• Improving business continuity
• Encouraging flexible working
• Keeping staff happy
• The desire to ‘consumerise IT’
Business Drivers
• No need for two devices
• No training needed
• Get to choose their own device, rather than being told to use a
specific ‘company device’
Employee Drivers
• Does your business have a mobile policy ?
• What are the financial implications of uninsured handsets ?
• How will you manage ‘personal contracts’ ?
• What support plan do you have in place for staff ?
• How will you keep up to date with the ever-changing array of
devices?
Is Your Business Considering BYOD?
• How safe is your data?
• What happens to client data when an employee leaves the company?
• What happens if a personal device is lost or stolen?
• Are you prepared for the endless OS/Software upgrades?
• How much do you know about the devices being used?
• How would you handle a data breach?
So, You’re Serious About BYOD?
• Limit the number and type of devices allowed
• Plan out your device security policy
- Screen locking
- Regular password changes
• Include employee exit plan as part of the BYOD policy
• Restrict which company applications are made available
• Plan your Mobile Device Management (MDM)…
Implementing Your BYOD Policy?
• Manage which devices see which applications
• Easier management of updates to devices
• Enabling mass-updates/installation of new applications
• Added protection for company data and applications should device
be lost/stolen or an employee leaves the company
– Locking devices to prevent access to data/applications
– Wiping devices to prevent unauthorised use of data
Mobile Device Management (MDM)
• If you are looking at a BYOD strategy, then ensure it is for the right
reasons
• When you deploy BYOD consider changing or updating your mobile
policy
• Try to keep it simple, and have measures in place to help prevent it
becoming too resource hungry
• Consider what data will be on the devices, and what if it was in the
wrong hands
• ABSOLUTELY deploy a MDM solution in tandem with BYOD
• Research the pros and cons of each MDM solution – try not to be
driven by price (as a breach could be much more expensive!)
Summary
Any Questions?
Thank You For Your Time
Email: contact@intechnology.com
Telephone: 0800 983 2522
Website: www.intechnology.com
Twitter: twitter.com/intechnology
Case Studies: www.intechnology.com/case-studies

Weitere ähnliche Inhalte

Was ist angesagt?

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 

Was ist angesagt? (20)

Byod
ByodByod
Byod
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Wp byod
Wp byodWp byod
Wp byod
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 

Andere mochten auch

Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology ProposalDana L. Miller
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingFAIZAL T H
 
Impacts on environment due to methane extraction in
Impacts on environment due to methane extraction inImpacts on environment due to methane extraction in
Impacts on environment due to methane extraction inPravinkumar Muthusamy
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementYole Developpement
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentationraj7
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Yole Developpement
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement Yole Developpement
 
Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016Luminary Labs
 

Andere mochten auch (18)

Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology Proposal
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
 
Clothing for Biosensing
Clothing for BiosensingClothing for Biosensing
Clothing for Biosensing
 
Impacts on environment due to methane extraction in
Impacts on environment due to methane extraction inImpacts on environment due to methane extraction in
Impacts on environment due to methane extraction in
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
 
Human cloning
Human cloningHuman cloning
Human cloning
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
 
Biosensors
BiosensorsBiosensors
Biosensors
 
Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016Building Healthier Communities: TEDMED 2016
Building Healthier Communities: TEDMED 2016
 

Ähnlich wie Bring Your Own Device

Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseRES
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...Michael Antinozzi
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Christopher Hunt
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front linesInductive Automation
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowKirill Bensonoff
 
IT Consulting Companies - Latest Technology Updates.
IT Consulting Companies - Latest Technology Updates.IT Consulting Companies - Latest Technology Updates.
IT Consulting Companies - Latest Technology Updates.Vijay Pullannagari
 

Ähnlich wie Bring Your Own Device (20)

BYOD
BYODBYOD
BYOD
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front lines
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To KnowBYOD - What Every CFO Needs To Know
BYOD - What Every CFO Needs To Know
 
IT Consulting Companies - Latest Technology Updates.
IT Consulting Companies - Latest Technology Updates.IT Consulting Companies - Latest Technology Updates.
IT Consulting Companies - Latest Technology Updates.
 

Mehr von InTechnology Managed Services (part of Redcentric)

Mehr von InTechnology Managed Services (part of Redcentric) (20)

Harrogate Data Centre Brochure
Harrogate Data Centre BrochureHarrogate Data Centre Brochure
Harrogate Data Centre Brochure
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 
PaySecure Connect: Introduction to PCI-certified payment routing infrastructure
PaySecure Connect: Introduction to PCI-certified payment routing infrastructurePaySecure Connect: Introduction to PCI-certified payment routing infrastructure
PaySecure Connect: Introduction to PCI-certified payment routing infrastructure
 
Telehealth: InTechnology’s new patient monitoring services for the NHS
Telehealth: InTechnology’s new patient monitoring services for the NHSTelehealth: InTechnology’s new patient monitoring services for the NHS
Telehealth: InTechnology’s new patient monitoring services for the NHS
 
Let the Cloud weather the storm
Let the Cloud weather the stormLet the Cloud weather the storm
Let the Cloud weather the storm
 
An overview of Hybrid Hosting
An overview of Hybrid HostingAn overview of Hybrid Hosting
An overview of Hybrid Hosting
 
Key areas to consider when evaluating a Data Centre
Key areas to consider when evaluating a Data CentreKey areas to consider when evaluating a Data Centre
Key areas to consider when evaluating a Data Centre
 
Delivering services over the N3 Network
Delivering services over the N3 NetworkDelivering services over the N3 Network
Delivering services over the N3 Network
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
10 key questions to ask your managed network provider
10 key questions to ask your managed network provider10 key questions to ask your managed network provider
10 key questions to ask your managed network provider
 
Cloud Circle Forum (Cloud State Of Play)
Cloud Circle Forum (Cloud State Of Play) Cloud Circle Forum (Cloud State Of Play)
Cloud Circle Forum (Cloud State Of Play)
 
Cloud Circle Forum - Changing Landscape - 19 May 2011
Cloud Circle Forum - Changing Landscape - 19 May 2011Cloud Circle Forum - Changing Landscape - 19 May 2011
Cloud Circle Forum - Changing Landscape - 19 May 2011
 
InTechnology - Polycom VoIP Phone Handsets
InTechnology - Polycom VoIP Phone HandsetsInTechnology - Polycom VoIP Phone Handsets
InTechnology - Polycom VoIP Phone Handsets
 
InTechnology Reading Data Centre
InTechnology Reading Data CentreInTechnology Reading Data Centre
InTechnology Reading Data Centre
 
Managed Network Services
Managed Network ServicesManaged Network Services
Managed Network Services
 
Managed Data Services
Managed Data ServicesManaged Data Services
Managed Data Services
 
InTechnology Overview
InTechnology OverviewInTechnology Overview
InTechnology Overview
 
Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS)Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS)
 
Hosted IP Telephony Services
Hosted IP Telephony ServicesHosted IP Telephony Services
Hosted IP Telephony Services
 
Data Centre Hosting Services
Data Centre Hosting ServicesData Centre Hosting Services
Data Centre Hosting Services
 

Kürzlich hochgeladen

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Bring Your Own Device

  • 1. Bring Your Own Device – Ifs, Buts and Mobiles Richard Allgate – Mobile Services Specialist | 25 September 2013
  • 2. • Introduction to InTechnology • What is BYOD? • The business drivers • The employee drivers • Is your business considering BYOD? • So, you’re serious about implementing BYOD • Implementing a BYOD policy? • Mobile Device Management • Summary Webcast Overview
  • 3. • Serving the UK IT market for nearly 30 years • Unique position in the managed IT services market • Full range of managed IT services delivered to over 800 UK businesses Introduction to InTechnology
  • 4. • Employees permitted to access corporate information using personal devices • Covers all mobiles devices – mobiles, tablets, smart phones • Approximately 44% of employees use their own technology at work. This figure is estimated to be higher in some countries • More employers are turning to BYOD as they look to reduce costs at the same time as increasing productivity • Allows employees to use device of their choice What is BYOD?
  • 5. • Reducing cost while increasing productivity • Improving business continuity • Encouraging flexible working • Keeping staff happy • The desire to ‘consumerise IT’ Business Drivers
  • 6. • No need for two devices • No training needed • Get to choose their own device, rather than being told to use a specific ‘company device’ Employee Drivers
  • 7. • Does your business have a mobile policy ? • What are the financial implications of uninsured handsets ? • How will you manage ‘personal contracts’ ? • What support plan do you have in place for staff ? • How will you keep up to date with the ever-changing array of devices? Is Your Business Considering BYOD?
  • 8. • How safe is your data? • What happens to client data when an employee leaves the company? • What happens if a personal device is lost or stolen? • Are you prepared for the endless OS/Software upgrades? • How much do you know about the devices being used? • How would you handle a data breach? So, You’re Serious About BYOD?
  • 9. • Limit the number and type of devices allowed • Plan out your device security policy - Screen locking - Regular password changes • Include employee exit plan as part of the BYOD policy • Restrict which company applications are made available • Plan your Mobile Device Management (MDM)… Implementing Your BYOD Policy?
  • 10. • Manage which devices see which applications • Easier management of updates to devices • Enabling mass-updates/installation of new applications • Added protection for company data and applications should device be lost/stolen or an employee leaves the company – Locking devices to prevent access to data/applications – Wiping devices to prevent unauthorised use of data Mobile Device Management (MDM)
  • 11. • If you are looking at a BYOD strategy, then ensure it is for the right reasons • When you deploy BYOD consider changing or updating your mobile policy • Try to keep it simple, and have measures in place to help prevent it becoming too resource hungry • Consider what data will be on the devices, and what if it was in the wrong hands • ABSOLUTELY deploy a MDM solution in tandem with BYOD • Research the pros and cons of each MDM solution – try not to be driven by price (as a breach could be much more expensive!) Summary
  • 12. Any Questions? Thank You For Your Time Email: contact@intechnology.com Telephone: 0800 983 2522 Website: www.intechnology.com Twitter: twitter.com/intechnology Case Studies: www.intechnology.com/case-studies