SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Bring Your Own Device[ BYOD]
Implementation
Md Yousup Faruqu
IT
AGENDA
Background & Bring Your Own Device (BYOD) Overview
Implementation Roadmap And Approach
Costing And Budget
Analysis And Key Findings
Objectives Of BYOD
Recommendation
BYOD describes an end user computing strategy
supported by a set of policies and controls,
which in conjunction with a technical solution
provide a managed and secure
framework for employees to access corporate
data from their personal device whilst
providing the enterprise with a level of control
over both the device and the data it
can access.
AppleiPhone
Android
Mobile
Windows
Phone
AppleiPad
Android
Tablet
Blackberry
Playbook
Mobile Phone Tablet
Windows
Laptop
AppleMac
Hand Held Laptop
Mobile Device
Desktop
Device
BYOD
The BYOD policy must detail which
items are allowed and the controls
that will be applied.
When defining the scope of any BYOD
implementation consideration must
be given to which end user devices*
will be allowed.
Each device type has its own set of
risks and management issues.
 What devices will be subject to BYOD
 What over arching method of resource access will
be used for:
 Hand held devices
 Laptops
 How will the solution and end users be supported
 How will business units be charged for the service
Strategy
The business reasons for
adopting BYOD, for a
successful BYOD
implementation
Policy
Policy right protects the
business from the risks
associated with BYOD
 What devices makes and models will be allowed
 How will Antivirus be handled
 What actions does the company reserve the right
to carry out on an employees personal device
(e.g. remote wipe on loss)
 How will leavers be handled
 What access controls will be used (Certificate
based authentication, Pin Number lengths)
 Empower users to choose their own devices to
improve productivity, collaboration and mobility
 Protect sensitive information from loss and theft to
meet privacy, compliance and risk management
standards
 Reduce costs and simplify management through
self-service provisioning and automated management
and monitoring
 Simplify IT by deploying apps once for use on any
device
6
 On-demand delivery of data, apps and desktops to any device
– personal or business
 Transform corporate application as well as desktops into an
on-demand service available on device.
 A self-service app store providing unified access and single
sign-on to Windows, web and SaaS apps on any device, over
any network
 Secure file sync and sharing for any device
 Collaborative work platform with coworkers and clients
 A secure-by-design architecture including SSL VPN and
granular policy-based user authentication with tracking and
monitoring to support compliance and privacy.
Increased user mobility
Increased user satisfaction
Increase productivity*
Help retain top performers
Reduce capital costs
Helps to attract younger talent*
 Conduct baseline PoC to identify precise solutions to implement BYOD.
Citrix and VMware has been identified as a best solutions for ABC Inc
infrastructure.
 All tests done in PoC with CITRIX and VMware were successful.
 Use Citrix and VMware BYOD environment to publish or deliver Windows
XP, 7 virtual desktop and application to the selected end users devices:
 iOS device – iPhone, iPad
 Android device – Samsung Phone, Tablet
 Windows Phone – Nokia Lumia
9
Months
- Device & users selection
- Test report
- Provision desktop and
applications
Kick-Off
- Drawing up the RFP
- Publication
- Selection
- Assignment
Implementation
Dec. 2012 May,13 Jun,13
Project Management
RFP
Design &Analysis
- Optimized design
- Technical design
- BYOD Implementation plan
HW
Provisioning
Completion
Oct,13Feb,13
 Site Preparation, Product Delivery And Installation
 Equipment delivery
 Power preparation
 Network preparation
 H/W installation
 OS installation and configuration
 Host Integration (SAN integration)
 Install and configure hypervisor VMware ESX and Virtual Center
 Install and configure VMWare software and high availability
 Install and configure BYOD solution
 Provision virtual desktop and/or applications to the designated users
11
 Hardware Configuration (Total cost: $32k)
 2 physical server with 4X10-core (40) CPU and 196GB RAM
each, used for the host machines
 Software Configuration - Hypervisor (Total cost: $30k)
 VMware vSphere 5.o (8 CPU licenses. Each License covers 1
physical CPU) with 1 years warranty and support
 BYOD solution –Software, Licenses and support ($66k)
 BYOD solution software and licenses
 Storage (Total cost: $36k)
 3TB usable FC storage
13
 Identical physical servers are running at 20-35% utilization.
 With 30 servers consolidated on 3 ESX Server hosts, all the servers
will be operate at 60-80% utilization, resulting in a huge
improvement in server utilization as measured by average CPU and
memory usage.
 Uniform high availability across the entire virtualized IT
environment without the cost and complexity of failover solutions
tied to either operating systems or specific applications.
 The time is reduced for provisioning new servers to minutes. Before
virtualization, it took us 20-30 hours if we needed to prepare a new
system.
 Downtime and IT service disruptions will be minimize.
 E-mail
 HR Application
 ERP Systems
 File Servers [H & Z drive]
 Intranet Applications
Log On
Time
Last State
Change
Endpoint Name
Endpoint
Address
Endpoint
Hardware Id
Client
Version
Horizontal
Resolution
Vertical
Resolutio
n
9/9/12
11:48 AM
11/5/12
10:03 AM
WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768
11/5/12
7:42 AM
11/5/12
7:44 AM
xt45 172.71.237.15 421C1E03 320 480
11/6/12
8:50 AM
11/6/12
8:50 AM
WI_mitjsZpPOTw8J
oSBS
172.71.229.56 CE49DF52 768 1024
11/6/12
8:52 AM
11/6/12
8:53 AM
WI_m4ubYcezolIW
kWImB
172.71.103.49 363D7406 13.0.0.6685 1366 768
11/6/12
8:59 AM
11/6/12
9:00 AM
WI_tk6oktkdeMd19
jJeO
172.71.103.46 3FB64541 12.1.44.1 1280 800
User access report
Budget Head
Cost ($k)
Phase 1
Hardware
Server 32
Storage 36
Software
VMware ESX license 30
BYOD solutions and license 56
Professional Services
Implémentation service 10
Total 164
Costing & Budget
17
Most of the tests performed with CITRIX VDI in POC,
were successful.
We recommend deploy the solution in phased approach
and build the infrastructure gradually
The phase 1 implementation is planned to be done in
2013.
Meanwhile, we understood that there are many vendor
products available in the market, so we would be doing
the POC on VMware technology this year to determine
if there have been any development that more capable
in terms of reliability, and user experience compare to
CITRIX
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Next Generation Service Platforms for Multimedia and Value Added Services
Next Generation Service Platforms for Multimedia and Value Added ServicesNext Generation Service Platforms for Multimedia and Value Added Services
Next Generation Service Platforms for Multimedia and Value Added ServicesAli Saghaeian
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT ConvergenceSchneider Electric
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Employee Inspiration: How to Create Energy That Drives Better Customer Outcomes
Employee Inspiration: How to Create Energy That Drives Better Customer OutcomesEmployee Inspiration: How to Create Energy That Drives Better Customer Outcomes
Employee Inspiration: How to Create Energy That Drives Better Customer OutcomesQualtrics
 
Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02morris otieno
 
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...Boston Consulting Group
 
As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...Deloitte United States
 
Reach out and touch the future: Accenture connected vehicle solutions
Reach out and touch the future: Accenture connected vehicle solutionsReach out and touch the future: Accenture connected vehicle solutions
Reach out and touch the future: Accenture connected vehicle solutionsaccenture
 
SmartPhones, and their impact on the workplace, education and social engagment
SmartPhones, and their impact on the workplace, education and social engagmentSmartPhones, and their impact on the workplace, education and social engagment
SmartPhones, and their impact on the workplace, education and social engagmentAmy Herbert
 
Expanding Your Data Center with Hybrid Cloud Infrastructure
Expanding Your Data Center with Hybrid Cloud InfrastructureExpanding Your Data Center with Hybrid Cloud Infrastructure
Expanding Your Data Center with Hybrid Cloud InfrastructureAmazon Web Services
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc servicesElena Benson
 
Win The Fight: Crush and Contain for Safer Reopening
Win The Fight: Crush and Contain for Safer Reopening Win The Fight: Crush and Contain for Safer Reopening
Win The Fight: Crush and Contain for Safer Reopening Boston Consulting Group
 
Indonesia Submarine Cables
Indonesia Submarine CablesIndonesia Submarine Cables
Indonesia Submarine CablesMuljati Muli
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Amazon Web Services
 
#BainWebinar Procurement Best Practices Through Covid19
#BainWebinar Procurement Best Practices Through Covid19 #BainWebinar Procurement Best Practices Through Covid19
#BainWebinar Procurement Best Practices Through Covid19 Bain & Company Brasil
 

Was ist angesagt? (20)

The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Next Generation Service Platforms for Multimedia and Value Added Services
Next Generation Service Platforms for Multimedia and Value Added ServicesNext Generation Service Platforms for Multimedia and Value Added Services
Next Generation Service Platforms for Multimedia and Value Added Services
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Employee Inspiration: How to Create Energy That Drives Better Customer Outcomes
Employee Inspiration: How to Create Energy That Drives Better Customer OutcomesEmployee Inspiration: How to Create Energy That Drives Better Customer Outcomes
Employee Inspiration: How to Create Energy That Drives Better Customer Outcomes
 
Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02Gponfundamentals 130805074507-phpapp02
Gponfundamentals 130805074507-phpapp02
 
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
Successful FTTH Implementation
Successful FTTH ImplementationSuccessful FTTH Implementation
Successful FTTH Implementation
 
As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...As organizational reliance on third parties increases, extended enterprise ri...
As organizational reliance on third parties increases, extended enterprise ri...
 
Reach out and touch the future: Accenture connected vehicle solutions
Reach out and touch the future: Accenture connected vehicle solutionsReach out and touch the future: Accenture connected vehicle solutions
Reach out and touch the future: Accenture connected vehicle solutions
 
SmartPhones, and their impact on the workplace, education and social engagment
SmartPhones, and their impact on the workplace, education and social engagmentSmartPhones, and their impact on the workplace, education and social engagment
SmartPhones, and their impact on the workplace, education and social engagment
 
Expanding Your Data Center with Hybrid Cloud Infrastructure
Expanding Your Data Center with Hybrid Cloud InfrastructureExpanding Your Data Center with Hybrid Cloud Infrastructure
Expanding Your Data Center with Hybrid Cloud Infrastructure
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc services
 
Webinar: Digitalization & Energy
Webinar:  Digitalization & EnergyWebinar:  Digitalization & Energy
Webinar: Digitalization & Energy
 
Win The Fight: Crush and Contain for Safer Reopening
Win The Fight: Crush and Contain for Safer Reopening Win The Fight: Crush and Contain for Safer Reopening
Win The Fight: Crush and Contain for Safer Reopening
 
How to accelerate digital solutions
How to accelerate digital solutionsHow to accelerate digital solutions
How to accelerate digital solutions
 
Indonesia Submarine Cables
Indonesia Submarine CablesIndonesia Submarine Cables
Indonesia Submarine Cables
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)
 
#BainWebinar Procurement Best Practices Through Covid19
#BainWebinar Procurement Best Practices Through Covid19 #BainWebinar Procurement Best Practices Through Covid19
#BainWebinar Procurement Best Practices Through Covid19
 

Andere mochten auch

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology ProposalDana L. Miller
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingFAIZAL T H
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementYole Developpement
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentationraj7
 

Andere mochten auch (20)

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology Proposal
 
BYOD
BYODBYOD
BYOD
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
 
Clothing for Biosensing
Clothing for BiosensingClothing for Biosensing
Clothing for Biosensing
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
 
Human cloning
Human cloningHuman cloning
Human cloning
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 

Ähnlich wie Business Case Of Bring Your Own Device[ BYOD]

Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization servicesAditi Shrivastava
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSiraj Syed
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxAbbadabbajabba1
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Md Yousup Faruqu
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Flexera
 
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 

Ähnlich wie Business Case Of Bring Your Own Device[ BYOD] (20)

Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptx
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_Admin
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Maninder_singh
Maninder_singhManinder_singh
Maninder_singh
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Business Case Of Bring Your Own Device[ BYOD]

  • 1. Bring Your Own Device[ BYOD] Implementation Md Yousup Faruqu IT
  • 2. AGENDA Background & Bring Your Own Device (BYOD) Overview Implementation Roadmap And Approach Costing And Budget Analysis And Key Findings Objectives Of BYOD Recommendation
  • 3. BYOD describes an end user computing strategy supported by a set of policies and controls, which in conjunction with a technical solution provide a managed and secure framework for employees to access corporate data from their personal device whilst providing the enterprise with a level of control over both the device and the data it can access.
  • 4. AppleiPhone Android Mobile Windows Phone AppleiPad Android Tablet Blackberry Playbook Mobile Phone Tablet Windows Laptop AppleMac Hand Held Laptop Mobile Device Desktop Device BYOD The BYOD policy must detail which items are allowed and the controls that will be applied. When defining the scope of any BYOD implementation consideration must be given to which end user devices* will be allowed. Each device type has its own set of risks and management issues.
  • 5.  What devices will be subject to BYOD  What over arching method of resource access will be used for:  Hand held devices  Laptops  How will the solution and end users be supported  How will business units be charged for the service Strategy The business reasons for adopting BYOD, for a successful BYOD implementation Policy Policy right protects the business from the risks associated with BYOD  What devices makes and models will be allowed  How will Antivirus be handled  What actions does the company reserve the right to carry out on an employees personal device (e.g. remote wipe on loss)  How will leavers be handled  What access controls will be used (Certificate based authentication, Pin Number lengths)
  • 6.  Empower users to choose their own devices to improve productivity, collaboration and mobility  Protect sensitive information from loss and theft to meet privacy, compliance and risk management standards  Reduce costs and simplify management through self-service provisioning and automated management and monitoring  Simplify IT by deploying apps once for use on any device 6
  • 7.  On-demand delivery of data, apps and desktops to any device – personal or business  Transform corporate application as well as desktops into an on-demand service available on device.  A self-service app store providing unified access and single sign-on to Windows, web and SaaS apps on any device, over any network  Secure file sync and sharing for any device  Collaborative work platform with coworkers and clients  A secure-by-design architecture including SSL VPN and granular policy-based user authentication with tracking and monitoring to support compliance and privacy.
  • 8. Increased user mobility Increased user satisfaction Increase productivity* Help retain top performers Reduce capital costs Helps to attract younger talent*
  • 9.  Conduct baseline PoC to identify precise solutions to implement BYOD. Citrix and VMware has been identified as a best solutions for ABC Inc infrastructure.  All tests done in PoC with CITRIX and VMware were successful.  Use Citrix and VMware BYOD environment to publish or deliver Windows XP, 7 virtual desktop and application to the selected end users devices:  iOS device – iPhone, iPad  Android device – Samsung Phone, Tablet  Windows Phone – Nokia Lumia 9
  • 10. Months - Device & users selection - Test report - Provision desktop and applications Kick-Off - Drawing up the RFP - Publication - Selection - Assignment Implementation Dec. 2012 May,13 Jun,13 Project Management RFP Design &Analysis - Optimized design - Technical design - BYOD Implementation plan HW Provisioning Completion Oct,13Feb,13
  • 11.  Site Preparation, Product Delivery And Installation  Equipment delivery  Power preparation  Network preparation  H/W installation  OS installation and configuration  Host Integration (SAN integration)  Install and configure hypervisor VMware ESX and Virtual Center  Install and configure VMWare software and high availability  Install and configure BYOD solution  Provision virtual desktop and/or applications to the designated users 11
  • 12.  Hardware Configuration (Total cost: $32k)  2 physical server with 4X10-core (40) CPU and 196GB RAM each, used for the host machines  Software Configuration - Hypervisor (Total cost: $30k)  VMware vSphere 5.o (8 CPU licenses. Each License covers 1 physical CPU) with 1 years warranty and support  BYOD solution –Software, Licenses and support ($66k)  BYOD solution software and licenses  Storage (Total cost: $36k)  3TB usable FC storage
  • 13. 13  Identical physical servers are running at 20-35% utilization.  With 30 servers consolidated on 3 ESX Server hosts, all the servers will be operate at 60-80% utilization, resulting in a huge improvement in server utilization as measured by average CPU and memory usage.  Uniform high availability across the entire virtualized IT environment without the cost and complexity of failover solutions tied to either operating systems or specific applications.  The time is reduced for provisioning new servers to minutes. Before virtualization, it took us 20-30 hours if we needed to prepare a new system.  Downtime and IT service disruptions will be minimize.
  • 14.  E-mail  HR Application  ERP Systems  File Servers [H & Z drive]  Intranet Applications
  • 15. Log On Time Last State Change Endpoint Name Endpoint Address Endpoint Hardware Id Client Version Horizontal Resolution Vertical Resolutio n 9/9/12 11:48 AM 11/5/12 10:03 AM WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768 11/5/12 7:42 AM 11/5/12 7:44 AM xt45 172.71.237.15 421C1E03 320 480 11/6/12 8:50 AM 11/6/12 8:50 AM WI_mitjsZpPOTw8J oSBS 172.71.229.56 CE49DF52 768 1024 11/6/12 8:52 AM 11/6/12 8:53 AM WI_m4ubYcezolIW kWImB 172.71.103.49 363D7406 13.0.0.6685 1366 768 11/6/12 8:59 AM 11/6/12 9:00 AM WI_tk6oktkdeMd19 jJeO 172.71.103.46 3FB64541 12.1.44.1 1280 800 User access report
  • 16. Budget Head Cost ($k) Phase 1 Hardware Server 32 Storage 36 Software VMware ESX license 30 BYOD solutions and license 56 Professional Services Implémentation service 10 Total 164 Costing & Budget
  • 17. 17 Most of the tests performed with CITRIX VDI in POC, were successful. We recommend deploy the solution in phased approach and build the infrastructure gradually The phase 1 implementation is planned to be done in 2013. Meanwhile, we understood that there are many vendor products available in the market, so we would be doing the POC on VMware technology this year to determine if there have been any development that more capable in terms of reliability, and user experience compare to CITRIX