Uploaded by vito b

The Consumerization of IT

advertisement
THE CONSUMERIZATION OF
IT
By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano
Introduction

How is Mobility Changing the Way Organizations
Do Business?
 The
Possible Shift
 Systems of Engagements
 The demand for smartphones and tablets
Introduction

The Explosion of Smart phones and Tablets
Embracing The Trend
 Not
a passing trend
 Increase in productivity, happiness and morale
 Cost reduction
 The reinvention of IT
Support and Manageability of the
Work Force

The Key Strategic Areas
 Formal
Strategy
 Analyze business processes
 The CIO and he/she critical role
 Oliver
 Chief
Bussman & SAP
Mobility Officer
Support and Manageability of the
Work Force Cont.

The Acquisition, Tracking, and Managing of Mobile
Devices
 Strategic
sourcing method
 Agreement on devices
 Strategy and expense policies
 Usage and compliance policies
Support and Manageability of the
Work Force Cont.

The Service Desk and the Expectation to Service
Employee’s Devices
 Well-equipped
service desk
 Device configurations and remote control capabilities
 Remote support strategy
Support and Manageability of the
Work Force Cont.

Policies and guidelines to help organizations
embrace mobility



Mobile Device Management Policy
Lax governance and non-compliance issues
Policies on hardware and devices
Support and Manageability of the
Work Force Cont.

Mobile Device Support Solutions
 Automate
policies through MDM System
Security and Controls

Security has been one of the greatest concerns with
BYOD
 IT
cannot treat devices like they “own them”
 Instead must come up with a different strategy
 Must protect the organizations information and enable
functionality to meet business objects; those goals are
not always in sync
Security and Controls

MDM Vendor Cost Comparison
Security and Controls

Risk Assessment
Security and Controls

IT and users share responsibility of securing the
devices
 Implementing
 Remind
a security awareness program
users to physically secure their devices when
traveling
 Locking devices with a password
 Using encryption where possible
Employee Performance

Adoption to New Trends
 Elimination
of training.
 Become mentors to others.
 Transition away from the IT Department.
 Comfort level with familiar devices.
 Early adoption of new devices.
 Productivity Gains.
 Internal Knowledgebase
Employee Performance

Employee Creativity
 Greater
Success Rate.
 Continuous Improvement in current position.
 Morale building
 Better accessibility to current business tools.
Employee Performance

Negative Employee Performance
 Unwarranted
multi-tasking
 Risk of inappropriate content viewing
 Wasted time on personal calls and emails
Company and User Protection

Potential Risks
Loss of data
 Unauthorized use
 Viral infection
 Compromise of confidential
data
 Litigation
 Damaged reputation



Controlled Environment



Secured data being
accessed at anytime.
Proper Communication and
Education.
Audited Policies and
Procedures.
Proper handling of
disgruntled employees.
Conclusion

Summary of Proposed Solutions and Best Practices
 SAP
 Guidelines
for Implementing BYOD
 Lessons Learned
 Embrace
the trend
 Corral “Wild West”
 Security
 What’s next?
Questions?
Download