Executive Summary: Considering a BYOD Infrastructure
-
Upload
melissa-andrews -
Category
Technology
-
view
473 -
download
1
Transcript of Executive Summary: Considering a BYOD Infrastructure
Considering a BYOD Infrastructure
Melissa Andrews April 16, 2013
Introduction
Over the last few years the discussion points surrounding Bring Your Own Device infrastructure models
have revolved around cost, security and productivity. Many experts have written articles warning CIO’s
that the benefit of such an implementation did not warrant the cost or security concerns. BYOD was
touted as nothing but a trend that would soon fizzle. However, as reported on April 10, 2013 by
BizTechMagazine in its article “BYOD is Growing but Needs More Support from IT” 82 percent of
companies surveyed in 2013 allowed some or all workers to use their own devices on the job. At the
same time only 38 percent of CIO’s were prepared to support a BYOD model. (12) This information
proves that the implementation of a BYOD-ready infrastructure is no longer a luxury but a necessity for
companies seeking continued growth and advancement. Embracing this model is a necessity in terms of
cost, security, productivity, innovation and sustainability.
Security and Costs
The BYOD naysayers cite security and costs as the primary reasons BYOD models should not be
implemented. However, upon a closer look, a strategic BYOD model can actually significantly reduce
security threats and will likely reduce costs over time. A BYOD model that leverages Virtual Desktop
Technology (VDI) at its core ensures that no data will ever be stored on an end users device. (2)
Additionally, the utilization of a Mobile Device Management (MDM) system controls which devices can
have access to corporate networks. Given that workers are already bringing personal devices into the
corporate network whether a formal BYOD policy exists or not, unmediated security holes already exist.
(1) Therefore, the implementation of a solid BYOD infrastructure will close security gaps not create
them. In regards to costs, as discussed some of the major costs associated with BYOD such as VDI and
MDM systems are soon to be required infrastructure investments even without BYOD in place. Yet, by
supporting BYOD, companies stand to save in terms of both capital hardware expenditures and technical
support costs. According to the Sharon Moynihan, Vice President of Virginia Bank, the bank’s recent
implementation of a BYOD model positioned the bank to save roughly $1,500 per BYOD device. (4) By
placing the onus of device procurement, maintenance and support on the end user, with or without a
reimbursement or stipend program, companies can reallocate critical funds and resources to strategic
initiatives. Given these facts it is clear that a BYOD model does not present an unconquerable challenge
in terms of costs and security. In fact, implemented well, a BYOD model can alleviate these pressures.
Productivity and Innovation
Aside from the riddance of cost and security concerns, companies stand to gain far more from a BYOD
program in terms of productivity and innovation. According to the infographic presented in the
aforementioned Biz Tech Magazine article, Intel estimated that its workers recaptured 57 minutes per
work day due to its BYOD program. (12) Considering, the average work day is 8 hours that computes to
a 12.5% productivity gain. Some of that gain can be attributed to the fact that workers aren’t being
forced to juggle multiple devices and can now utilize those that are best suited for their skillsets and
particular equipment requirements. (7) Moreover, a BYOD infrastructure by its very nature facilities
unrestricted mobility. Workers are able to access network resources from anywhere, anytime allowing
them to work when needed or so inspired. According to a 2010 IDC-Unisys report, workforce
mobilization is slated to be the fourth wave of corporate productivity in terms of historical production
models. (8) Unrestricted mobility is an absolute requirement for competitive companies. Remaining
innovated is another. A BYOD model can support this key business initiative in two ways. One, a BYOD
program can be leveraged to attract and retain an innovative, forward-thinking workforce. According to
a survey cited in the paper "Exploring Bring Your Own Device in the Public Sector", the 56% of
respondents who believe this statement propose that this is especially true for teleworkers and
millenniums. (9) Additionally, according to JayanthaPrabhu, CIO of the Essar Group, it is these
millenniums that are bringing “whiz-bang technology” to the workplace. (8) Workers that are given the
capability to utilize non-standard equipment will consequently discover news ways to leverage those
technologies in meeting company goals. Likewise, workers will introduce new technologies into the
workplace far faster than an IT department can test, standardize and distribute them. Clearly, the
productivity and innovative gains of a BYOD program cannot be dismissed.
Conclusion
In summary, the implementation of a BYOD infrastructure will alleviate security concerns, reduce costs,
create productivity gains and foster innovation. Considering each of these factors, companies that
leverage a BYOD model now are essentially creating a versatile and sustainable infrastructure properly
positioned to support the continued growth and advancement of the company it services. In the article
titled “BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies” it is stated that
Gartner predicts that BYOD will rise to become a major technology trend in 2013. (10) Yet it is arguable
that BYOD is no longer a trend at all. Given the precedent that has been set by major companies such as
Intel and government agencies such as Department of Treasury, both of which support comprehensive
BYOD programs, BYOD is here to stay and will be considered standard practice. (5) Noted investments
and enhancements in BYOD supportive technologies such as VDI, MDM and dual-persona devices only
bolster this fact. Therefore, by implementing a solid yet strategic BYOD program companies will be
properly positioned to leverage future technical advances. Otherwise, as stated in the initially quoted
Biz Tech Magazine article, “if your business doesn’t want to be left up a creek without a paddle, it’s time
to start rowing in the right direction.” (12)
Bibliography
1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network
World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. <http://www.networkworld.com/news/2013/012213-federal-byod-
266032.html?page=1>.
2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013.
<http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>.
3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013.
<http://vdi.co.nz/category/vdi/>.
4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar.
2012. Web. 1 Apr. 2013. <http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-
savings/?fp=16&fpid=1>.
5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov.
Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. <https://cio.gov/wp-
content/uploads/downloads/2012/09/byod-toolkit.pdf>.
6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6
Nov. 2012. Web. 1 Apr. 2013. <Source 6:
http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>.
7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass."IPass Q1 2013
Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013.
<http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>.
8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-
study/bring-it-essar>.
9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public
Sector." Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013.
<http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0
pKqqZKcURsbISzQ__/BYODfinal_1.pdf>.
10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com.
Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. <http://www.ucstrategies.com/unified-communications-
newsroom/byod-here-to-stay-or-doomed.aspx>.
11. Wainwright, Ashley. "IT Solutions Blog."How BYOD Will Impact 2013 and the Years to Come: Infographic.
Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. <http://www.securedgenetworks.com/secure-edge-
networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>.
12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC,
10 Apr. 2013. Web. 16 Apr. 2013. <http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-
support-it-infographic>.