Executive Summary: Considering a BYOD Infrastructure

3
Considering a BYOD Infrastructure Melissa Andrews April 16, 2013 Introduction Over the last few years the discussion points surrounding Bring Your Own Device infrastructure models have revolved around cost, security and productivity. Many experts have written articles warning CIO’s that the benefit of such an implementation did not warrant the cost or security concerns. BYOD was touted as nothing but a trend that would soon fizzle. However, as reported on April 10, 2013 by BizTechMagazine in its article “BYOD is Growing but Needs More Support from IT” 82 percent of companies surveyed in 2013 allowed some or all workers to use their own devices on the job. At the same time only 38 percent of CIO’s were prepared to support a BYOD model. (12) This information proves that the implementation of a BYOD-ready infrastructure is no longer a luxury but a necessity for companies seeking continued growth and advancement. Embracing this model is a necessity in terms of cost, security, productivity, innovation and sustainability. Security and Costs The BYOD naysayers cite security and costs as the primary reasons BYOD models should not be implemented. However, upon a closer look, a strategic BYOD model can actually significantly reduce security threats and will likely reduce costs over time. A BYOD model that leverages Virtual Desktop Technology (VDI) at its core ensures that no data will ever be stored on an end users device. (2) Additionally, the utilization of a Mobile Device Management (MDM) system controls which devices can have access to corporate networks. Given that workers are already bringing personal devices into the corporate network whether a formal BYOD policy exists or not, unmediated security holes already exist. (1) Therefore, the implementation of a solid BYOD infrastructure will close security gaps not create them. In regards to costs, as discussed some of the major costs associated with BYOD such as VDI and MDM systems are soon to be required infrastructure investments even without BYOD in place. Yet, by supporting BYOD, companies stand to save in terms of both capital hardware expenditures and technical support costs. According to the Sharon Moynihan, Vice President of Virginia Bank, the bank’s recent implementation of a BYOD model positioned the bank to save roughly $1,500 per BYOD device. (4) By placing the onus of device procurement, maintenance and support on the end user, with or without a reimbursement or stipend program, companies can reallocate critical funds and resources to strategic initiatives. Given these facts it is clear that a BYOD model does not present an unconquerable challenge in terms of costs and security. In fact, implemented well, a BYOD model can alleviate these pressures. Productivity and Innovation

Transcript of Executive Summary: Considering a BYOD Infrastructure

Page 1: Executive Summary: Considering a BYOD Infrastructure

Considering a BYOD Infrastructure

Melissa Andrews April 16, 2013

Introduction

Over the last few years the discussion points surrounding Bring Your Own Device infrastructure models

have revolved around cost, security and productivity. Many experts have written articles warning CIO’s

that the benefit of such an implementation did not warrant the cost or security concerns. BYOD was

touted as nothing but a trend that would soon fizzle. However, as reported on April 10, 2013 by

BizTechMagazine in its article “BYOD is Growing but Needs More Support from IT” 82 percent of

companies surveyed in 2013 allowed some or all workers to use their own devices on the job. At the

same time only 38 percent of CIO’s were prepared to support a BYOD model. (12) This information

proves that the implementation of a BYOD-ready infrastructure is no longer a luxury but a necessity for

companies seeking continued growth and advancement. Embracing this model is a necessity in terms of

cost, security, productivity, innovation and sustainability.

Security and Costs

The BYOD naysayers cite security and costs as the primary reasons BYOD models should not be

implemented. However, upon a closer look, a strategic BYOD model can actually significantly reduce

security threats and will likely reduce costs over time. A BYOD model that leverages Virtual Desktop

Technology (VDI) at its core ensures that no data will ever be stored on an end users device. (2)

Additionally, the utilization of a Mobile Device Management (MDM) system controls which devices can

have access to corporate networks. Given that workers are already bringing personal devices into the

corporate network whether a formal BYOD policy exists or not, unmediated security holes already exist.

(1) Therefore, the implementation of a solid BYOD infrastructure will close security gaps not create

them. In regards to costs, as discussed some of the major costs associated with BYOD such as VDI and

MDM systems are soon to be required infrastructure investments even without BYOD in place. Yet, by

supporting BYOD, companies stand to save in terms of both capital hardware expenditures and technical

support costs. According to the Sharon Moynihan, Vice President of Virginia Bank, the bank’s recent

implementation of a BYOD model positioned the bank to save roughly $1,500 per BYOD device. (4) By

placing the onus of device procurement, maintenance and support on the end user, with or without a

reimbursement or stipend program, companies can reallocate critical funds and resources to strategic

initiatives. Given these facts it is clear that a BYOD model does not present an unconquerable challenge

in terms of costs and security. In fact, implemented well, a BYOD model can alleviate these pressures.

Productivity and Innovation

Page 2: Executive Summary: Considering a BYOD Infrastructure

Aside from the riddance of cost and security concerns, companies stand to gain far more from a BYOD

program in terms of productivity and innovation. According to the infographic presented in the

aforementioned Biz Tech Magazine article, Intel estimated that its workers recaptured 57 minutes per

work day due to its BYOD program. (12) Considering, the average work day is 8 hours that computes to

a 12.5% productivity gain. Some of that gain can be attributed to the fact that workers aren’t being

forced to juggle multiple devices and can now utilize those that are best suited for their skillsets and

particular equipment requirements. (7) Moreover, a BYOD infrastructure by its very nature facilities

unrestricted mobility. Workers are able to access network resources from anywhere, anytime allowing

them to work when needed or so inspired. According to a 2010 IDC-Unisys report, workforce

mobilization is slated to be the fourth wave of corporate productivity in terms of historical production

models. (8) Unrestricted mobility is an absolute requirement for competitive companies. Remaining

innovated is another. A BYOD model can support this key business initiative in two ways. One, a BYOD

program can be leveraged to attract and retain an innovative, forward-thinking workforce. According to

a survey cited in the paper "Exploring Bring Your Own Device in the Public Sector", the 56% of

respondents who believe this statement propose that this is especially true for teleworkers and

millenniums. (9) Additionally, according to JayanthaPrabhu, CIO of the Essar Group, it is these

millenniums that are bringing “whiz-bang technology” to the workplace. (8) Workers that are given the

capability to utilize non-standard equipment will consequently discover news ways to leverage those

technologies in meeting company goals. Likewise, workers will introduce new technologies into the

workplace far faster than an IT department can test, standardize and distribute them. Clearly, the

productivity and innovative gains of a BYOD program cannot be dismissed.

Conclusion

In summary, the implementation of a BYOD infrastructure will alleviate security concerns, reduce costs,

create productivity gains and foster innovation. Considering each of these factors, companies that

leverage a BYOD model now are essentially creating a versatile and sustainable infrastructure properly

positioned to support the continued growth and advancement of the company it services. In the article

titled “BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies” it is stated that

Gartner predicts that BYOD will rise to become a major technology trend in 2013. (10) Yet it is arguable

that BYOD is no longer a trend at all. Given the precedent that has been set by major companies such as

Intel and government agencies such as Department of Treasury, both of which support comprehensive

BYOD programs, BYOD is here to stay and will be considered standard practice. (5) Noted investments

and enhancements in BYOD supportive technologies such as VDI, MDM and dual-persona devices only

bolster this fact. Therefore, by implementing a solid yet strategic BYOD program companies will be

properly positioned to leverage future technical advances. Otherwise, as stated in the initially quoted

Biz Tech Magazine article, “if your business doesn’t want to be left up a creek without a paddle, it’s time

to start rowing in the right direction.” (12)

Page 3: Executive Summary: Considering a BYOD Infrastructure

Bibliography

1. Messmer, Ellen. "Are Federal Agency Workers Going Rogue with Personal Devices?" Network World. Network

World, Inc., 22 Jan. 2013. Web. 17 Mar. 2013. <http://www.networkworld.com/news/2013/012213-federal-byod-

266032.html?page=1>.

2. Schultz, Keith. "VDI Tailored to BYOD." CIO.com. IDG Communications, 3 Aug. 2012. Web. 17 Mar. 2013.

<http://www.cio.com.au/article/432639/review_vdi_tailored_byod/>.

3. Valaboju, Krishna. "V Blog." Web log post. V Blog RSS. N.p., 16 Sept. 2008. Web. 17 Mar. 2013.

<http://vdi.co.nz/category/vdi/>.

4. Kaneshige, Tom. "The BYOD Troubleshoot: Security and Cost-savings." Cio.com. IDG Communications, 31 Mar.

2012. Web. 1 Apr. 2013. <http://www.cio.com.au/article/420234/byod_troubleshoot_security_cost-

savings/?fp=16&fpid=1>.

5. "A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs." CIO.gov.

Federal Chief Information Officers Council, n.d. Web. 19 Feb. 2013. <https://cio.gov/wp-

content/uploads/downloads/2012/09/byod-toolkit.pdf>.

6. Bender, Adam. "BYOD 101: What Are BYOD and the Consumerization of IT?" Cio.com. IDG Communications, 6

Nov. 2012. Web. 1 Apr. 2013. <Source 6:

http://www.cio.com.au/article/441089/byod_101_what_byod_consumerization_it_/?pp=3>.

7. Witeck, Chris. "Q1 2013 Mobile Workforce Report: BYOD and Costs Impact Productivity | IPass."IPass Q1 2013

Mobile Workforce Report BYOD and Costs Impact Productivity Comments. IPass, 25 Mar. 2013. Web. 01 Apr. 2013.

<http://www.ipass.com/blog/mobile-worker-byod-costs-impact-productivity/>.

8. Roy, Debarati. "BYOD: The Essar Way." CIO.in. CIO.in, n.d. Web. 19 Feb. 2013. <http://www.cio.in/case-

study/bring-it-essar>.

9. Fiorenza, Pat, Lindsey Tepe, Jeff Ribeira, and Vanessa Vogel. "Exploring Bring Your Own Device in the Public

Sector." Api.ning.com. Api.ning.com, n.d. Web. 19 Feb. 2013.

<http://api.ning.com/files/E9piBAScXz0wdJb2obngJ6YUzBQI9vU9FyTMb6du9JsCI8BpV2c5u2aZDuLWTGyQ3F9*ce0

pKqqZKcURsbISzQ__/BYODfinal_1.pdf>.

10. "BYOD: Here to Stay or Doomed? - Unified Communications (UC) Strategies." Ucstrategies.com.

Ucstrategies.com, 26 Nov. 2012. Web. 19 Feb. 2013. <http://www.ucstrategies.com/unified-communications-

newsroom/byod-here-to-stay-or-doomed.aspx>.

11. Wainwright, Ashley. "IT Solutions Blog."How BYOD Will Impact 2013 and the Years to Come: Infographic.

Secure Edge Networks, 22 Feb. 2013. Web. 01 Apr. 2013. <http://www.securedgenetworks.com/secure-edge-

networks-blog/bid/86906/How-BYOD-will-Impact-2013-and-the-Years-to-Come-Infographic>.

12. Ribeiro, Ricky. "BYOD Is Growing but Needs More Support from IT [#Infographic]." BizTech Magazine. CDW LLC,

10 Apr. 2013. Web. 16 Apr. 2013. <http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-

support-it-infographic>.