Today, organizations are mainly focusing towards increasing the end-user experience, device management and data security. End User computing devices were controlled and managed by IT, but now in the trend of smartphones and tablets, end-users incline to bring their own device.
After years of development in technology, adopting BYOD strategy enables employees to use their personal smart phones, tablets and other mobile devices to access corporate network and resources. BYOD strategy can be effectively utilized in satisfying the Organizational demands.
Many organizations look at BYOD as a possible way to reduce cost; however this initiative will take it further to other benefits like employee satisfaction, productivity, and Flexible Working Environment to the end users.
In a workplace, End users portfolio can be foreseen from different views:
Technology perspective end users who are
application dependent for day to day activities
also has dependency on machines (Desktops/Laptops)
From Business perspective we can broadly classify employees portfolio as Executive users, Mobile users, Power users, Home users and Task based users. The same is described in below matrix:
Probable Device to Replace with BYOD Initiative
Minimum or No
Tablets (ipads, Galaxy, etc.)
Sales, minimal documentation, etc.
Task based user
Repetitive tasks on daily basis
Combination of the above but does not require physical access to corporate resources
Implementing BYOD strategy requires vision from, Workplace to Datacenter. To enable a mobile or asset lite workplace environment, the dependent applications, required desktops (virtually) and user profile has to be centralized. Storage (IOPS) and Network (Bandwidth) will be key component that has to be thought through from Datacenter perspective. This centralization approach and the provisioning components to enable the workplace over WAN with atmost security will require thorough analysis so that investments on the backend infrastructure can be planned effectively. For an efficient workplace it is mandatory to isolate the OS, Applications, User profile & data and rapidly integrate & provision the same. Technologies and products to consider for the same will play a vital role.
Technologies that help accelerating these initiatives can be:
Application Virtualization (Hosting/Streaming)
Desktop Virtualization (Hosting/Streaming)
Offline Caching (User profiles/Data)
When enabling such initiatives, security is a concern especially, users who access the environment via browser or who require offline access to Virtual desktops. Access to any infrastructure components (Applications/Desktops) via online (hosting) mechanism can be secured by scanning the endpoint to meet respective security using ActiveX. Also antivirus agents that can be provisioned using end-user self-service portal for installing in end-user owned desktop/laptops. For secure access to the Offline components (Sequenced applications/offline desktops) end points can be scanned using Virtualization Agents. With recent authentication mechanism for tablets like Phone factor, etc, can also be considered
Adoption of such initiatives is like a paradigm shift for end users in their workplace environment. Acceptance of the change has to be thoroughly assessed at every stage; since that intermediate milestone will be driver for remaining user groups. Adoption is completely dependent on user portfolio, applications, Organization’s policies (compliance, etc.). As per information/recommendation of various analysts, it is inferred that most organizations will have this implemented in upcoming years with a baseline of 10 to 12% of their users with Employee owned devices.
First phase in adoption of such initiatives will start with detailed end-user survey that will define the fitment of end-user for BYOD program. Policies have to be internally defined involving various stakeholders like Finance team, HR team so that policies are flexible and easy to get into agreement between employees and employer. Also there should be internal IT team and loaner programs to leverage existing devices to employees and also provide existing devices during crash of employee owned device.
TCS has done various studies and helping the customers for such initiatives by participating in strategic discussions, workshops, POC’s. Evaluation of various solutions include, individual as well as combination of various product suites of Citrix, VMware, Microsoft, Moka Five, Quest, Lakeside, Appsense, Aternity, etc. By this right fit can be positioned as per requirement.
BYOD strategy seems simple, but it is not. The initial adoption of the BYOD strategy will depend on effective preparation, while its long-term sustainability will depend on the ongoing quality of the employee’s end-to-end experience. This white paper is written with the interest to view BYOD strategy from overall perspective – Business, technology and feasibility, where customers can benefit by realizing the real value of such adoption.