360 likes | 1.52k Views
Consumerization of IT. (Bring Your Own Device ). The C onsumerization of IT is Driven by…. Cloud Computing. Data Explosion. Social Computing. Browser-based Apps. Ecosystem of Computers. Personal Devices in the Workplace. Ubiquitous Connectivity. Natural Interaction.
E N D
Consumerization of IT (Bring Your Own Device)
The Consumerization of IT is Driven by… Cloud Computing Data Explosion Social Computing Browser-based Apps Ecosystemof Computers Personal Devicesin the Workplace Ubiquitous Connectivity Natural Interaction
The Consumerization of IT is Driven by… Cloud Computing Data Explosion Social Computing Browser-based Apps Ecosystem of Computers Personal Devices in the Workplace Ubiquitous Connectivity Natural Interaction
The Consumerization Brings a Lot of Issues • Infected managed PCs on the network • Accessing corporate content from unmanaged devices • VPN support • Unable to manage PCs and phones on the Internet • Access and identity • Device management • Business productivity • Remote access • Application development • Remote wipe devices • Authorized mobile device access • Increasing support costs • No data access strategy • Prevent data leakage • Confidential information on personal devices • Sensitive data on lost or stolen laptop • Compliance • Unmanaged device access to sensitive data • Personal devices on the corporate network
A Minute in the History of the Work Environment • Two billion mobile Internet devices today in the world • 2/3 of companies worldwide have adopted tablets • Only 20% of tablet owners use the device for content creation • Around 371 million computers sold in 2011 • Around 6 billion mobile phones worldwide • 16 phones per PC • Around 21 million tablets worldwide • 17 PCs per tablet, 285 phones per tablet Location Screen An activity We are all consumers and workers already. Just depending on what you are doing CONSUMERIZATION HAS ALREADY HAPPENED Sources: International Telecommunications Union, “Tablet Demand and Disruption” Morgan Stanley, IDC
WORK LIFE balance “People = Consumers = Workers” Want to: Connect Collaborate Create Customize Do things faster We are: Complex Technically capable Self-supported Cost-aware Worried about security Create and protect our intellectual property Expect: 24/7 Instant response Instant information Share The world to be relevant to us Evolution Revolution LIFE family friends work
Bring your own computer Thin clients Virtual desktop interface Consumer devices Smart phones Managed desktops Managed laptops Environment Desktop … What Is Your Strategy?
Environment Desktop … What Is Your Strategy? • Bring your own computer • Managed laptops • Managed desktops • Smart phones • Consumer devices • Virtual desktop interface • Thin clients
Microsoft is Embracing the Consumerization of ITFour Components to the Strategy: Security and management to support flexible workstyles Windows-based devices that people love Best productivity experience Unified application development
Three Dimensions Who User Need Where Device + location Choice What Apps+ data Enterprise control
Bring Your Own Framework Choose Your Own White-listing devices Loose policies • On Your Own • Any device • No policies Choose Your Own White-listing devices Loose policies On Your Own Any device No policies Bring Your Own Freedom of devices Loose policies Here is Your Own Predefined device Strict policies Here is Your Own Predefined device Strict policies • Bring Your Own • Freedom of devices • Loose policies
Bring Your Own Framework Choice On Your Own Bring Your Own Choose Your Own Here Is Your Own Enterprise control Your decision should be based on the level of freedom vs. control you need
One:Who? • Enablement • Proxy LOB applications • Public collaboration • Mobility • Business value • Collaboration needs • LOB applications • Engagement with technology • Mobility • Secure and compliant environment • LOB applications • Business value • Collaboration needs • Mobility Contractor Project Manager Account Manager Stock Trader Nothing Simplified enablement Enterprise enablement Compliancy enterprise enablement
One:Who? Contractor Project Manager Account Manager Stock Trader • Enablement • Proxy LOB applications • Public collaboration • Mobility • Business value • Collaboration needs • LOB applications • Engagement with technology • Mobility • Secure and compliant environment • LOB applications • Business value • Collaboration needs • Mobility Compliancy enterprise enablement Nothing Simplified enablement Enterprise enablement
Two: Where? On Your Own Bring Your Own Choose Your Own Here Is Your Own
Three: What? None User Public Data Low Medium High business impact Device + location Zero Leakage Apps+ data Business impact of data loss, corruption, or exposure?
Bringing it Together Unified access gateway Low Email • Seamless access Presence and IM Voice/communications Project Manager Account Manager Moderate Stock Trader CRM Central documents Secure < High > Virtualization Business intelligence LOB applications Public web Contractor
Assess the Impact to Your Organization Ambition Program Plan On Your Own Bring Your Own Choose Your Own Here’s Your Own Policies • User • Basic • Domain • Enterprise Policy / legal impact Security Financial impact Vendor contractual changes • User-managed • Local admin • Local admin • Basic policy enforcement: • Encryption check • Virus scanned check • Password policy, remote wipe • Central managed • Local user • Authentication (password complexity) • Device policies • Application access • Central managed • Strong authentication (SmartCard) • Drive encryption Data availability changes Employee benefits changes Impact Assessment IT • LEGAL Health • User-driven health management • Health assessment • Quarantined access • Health enforcement • Patch, firewall, configuration • Lock down templates • Device policies Application changes Infrastructure changes Concerns Support process changes Security policy changes Financial Compliance Data Apps IT Infra • FINANCE • HR
Understand People + Business High Autonomy 5% 20% 15% Low Mobility High Mobility 60% Low Autonomy
Establish Policies Devices Management Assets Bring Your Own Choose Your Own Here is Your Own Corporate Public Low Business Impact Medium Business Impact High Business Impact • Bring Your Own • Choose Your Own Partial • Public • Low Business Impact • Medium Business Impact On Your Own • Bring Your Own • Choose Your Own Proxied • Public • Low Business Impact • Medium Business Impact • High Business Impact On Your Own • Bring Your Own • Choose Your Own Public • Public
Establish Service Portfolio Consumer Devices IT services portfolio Consumer Devices IT Services Portfolio On Your Own • Client Services • Client Services Data Center Services Data Center Services User interface Application Services Application Services Business Productivity Services Business Productivity Services • Document authoring and publishing Local, RemoteApp File and print Web Collaboration • Social and communication Application delivery LOB Platform Enterprise content management Bring Your Own • User state Hosted Desktop Remote Web Access Desktop delivery Process management Enterprise search • User authentication CYO,HYO Identity and access Integration Reporting and analysis • Content synchronization CYO,HYO Consumer Devices Consumer Devices Service delivery Reporting and analysis Unified communications • File discovery and sharing Choose Your Own CYO,HYO Direct Access NAP, Access Gateway, Remote Desktop Gateway, • Protection Protection Data warehouse Messaging and calendering BYO, CYO,HYO • Virtualization Advanced networking Development LOB suite CYO,HYO • Management agent Here Is Your Own • Devices and peripherals Basic Infrastructure Basic Infrastructure Service operations Processing Basic networking Storage • Connectivity
Evaluate Current Capabilities IT Assessment
Build a Roadmap Contractor Project Manager Account Manager Stock Trader IT Assessment What Where Who IT Assessment
Start Delivering Services Who User Need Identity management Identity federation + directory services Where Location + devices Choice Access management, device management Network access services, asset + config. management, virtualization What Apps + data Enterprise control Information protection, app delivery Digital rights management, encryption, virtualization
Q&A Aka.ms\ConsumerizationStrategy