BYOD: Focus on User Experience, Not the Device

Similar documents
Why Cloud Computing Needs a Cloud-Intelligent Network

Cisco APIC Enterprise Module Simplifies Network Operations

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization

Application-Aware Network INTRODUCTION: IT CHANGES EVOLVE THE NETWORK. By Zeus Kerravala -

Using the Network to Optimize a Virtualized Data Center

WiFi Evolution Drives the Need for Multigigabit Networks

OFFICE 365 CLOUD VOICE

Cisco and Akamai Elevate the Customer Digital Experience

Simplifying the Branch Network

Transform your network and your customer experience. Introducing SD-WAN Concierge

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

Cisco Start. IT solutions designed to propel your business

Evolution For Enterprises In A Cloud World

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Next-Generation HCI: Fine- Tuned for New Ways of Working

Transform your network and your customer experience. Introducing SD-WAN Concierge

Networking for a dynamic infrastructure: getting it right.

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Cisco Borderless Networks Value Proposition

Welcome to the era of the anywhere worker

Networking for a smarter data center: Getting it right

INDIA The Changing Face of the Workplace: Going Light and Mobile

Preparing your network for the next wave of innovation

Why Enterprises Need to Optimize Their Data Centers

SD-WAN Solution How to Make the Best Choice for Your Business

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Market Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

The future of UC&C on mobile

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

Video Conferencing & Skype for Business: Your Need-to-Know Guide

Six Questions to Answer When Buying a Phone System

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced.

Hybrid Cloud for Business Communications

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Design and deliver cloud-based apps and data for flexible, on-demand IT

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

Consumer Opinions and Habits A XIRRUS STUDY

Mobility Solutions Extend Cisco Unified Communications

Enterprise Mobility Management

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Cisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency

A Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst

Securing Health Data in a BYOD World

2018 Mobile Security Report

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

A Software-Defined WAN is a Business Imperative

to know about Microsoft Teams

Converged Infrastructure Matures And Proves Its Value

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

Network Access Control

SOLUTION BROCHURE. Mobility Changes Everything

As Enterprise Mobility Usage Escalates, So Does Security Risk

Five Tips to Mastering Enterprise Mobility

THE STATE OF IT TRANSFORMATION FOR RETAIL

Trustlook Insights Q BYOD Trends & Practices

THE ESSENTIAL GUIDE: SELECTING A CLOUD COMMUNICATIONS PROVIDER

Mobilizing Your Workforce for Success

Why is Office 365 the right choice?

Skype for Business Users: 18 Things to Know about Microsoft Teams for 2018

Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE:

ALCATEL-LUCENT OPENTOUCH SUITE FOR SMALL AND MEDIUM BUSINESSES Simplify your communications and maximise your business

Clients for Unified Communications

Accelerate Your Enterprise Private Cloud Initiative

Transformation Through Innovation

Application Aware Network

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Top Network Considerations for Enterprise Mobility and BYOD

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Video conferencing FAQ: A buyer s guide

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

Dell helps you simplify IT

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Delivering the Wireless Software-Defined Branch

WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL

Sales Presentation Case 2018 Dell EMC

A Guide To Evaluating Desktop Virtualization Solutions

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Securing Today s Mobile Workforce

WHITEPAPER. How to secure your Post-perimeter world

The office for the anywhere worker!!! Your LCB SOFTPHONE: A powerful new take on the all-in-one for a more immersive experience.

Connectivity to Cloud-First Applications

SD-WAN: A Simplified Network for Distributed Enterprises

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET

ENTERPRISE MOBILITY TRENDS

Choosing the Right Cloud Computing Model for Data Center Management

What is SD WAN and should I know or care about it? Ken LaMere Ecessa

BYOD... or CYOD? 2 BILLION 5 BILLION. The Choice is Yours MOBILE DEVICES WORLDWIDE BY 2015 MOBILE DEVICES WORLDWIDE BY 2020

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

I D C T E C H N O L O G Y S P O T L I G H T

What to Look for in a Partner for Software-Defined Data Center (SDDC)

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Virtualization: For Victory Over IT Complexity ABERDEEN GROUP

Get your business Skype d up. Lessons learned from Skype for Business adoption

Modern Database Architectures Demand Modern Data Security Measures

Transcription:

BYOD: Focus on User Experience, Not the Device May 2012 Prepared by: Zeus Kerravala

BYOD: Focus on User Experience, Not the Device by Zeus Kerravala May 2012 º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º º Introduction: Leveraging Networks for Scalable, Reliable BYOD ZK Research A Division of Kerravala Consulting A perfect storm is the coming together of several forces to create a single, unstoppable force. Several forces in corporate IT are rapidly coming together to create the biggest transition since the birth of the mainframe the shift to consumerized IT. This is similar to the shift that occurred in the late 1990s when the Internet exploded: Low-cost PCs, home broadband, the development of the browser and Windows came together and created a perfect storm that transformed computing forever (see Exhibit 1, below). The shift to consumerized IT will finally let IT fulfill its vision of being able to deliver any application or service to any worker using any device over any network. This shift will be driven by the following trends: Cloud computing: Makes applications and IT resources location-independent, giving workers a consistent user experience no matter where they are. Device evolution: Devices have evolved more in the past five-year period than any other period since the birth of computing. Today s mobile devices have high quality, multimedia interfaces that allow workers to perform any task when out of the office. These new devices have the power to transform the way people work, but only if they have access to corporate tools and applications. Wireless advancements: Historically, workers had to choose between the convenience of wireless and the performance of wired. However, the commercial availability of 4G cellular services and the ratification of 802.11N Wi-Fi lowered this barrier. Although Wi-Fi is still a shared medium, the technology has advanced enough to give a similar experience to wired if the design of the network is done correctly. Evolution of virtualization: Virtualization has the power to decouple an IT resource from the physical platform it resides on. This becomes increasingly important as more and more applications move into a hybrid cloud environment and consolidation, ease of management, upgrades and deployment of new capabilities can be realized. Worker mobility: The number of mobile workers has steadily increased yearover-year. A recent ZK Research study shows 55 percent of workers spend more than 20 percent of their work day away from their primary work location. This puts emphasis on provisioning true mobility, which enables a worker to access any application from any device, vs. portability, which enables the worker to use a single device in all places to access corporate information. One more significant trend is driving the industry toward a consumerized IT model: This is the growing demand for bring-your-own-device (BYOD), where workers bring personal devices to work and use them for business purposes. BYOD has created tremendous media attention over the past few years, and it s progressed to the point that all IT departments must prepare for in it the near future. zeus@zkresearch.com Cell: 301-775-7447 Office: 978-252-5314 Influence and insight through social media

BYOD: Focus on User Experience, Not the Device 3 Exhibit 1: The IT Perfect Storm The rise of the cloud Device evolution Virtualization evolution Wireless advancements Growing number of mobile workers Bring-your-owndevice (BYOD) Section II: The Time for BYOD is Now About a decade ago all corporate technology was procured, provisioned and managed by the IT department. During this era, the technology used in the workplace was far superior to anything found in workers homes, so it was natural for workers to rely on their company s IT department to provide the best technology to help workers do their jobs. However, as people became more technically savvy and consumer technology companies started to get more competitive with one another, the perception that workplace technology was superior to consumer technology started to fade. Although many companies do not have formal BYOD policies, consumer technologies are alive and rampant in the workplace. Exhibit 2, below, shows data from a recent ZK Research survey, where workers were asked about the use of consumer technology in the workplace. The results show just how in-demand consumer devices are by workers. Consumer devices are designed for use outside corporate walls, and work very well in those environments. Putting consumer-grade devices in the enterprise will put a new strain on the device and the supporting infrastructure. For example, a single tablet on a home network works well because the competition for resources with other applications and devices is low. The same device in a company network may have to compete for bandwidth with hundreds of other consumer devices, making the experience less satisfying. IT infrastructure needs to be sufficient to support today s IT environment, but also for the massive number of consumer devices coming into the corporate network.

BYOD: Focus on User Experience, Not the Device 4 Exhibit 2: In the Context of Workplace Productivity, Rate Your Agreement With the Following Agree or strongly agree I am afraid of new technology 14% My work must be done at the office My personal tech is better than my workplace tech I would be more productive with access to my home apps My workplace encourages remote working 44% 49% 54% 59% I can work from anywhere I am more productive than two years ago 77% 83% The survey reveals some interesting data points that support the push to BYOD: Only 14 percent of workers say they fear new technology. Mobile phones, the Web and other technology have become integrated into the very fabric of our lives, so the majority of people today have no fear of new technology. In fact, much of the younger generation embraces new technology at a rate far faster than ever before. A staggering 49 percent of workers feel that their personal technology is better than what they have in the workplace. This perception will push workers to use consumer technologies faster than before. More than half 54 percent of workers feel they are more productive with access to home applications, and 83 percent are of the opinion they are more productive than two years ago. It s difficult to quantify whether consumer devices and applications actually make workers more productive, but most users seem to feel they do. Workers want to be as productive as they can be, and companies that do not allow the use of consumer technologies can stifle worker productivity. On average, workers use four consumer technologies as part of their business toolkit already, so BYOD is well underway. The mix of consumer technologies ranges from file sharing applications, to social networking tools, to smart phones to consumer chat (Exhibit 3). The current worker toolkit is more diverse and complex than ever. The fact that workers are manufacturing their own BYOD programs makes it essential for IT departments to develop their own as soon as possible.

BYOD: Focus on User Experience, Not the Device 5 Exhibit 3: End-User Toolkit Then and Now Toolkit then Toolkit now Laptop Collaboration software Laptop Collaboration software Desktop video Smart phone Desktop sharing Cloud Tablet Section III: The Benefits of BYOD Historically CIOs and IT leaders have been hesitant to move forward with a formal BYOD policy, as conventional wisdom considers it risky. However, with demand for BYOD as high as it is, it s possible that staying with the status quo and not moving to BYOD is a bigger risk than implementing it. The increased risk of not having a BYOD strategy stems from users bringing devices in, with or without a formal policy, and creating more security issues. This is one of the reasons why IT support of BYOD has reached the level it has. ZK Research finds that only 18 percent of companies do not support BYOD (see Exhibit 4). The other 82 percent vary from limited support to full support. Exhibit 4: Company Attitude on use of Consumer Technologies What is your company's attitude on the use of consumer technologies? Do not allow any consumer devices We allow it but provide no support Consumer devices allowed with limited support Allowed with full IT support 18% 23% 20% 39% No tolerance High acceptance

BYOD: Focus on User Experience, Not the Device 6 Companies that choose to support a BYOD policy will recognize the following benefits: Greater employee productivity: Workers are more comfortable using a favored and familiar device rather than one that has been deemed a corporate standard. Allowing workers to use a device of their own choosing means they will work more often in more places, bringing corporate productivity to new heights. Better collaboration across the extended enterprise: Competitive advantage today is dictated by harnessing the power of the entire extended organization. This puts an emphasis on workers being able to collaborate with others inside and outside of the organization. BYOD allows workers to use mobile devices to collaborate better, even when out of the office. Consistent user experience across corporate and personal devices: The influx of hundreds or thousands of multimedia-capable personal devices can have a negative impact on user experience, because of the additional network capacity required to support them. A formal BYOD policy can help IT managers understand the impact of BYOD and upgrade the infrastructure, where necessary, to ensure a consistent user experience for everyone. Enhanced customer experience and relationships: Employees are accessible and productive wherever they are, and can also respond quickly and easily to customer needs Improved employee satisfaction: Users want to work in progressive organizations that enable employees to be as productive as possible. Companies that deny employee use of personal devices will see an increase in the churn of employees to more progressive companies. IT can still maintain the security and control it needs to protect the business: While BYOD does change the role of IT, the IT department still needs to ensure the company is protected. A formal BYOD policy can give IT the necessary visibility and access control into the network, and an understanding about how devices are used. The devices may be owned by the employee, but IT needs centralized management tools to protect the employee and the company. For most companies, BYOD is more a matter of when, rather than if. Even if IT departments are steadfastly against BYOD, it s likely another corporate leader will push for this initiative in the near future. To prepare, IT must fully understand the scope of BYOD. Section IV: BYOD is About More Than On-Boarding Devices Implementing a company program to support personal devices is a multifaceted problem. Many organizations ZK Research interviewed recently are focused on the on-boarding process, ensuring the device can attach to the corporate network. While this is an important component, it s not the only consideration for BYOD. The following is a list of key issues that must be overcome to implement BYOD: Security: This is among the biggest challenges for any BYOD implementation. IT involves not only securing the device but also the data that resides on the device. Security tools like secure VPN access, URL filtering and data leak prevention are critical to ensuring the protection of the company and workers. Mobile device management: This includes discovering, managing and inventorying mobile devices. Today, users carry an average of 2.5 devices as part of their worker toolkit. ZK Research estimates this ratio will grow to six devices per user within five years Network access control: This means controlling access to the network with policies, including preadmission endpoint security checks and postadmission controls. This limits where users and devices can go on a network, and what they can do. Seamless user experience across wired and wireless networks: BYOD drives the need to deliver more applications to more workers in more places. However, this can t be at the expense of a high-quality user experience. IT must deliver an experience consistent with any device, whether wired or wireless (see Exhibit 5). Compliance issues: The ability to work from anywhere may sound great, but there are many compliance issues, particularly in heavily regulated industries. IT leaders must be concerned with content users can access in which locations, and be able to allow or deny it as policy dictates. Additionally, device profiling and fingerprinting, and the ability to track every device on the corporate network, becomes an important compliance and/or regulatory concern. Network capacity: Having thousands of multimedia devices hit the network suddenly can play havoc on a network. Many of these devices enable real-time peer-to-peer video conferencing, causing unpredictable traffic flows.

BYOD: Focus on User Experience, Not the Device 7 Exhibit 5: BYOD Requires a Single Network with Pervasive Experience Any application Any device Email Tablet Pervasive wireless Wired edge Laptop Desktop video Wired core Smart phone Vertical device Unified features M2M Voice Social networking Network visibility: No matter how extensive the planning for BYOD is prior to deployment, problems will occur. When problems occur, IT must have visibility into network traffic flows to quickly isolate, identify and remedy the problem. Network visibility can also help address the BYOD complexity chasm (see Exhibit 6). Granular network access: IT must set up different levels of network access to accommodate employees, contractors, guests, business partners and others that require it. Emergency service capabilities: Workers need the ability to make emergency calls from any consumer device, such as E-911 in the U.S., when on the corporate network. The challenge is to be able to find a caller anywhere on campus in the event of an emergency call. This is best done with a network-based solution, since the network is the only resource that will always know where the user is. It s important that IT leaders have a clear understanding of the full scope of what needs to be done to implement BYOD. On-boarding devices is the first step in the process but other issues, such as security authentication, are just as important.

Endpoints on network BYOD: Focus on User Experience, Not the Device 8 Exhibit 6: The BYOD Building Blocks Cloud computing BYOD MDM Virtualization Mobile apps Complexity chasm Wireless access UC IT budgets Building blocks of BYOD Section V: What to Look For In a Solution Provider Consumerization is here, and it s critical that all companies aggressively adopt BYOD. There are many ways to tackle the BYOD challenge, but ZK Research finds a network-based approach provides the best scalability: The network is the single resource that is pervasive, and under IT control. Trying to manage BYOD from an end point under user control will not scale. Choice of a network vendor to help implement a BYOD solution should be made carefully, and not based just on vendor incumbency. The following are key criteria for evaluating a BYOD solution provider: Unified wired/wireless access: When configuring security policies or managing the network, it s important that the experience is the same across wired or wireless networks. To manage wired and wireless networks as one network, instead of two separate ones, requires a unified view. Unified wireless can simplify administration, make managing the entire network easier and create a better, seamless user experience for the worker. Security integrated into the network: This is critical for companies of all sizes. Managing security from the network allows IT to protect the company without having to touch every end point. User roles, network access control, URL filtering, antivirus and data-leak prevention are critical security services. Vendor-agnostic: While the ideal scenario is to deploy an end-to-end solution, it s likely most networks have at least one other vendor. The solution provider must integrate with existing infrastructure so a full rip-and-replace of existing network devices is not required. High availability and reliability: No matter how redundant networks are, problems occur. Ensure the solution is highly reliable and has high availability options. Basic features should include fallback and fail open, to permit some network access in case of availability issues. Robust unified communications (UC) portfolio: A primary driver of BYOD is to enable workers to collaborate better with one another, with customer, and with partners. A robust UC suite with features such as VoIP, mobile clients, chat, presence, conferencing and video can take corporate collaboration to the next step, allowing individuals to interact with anyone, any time. The UC solution should be centralized, and provide enterprisewide communications. Broad range of managed and professional services: For most organizations, BYOD will be a new initiative and require skills that are not presently in-house. Using a solution provider with a broad range of services can help IT bridge the skills gap and enable a risk-free deployment.

BYOD: Focus on User Experience, Not the Device 9 Section VI: Conclusion and Recommendations BYOD was once considered a high-risk initiative that served only a few technically savvy workers. However, the evolution of devices, integration of technology into personal lives, availability of cloudbased services and wireless evolution has moved BYOD from vision to a reality. Organizations that formally adopt BYOD will lower the overall cost of running IT, enable new ways of working, and improve the overall experience for every individual in the extended enterprise. It s important for IT departments to act with a degree of urgency to avoid falling behind competitively. To get started, ZK Research recommends the following: Embrace BYOD now: BYOD has the power to change the way people work. Instead of looking at consumer technologies as taboo and trying to prohibit usage, put in the proper controls to enable BYOD. Otherwise, users will find their own solutions, potentially creating serious management and security challenges. Put a formal BYOD employee policy in place: The reality of today s environment is that regardless of policy, employees will find a way to bring personal devices into the workplace. This is an inevitable trend and ignoring it will lead to greater risk and poor user experience, frustrating employees. A formal policy will allow IT to stay in front of BYOD, making the user experience secure and high-quality. Build BYOD on a rock-solid network foundation: The network is the best platform to build a BYOD solution on. Assess the readiness of the network to support BYOD (security assessment, ability to scale to accommodate mobile growth, etc.). Deploy a solution with a highly scalable wireless and wired edge that terminates into a wired network capable of handling traditional user data as well as voice and video traffic. Focus on user experience, not the device: It s easy to be fixated on the device when thinking about BYOD. However, it s more important to focus on delivering a high-quality user experience, as this will have the biggest impact on worker productivity. This includes security, compliance, network visibility, management and application optimization. This will make IT BYOD heroes within their organization. : A Division of Kerravala Consulting All rights reserved. Reproduction or redistribution in any form without the express prior permission of ZK Research is expressly prohibited. For questions, comments or further information, e-mail zeus@zkresearch.com.