SlideShare uma empresa Scribd logo
1 de 14
8 Best Practices For Enabling
Employee-0wned Smartphones
in the Enterprise
Embrace Consumerization



  CONSUMERIZATION OF IT:
  Employees want to use
  personal devices to do their jobs.



 Intel IT recognizes that employees want access to information
 and applications from anywhere and at any time, so that they can
 work in more flexible and productive ways.
Enable Consumerization

 By taking advantage of:




           Internet                                   Cloud
         Connectivity         Virtualization        Computing

      Intel is redefining services we provide to our employees.

  We have identified eight best practices for creating a personal
       device program that meets our security standards.


For more information:
Best Practices for Enabling Employee-owned Smart Phones in the Enterprise
Engage Stakeholders
     Early in the Planning Process


Integrating employee-owned
devices into our IT environment
involved many different groups
across Intel. We identified a team
of stakeholders from human resources,
legal, and engineering—plus stake-
holders from privacy and corporate
services teams.

We were able to successfully collaborate
and accomplish our goals due to the
wide variety of collaboration tools
we have available.
Engage End Users



One of our goals in integrating consumer devices into the enterprise
was to increase employee productivity and job satisfaction.

To find out what our employees wanted, we engaged with
them directly by using an internal blog to discuss the
new IT consumerization policy. More than 8,000
employees responded. Response was so enthusiastic
that we extended the blog conversation from one
month to six months.
Develop a Security Model



                       Before Intel IT could allow employee-
                       owned devices in the enterprise, we
                       needed to better protect our data
                       and intellectual property.

              We developed a security model that provides
              appropriate protection for different levels of Intel
              data. We also developed a system for supporting
              smartphones in the Intel factory environments,
              which require special consideration and
              extra security.
Decide Which
     Devices to Support

We determined which devices to support and how to enable services
effectively. Factors included device evaluation, a certification process,
associated costs, available service plans, and support models.

With an eye to the future, Intel IT continues to evaluate emerging
technologies with a variety of alternative form factors. Our goal is to
provide seamless access to enterprise resources
from multiple devices while maintaining
security in a cost-effective way.
Address Legal and
     Human Resource Concerns

Giving employees access to corporate resources from personal devices raises
important legal, human resources, and policy concerns.

Intel IT created a service agreement that employees and managers must
agree to before participating in the program.

The relevant controls are practical, achievable, and enforceable.
Enable Required Technologies



We addressed the technological requirements of
the program by designing a physical infrastructure
to support it and by creating a web portal that
employees could use to order services.

Once these pieces were in place, we ran a pilot
project to test and fine-tune the program,
and we provided training to users, managers,
and support personnel.

The pilot results were encouraging.
Participation was high, and participants
reported being very satisfied with the program.
Plan the Deployment



For deployment, we verified that capacity was sufficient to meet
demand and established critical success and operational indicators.

We also created a communications
plan using a variety of channels,
including newsletters and social
media. Our messages informed
employees about the program
launch, provided a schedule, and
explained program eligibility and
the service agreement.
Stay Up-to-Date
     with Changing Technology

It is important that we keep pace with technological changes and
understand how they affect the integration of personal devices into
the enterprise.

We continually update our resources—modifying the employee agreement as
needed, updating the web portal, certifying new operating systems, adding
new services, and deploying alternative form factors. For example, we’re
developing a roadmap to allow smartphones to connect to the enterprise
Wi-Fi network.
Results and Benefits
Implementing personal devices has resulted
in significant benefits for employees and IT.
 – Increased productivity

 – Enhanced flexibility

 – Improved employee satisfaction

 – Relatively low costs to Intel IT

 – No impact on support

 – Improved business continuity

 – Better security and loss prevention



For more information:
Best Practices for Enabling Employee-owned Smart Phones in the Enterprise
Intel IT is passionate about driving business
value through innovation and sharing IT best
              practices with our industry peers.

                    Learn more about Intel IT
                             at: Intel.com/IT
8 Best Practices for Enabling Employee-Owned Smartphones

Mais conteúdo relacionado

Destaque

Sistem pelayanan publik
Sistem pelayanan publikSistem pelayanan publik
Sistem pelayanan publik
Aria Suyudi
 

Destaque (15)

ICO Media - Media relations solution
ICO Media - Media relations solutionICO Media - Media relations solution
ICO Media - Media relations solution
 
Manfaat dan pentingnya cuci tangan pakai sabun di
Manfaat dan pentingnya cuci tangan pakai sabun diManfaat dan pentingnya cuci tangan pakai sabun di
Manfaat dan pentingnya cuci tangan pakai sabun di
 
Presentation2 cba case domino pizza
Presentation2 cba case domino pizzaPresentation2 cba case domino pizza
Presentation2 cba case domino pizza
 
Producing for indies
Producing for indiesProducing for indies
Producing for indies
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
Stop Crying Start Trying
Stop Crying Start Trying Stop Crying Start Trying
Stop Crying Start Trying
 
ABCDE
ABCDEABCDE
ABCDE
 
Jurupa talent mapping overview
Jurupa talent mapping overviewJurupa talent mapping overview
Jurupa talent mapping overview
 
Kebijakan penurunan aki akb dinas kesehatan provinsi sulawesi barat 27 11_2016
Kebijakan penurunan aki akb dinas kesehatan provinsi sulawesi barat 27 11_2016Kebijakan penurunan aki akb dinas kesehatan provinsi sulawesi barat 27 11_2016
Kebijakan penurunan aki akb dinas kesehatan provinsi sulawesi barat 27 11_2016
 
ИБ АСУ ТП NON-STOP. Серия 1. Архитектура и основные компоненты АСУ ТП с точки...
ИБ АСУ ТП NON-STOP. Серия 1. Архитектура и основные компоненты АСУ ТП с точки...ИБ АСУ ТП NON-STOP. Серия 1. Архитектура и основные компоненты АСУ ТП с точки...
ИБ АСУ ТП NON-STOP. Серия 1. Архитектура и основные компоненты АСУ ТП с точки...
 
Profil puskesmas 2015
Profil puskesmas 2015Profil puskesmas 2015
Profil puskesmas 2015
 
STUDI TENTANG PENGUKURAN DAN PEMETAAN KADASTRAL PADA PELAKSANAAN PRONA TAHUN ...
STUDI TENTANG PENGUKURAN DAN PEMETAAN KADASTRAL PADA PELAKSANAAN PRONA TAHUN ...STUDI TENTANG PENGUKURAN DAN PEMETAAN KADASTRAL PADA PELAKSANAAN PRONA TAHUN ...
STUDI TENTANG PENGUKURAN DAN PEMETAAN KADASTRAL PADA PELAKSANAAN PRONA TAHUN ...
 
Sistem pelayanan publik
Sistem pelayanan publikSistem pelayanan publik
Sistem pelayanan publik
 
Surveilans Epidemiologi Penyakit Diare Di Wilayah Puskesmas Pasayangan Martapura
Surveilans Epidemiologi Penyakit Diare Di Wilayah Puskesmas Pasayangan MartapuraSurveilans Epidemiologi Penyakit Diare Di Wilayah Puskesmas Pasayangan Martapura
Surveilans Epidemiologi Penyakit Diare Di Wilayah Puskesmas Pasayangan Martapura
 
HubSpot landing analysis
HubSpot landing analysisHubSpot landing analysis
HubSpot landing analysis
 

Mais de IT@Intel

It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshare
IT@Intel
 

Mais de IT@Intel (14)

IT@Intel: Creating Smart Spaces with All-in-Ones
IT@Intel:  Creating Smart Spaces with All-in-OnesIT@Intel:  Creating Smart Spaces with All-in-Ones
IT@Intel: Creating Smart Spaces with All-in-Ones
 
Unlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsUnlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and Analytics
 
Intel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIntel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformation
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the Go
 
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting:  Introducing the Intel Video PortalEnterprise Video Hosting:  Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video Portal
 
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyHow to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
 
Jamming on Collaboration
Jamming on CollaborationJamming on Collaboration
Jamming on Collaboration
 
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelDeploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
 
Nurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessNurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through Mindfulness
 
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsEvaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshare
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security Survive
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

8 Best Practices for Enabling Employee-Owned Smartphones

  • 1. 8 Best Practices For Enabling Employee-0wned Smartphones in the Enterprise
  • 2. Embrace Consumerization CONSUMERIZATION OF IT: Employees want to use personal devices to do their jobs. Intel IT recognizes that employees want access to information and applications from anywhere and at any time, so that they can work in more flexible and productive ways.
  • 3. Enable Consumerization By taking advantage of: Internet Cloud Connectivity Virtualization Computing Intel is redefining services we provide to our employees. We have identified eight best practices for creating a personal device program that meets our security standards. For more information: Best Practices for Enabling Employee-owned Smart Phones in the Enterprise
  • 4. Engage Stakeholders Early in the Planning Process Integrating employee-owned devices into our IT environment involved many different groups across Intel. We identified a team of stakeholders from human resources, legal, and engineering—plus stake- holders from privacy and corporate services teams. We were able to successfully collaborate and accomplish our goals due to the wide variety of collaboration tools we have available.
  • 5. Engage End Users One of our goals in integrating consumer devices into the enterprise was to increase employee productivity and job satisfaction. To find out what our employees wanted, we engaged with them directly by using an internal blog to discuss the new IT consumerization policy. More than 8,000 employees responded. Response was so enthusiastic that we extended the blog conversation from one month to six months.
  • 6. Develop a Security Model Before Intel IT could allow employee- owned devices in the enterprise, we needed to better protect our data and intellectual property. We developed a security model that provides appropriate protection for different levels of Intel data. We also developed a system for supporting smartphones in the Intel factory environments, which require special consideration and extra security.
  • 7. Decide Which Devices to Support We determined which devices to support and how to enable services effectively. Factors included device evaluation, a certification process, associated costs, available service plans, and support models. With an eye to the future, Intel IT continues to evaluate emerging technologies with a variety of alternative form factors. Our goal is to provide seamless access to enterprise resources from multiple devices while maintaining security in a cost-effective way.
  • 8. Address Legal and Human Resource Concerns Giving employees access to corporate resources from personal devices raises important legal, human resources, and policy concerns. Intel IT created a service agreement that employees and managers must agree to before participating in the program. The relevant controls are practical, achievable, and enforceable.
  • 9. Enable Required Technologies We addressed the technological requirements of the program by designing a physical infrastructure to support it and by creating a web portal that employees could use to order services. Once these pieces were in place, we ran a pilot project to test and fine-tune the program, and we provided training to users, managers, and support personnel. The pilot results were encouraging. Participation was high, and participants reported being very satisfied with the program.
  • 10. Plan the Deployment For deployment, we verified that capacity was sufficient to meet demand and established critical success and operational indicators. We also created a communications plan using a variety of channels, including newsletters and social media. Our messages informed employees about the program launch, provided a schedule, and explained program eligibility and the service agreement.
  • 11. Stay Up-to-Date with Changing Technology It is important that we keep pace with technological changes and understand how they affect the integration of personal devices into the enterprise. We continually update our resources—modifying the employee agreement as needed, updating the web portal, certifying new operating systems, adding new services, and deploying alternative form factors. For example, we’re developing a roadmap to allow smartphones to connect to the enterprise Wi-Fi network.
  • 12. Results and Benefits Implementing personal devices has resulted in significant benefits for employees and IT. – Increased productivity – Enhanced flexibility – Improved employee satisfaction – Relatively low costs to Intel IT – No impact on support – Improved business continuity – Better security and loss prevention For more information: Best Practices for Enabling Employee-owned Smart Phones in the Enterprise
  • 13. Intel IT is passionate about driving business value through innovation and sharing IT best practices with our industry peers. Learn more about Intel IT at: Intel.com/IT

Notas do Editor

  1. JLG: Janet approved!
  2. Janet approved!
  3. Janet approved!
  4. Janet approved!Enabling Global Collaboration with Intel-based Infrastructure http://communities.intel.com/docs/DOC-6083
  5. Janet approved!Benefits of Enabling Personal Handheld Devices in the Enterprise http://communities.intel.com/docs/DOC-6553In response to employee interest in using their own devices at work, Intel IT began to allow employees to use personal smartphones to access enterprise resources in early 2010. The program has become a rapid success, delivering a variety of benefits to both employees and the corporation. We invite you to learn more about our IT sustainability initiatives at Intel IT best practices
  6. Janet approved!Maintaining Information Security While Allowing Personal Hand-Held Devices in the Enterprise http://communities.intel.com/docs/DOC-5779 Enabling Smart Phones in Intel’s Factory Environmenthttp://communities.intel.com/docs/DOC-18963
  7. Janet approved!Preparing the Enterprise for the Impact of Alternative Form Factors http://communities.intel.com/docs/DOC-6833
  8. Janet approved!
  9. Janet approved! – Fixed the gray box!
  10. Janet approved!
  11. Janet approved!Preparing the Enterprise for the Impact of Alternative Form Factors http://communities.intel.com/docs/DOC-6833
  12. Janet approved!
  13. Janet approved!