SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
EMPLOYEE OWNED DEVICE
AND THE MOBILE WORKSPACE
A Verizon and Cisco Perspective

In collaboration with
Contents
Executive summary ................................................................................................................................ 1
EOD is maturing – fast............................................................................................................................ 2
Unlocking the intrinsic value of EOD...................................................................................................... 4
IT need not be a barrier to growth ........................................................................................................ 4
Security and compliance ........................................................................................................................ 6
Network intelligence – the “IP” is the key ............................................................................................. 6
Cost and allocation ................................................................................................................................. 7
Supporting the EOD environment ......................................................................................................... 7
Developing a robust win-win strategy ................................................................................................... 8
Conclusion .............................................................................................................................................. 9
About Verizon Enterprise Solutions ....................................................................................................... 9

P a g e | Contents
This paper, commissioned by Verizon and Cisco, examines
the Employee Owned Device phenomenon in Europe,
focusing on the factors that are driving adoption and the
key considerations you’ll face when planning your EOD
strategy.
Users demand the freedom, spontaneity and
availability of mobile and portable devices, in
reality, their demand to work where they want to
and how they want to, is outstripping the pace at
which many businesses choose to react. If
allowed to use the devices, applications and cloud
services they prefer, and the time and location for
work, employees have the potential to drive the
next wave or corporate efficiency and
productivity.
Both Forrester and Gartner have identified
consumerisation of IT as possibly the decade’s
most disruptive trend. It is a trend which simply
cannot be ignored.

Executive summary
Successive generations of technologies are forcing
their way into the workplace in response to user
demand, economic pressures and the overriding
desire for competitive advantage.
Many
enterprises are starting to translate such
disruption in to opportunity.
There is no greater example of this than the EOD
phenomenon, which allows employees to choose
which devices they prefer to use at work, just as
they do in their personal lives.

Implemented effectively, harnessing the benefits
of intelligent personal devices within the business
environment can bring significant benefits for the
enterprise in terms of reduced hardware costs and
greater flexibility for the employee, resulting in
improved operational efficiencies, productivity
and staff satisfaction and retention.
Ignored, implemented poorly or in a fragmented
fashion, EOD has the ability to become that badly
behaved child, demanding huge investments in
time, risk management and IT infrastructure;
trying to keep one step ahead of this disruptive
force can result in a series of tactical ‘dead ends’
that has the ability to disrupt the enterprise at all
levels.

Page |1
Average Number of Connected Devices per Knowledge Worker, 2012 and 2014

2012

2014

3.2
2.8

3.2

2.9

2.7

2.6

2.3

2.3

2.2
1.8

Total

U.S.

U.K.

Germany

2.4

2.3
2.0

France

1.8

Russia

3.1

3.0

2.8
2.3

2.5

1.8

China

India

Mexico

Source: Cisco IBSG, 2012

Brazil

N = 4,892

42% of smartphones and 38% of laptops used in the workplace are now employee-owned.
By 2016, 66% of the mobile workforce will own a
smartphone and 40% of the global workforce will
be mobile (Gartner research 2012). The average
number of individual devices per user in the
enterprise is on the rise across the globe.
EOD is here to stay. Steps must be taken to
ensure companies are addressing EOD securely
and effectively. Old IT models will mature to the
point where they are rendered an historical
footnote. The pace of innovative change and the
dynamics of global competition have created a
new
reality
for
many
organisations.
Organisational structures are increasingly
collaborative
and
their
complexity
is
commensurate with that change.
Myriad
pressures are changing the relationship between
business, technology and the IT organisation.
As the lines between personal and professional
lives blur, security is no longer just a question of
how to keep people out; it is also a question of
how to let people in. IT has to balance security
and enablement; IT has to bridge the gap between
the pace of user demand and the protection of the
organisation.
By cultivating EOD with effective management
and governance, companies can move from
merely reacting to the disruption to harnessing a
potent source of value.

EOD is maturing – fast
According to research by Gartner, half of the
world’s companies will seek their workers to
individually provide devices for work by 2017.
According to Ovum’s EOD research study, 56.8%
of employees are using a personal device as part
of their professional activity. Compared to the
previous edition of the survey, conducted in 2012,
the practice of EOD among professionals is
globally stable for a year. Over a third of
employees are using their personal device to do
work without informing the IT department. The
number of employees using tablets has increased
from 28.4% to 44.5% in the last 12 months,
suggesting that businesses increasingly see these
devices on their networks.
Many organisations are trying to stay ahead of the
demand curve therefore, and are finding
innovative responses to the changing mobility
landscape. However, in Europe especially, EOD
has been viewed as something that was
‘happening to’ the organisation, that naughty
child, without operational controls, disturbing the
status quo, by gaining access to IT assets without
an agreed framework. The reaction to this

Page |2
has been defensive, a fragmented guardian of IT
security, driven by technology, often developed in
isolation from the business.
Many European IT leaders have been reluctant to
support
EOD
among
their
employees
consequently; they are seeing fewer employeeowned devices and a spike in non-approved
applications. In short, they are reacting to
minimise the threat rather than embracing it in
order to improve the freedom of their employees
to work the way they prefer.
This has created a gap between the business need
and the IT resolution. This potential gap has
resulted in many organisations failing to realise
the benefits available from EOD as the employee
usage and demand outstrips the enterprises
appetite and willingness to react. Denial and

subsequent reactive defence are the usual starting
point as an organisation wrestles with the EOD
challenge. To embark on this journey with a
tactical armoury may well solve tactical
technology problems today, but winning
businesses stop, think, evaluate then select the
smartest strategic plan, maximising the EOD
opportunity now and for the future.
European enterprises could suffer in comparison
to those in competing countries that are using
EOD to realise employee-driven improvements in
productivity, collaboration and execution.
Tangible benefits are only realised as the
organisation achieves acceptance and develops a
workplace strategy that respects EOD as a
valuable business driver and aligns proactively
with the opportunity.

“EOD is maturing faster than many companies can address or benefit from it”

Page |3
Unlocking the intrinsic value of EOD
EOD is not just a tactical problem deserving of a
purely technical solution.
While the smart
response to it involves a heavyweight technical
understanding and ability to deliver specialist
technical solutions, it is clear that we are dealing
with a strategic business issue, which demands a
strategic solution.

With EOD, the enterprise can benefit from the
greater agility and improved productivity an
increasingly
mobile
workforce
provides.
Employees used to enjoy better technology at
work than they had available to them at home.
With the advent of smart devices this has
reversed, giving rise to the demand of EOD delivering improved employee productivity,
satisfaction and retention, as it corresponds more
closely with the way in which they want to live
and work. Customers and suppliers benefit too, as
the business is able to respond more quickly and
effectively to the changing needs of the entire
supply chain.

Doing nothing is not an option, yet some
businesses are doing just that in the face of the
EOD challenge. There are a growing number of
businesses in Europe who recognise the need to
act now to catch up with employee demand. And,
of those, some are reacting to the inevitable while
others are embracing it as a primary catalyst for
strategic business growth.

These benefits are only unlocked as measurable
value when the EOD challenge is ‘reframed’ into
positive thinking. If only defensive technology
tactics are employed then the bigger picture and
subsequent tangible benefits are diluted – or
worse - destroyed in the mix.

In short, only Enterprises that have an actionable
strategy which not only supports but leverages
this growing demand, will ever be able to unlock
the intrinsic value of the EOD opportunity.

IT need not be a barrier to growth
“On average, 60% of employees use a mobile device for work — 13% more than are
officially considered mobile workers”
Designated Mobile Worker

Use Mobile Device for Work
69%

67%
60% 58%
47%

Total

58%
47%

U.S.

U.K.

50%
42%

52%
40%

Germany France

55%

63%

59%

57%
51%

44%

48%

46%

37%

Russia

China

India

Mexico

Brazil

“60% of companies said that their users connect to their network with devices from outside
the office, and more than 40% of companies do the same from inside the office”

Page |4
The consumerisation of technology and hardware,
coupled with employee demand means that the
EOD phenomenon continues to spread with or
without IT. It has long been the case that many
non-approved devices are introduced by
executives within a business, regardless of existing
IT protocols. Many were able to bypass policy, get
connected and be supported.
Therefore, it is unsurprising that most executive
and management levels within a business are fully
behind EOD, top down. Their employee base is
driving demand from the bottom up. The result is
simply put: IT is getting squeezed and is expected
to find a way to make it work.
Any discussion regarding EOD usually elicits
concerns regarding data security, risk and
compliance: often not with consideration of the
benefits that new strictures of policy bring, but as
a barrier to adoption. Most employees who own
smartphones (67.8%) bring these devices to work,
and 15.4% of those numbers do this without the
knowledge of IT, and one fifth do so by
challenging the rules of company’s anti-EOD
policy.

The thread that runs through is that IT is not
always keeping up with the changing demands
and behaviour patterns of the new mobilised,
consumerised workforce.
If employees are
sourcing their own applications to do their job,
then it could be that the enterprise and IT
specifically is not delivering the right tools or a
user experience for its employees.
Mobility has become a mainstream event for
nearly all enterprises and so too have the
complexities for infrastructure which come with it.
EOD and employee demands, plus user app
fragmentation are growing at such a pace, that
many companies find that their infrastructural
capabilities are being stretched to the limit. In
response, some businesses are now looking to
utilise cloud based services to, for example,
provide mobile device management and private
app stores for their workforce. This is a part of a
natural progression to enterprise mobility as a
service (EMaaS) – a move which relocates most or
all of the services normally provided by IT internal
systems - device management, security
management, app deployment and policy
enforcement, to third party, cloud based services.

Percentage of companies that find security the top EOD challenge
38%
33%
26%

23%

36%

25%

22%

19%

14%

Total

U.S.

U.K.

Germany

France

Russia

China

India

Mexico

17%

Brazil

“The perceived danger of EOD to corporate network security is likely a major reason that
companies in Europe have not embraced the trend as fully as others.
Apart from China, European countries are the most concerned with the negative effects of
EOD on the security of corporate networks. Interestingly, the concern over network security
has not made Chinese companies reluctant to embrace EOD, since they believe the benefits
far outweigh the potential costs”

Page |5
CIOs have a love/hate relationship with EOD
Love:


Reduces cost of hardware acquisition and
upgrades



Improves productivity



Enables agility and responsiveness



Increases employee satisfaction

Hate:


Increases security threat



Creates a non-standardise environment



Increases support complexities



Technology roadmap poorly defined

Security and compliance
It is clear that long held worries over lost or stolen
devices and network security remain at the top of
corporate concerns, and as mobility increases, so
does the associated threat for many businesses.
In many heavily regulated sectors, such as
banking, health, education and public, nothing can
be allowed to compromise corporate, business
and customer data records, or lead to any
wavering from the road to compliance.
However, many of the security risks and issues
that come to mind when considering EOD
adoption from the IT department’s perspective
pre-exist EOD, simply in another guise. Very few
organisations have robust policies in place to
regulate and monitor printed matter being taken

Network intelligence – the “IP” is
the key
The network touches everything – and no device
with an IP address gets on or off the network
without IPAM (IP Address Management). This
makes the IPAM platform the network intelligence
authority that holds the unique and critical data
relationships between IP addresses, devices,
users, physical location and network activity. The
IP address is a unique network identifier assigned
to each and every device on a network. As such,

offsite, fully-safeguarded remote access on PCs at
an employee’s home or even how and when
memory sticks are used. Sensitive company data
has always been mobile and will continue to be so,
simply accessed and transported in another way.
The real opportunity EOD affords IT specialists is
to re-evaluate how their organisation handles all
aspects of their security requirements, build in
upgraded technological solutions to deal with
distributed denial-of-service (DDoS) attacks, take
advantage of the freedom provided by tight data,
risk and compliance policies, utilise them to find
solutions to pre-existing issues and embrace full
EOD
adoption.
the IP address space holds enormous strategic
value. The ability to centrally view and manage IP
addresses within a business network with IPAM is
the key to gaining network intelligence and
insight. The rich source of network intelligence
afforded by IPAM is essential for policy
enforcement and to monitor which applications
are being accessed, by whom, and how sensitive
business data is being used.
Together with the Domain Name System (DNS)
and Dynamic Host Configuration Protocol (DHCP)
core network services, IPAM is integral to the
continued health and robustness of a network:

Page |6


IPAM centrally manages and controls the
network and addressing

of personal device usage with the actual costs of
managing an employee reimbursement process.



DNS connects any device to any Web site,
application or other user



DHCP provisions each device’s connection to
the network

Whichever route is chosen by the business, any
policy can only be as robust and accurate as the
billing data it is provided by its vendors: the
success of it is predicated upon the ease with
which personal and business usage can be
isolated.

The IPAM platform consolidates all IPAM, DNS and
DHCP data within a central network intelligence
repository, enabling a business to better manage
their networks and devices. To meet ever-rising
expectations for business connectivity, an IPAM
platform must deliver three key solutions:


Mobile security



Address management

For many businesses today faced with EOD, it is
likely that they will not have the technical
capabilities in place to deal with the level of data
manipulation and costs transparency required to
prosecute such policies effectively.

 Automation and self-service
Without these three solutions, any business will
not be able to gain the network intelligence
required for successful network-dependent
initiatives such as EOD, virtualisation and cloud
services – much less take advantage of emerging
technologies like machine-to-machine (M2M) and
software-defined networking (SDN).

Cost and allocation
Even after the enterprise makes the choice
between a corporate funded model (whereby
employees choose their own mobile devices which
are paid for and managed centrally) or makes
employees responsible for all aspects of
ownership, there is still one dilemma to resolve:
how do they separate business and personal costs
incurred through device usage?
This can be an issue which is difficult enough to
tackle when looking at voice related costs in
isolation, but increases in complexity when one
adds data related activity in to the mix. For a
global business with a large workforce, the
potential bills would be substantial. Further, with
variable tariff charges over and above certain data
usage levels, how would an enterprise adjudicate
whether business or personal usage should be
subject to lower or higher rates?

Supporting the EOD environment
As the range of devices within a company
broadens, coupled with the increasing
percentage of mobile workers within the global
workforce, a smart, agile service and support
structure is required.
For the most part, mobile devices will be managed
and supported by existing, finite IT departments.
Implementing EOD programs should enable IT
staff to be more productive because they are
spending less time on general infrastructure
upkeep, and IT staffing ratios should shift because
support questions about smartphones and tablets
are often easier and less complex to troubleshoot
than PC configuration problems. This trend is part
of a major shift to change the user perception of
the IT team from a reactive organization or
roadblock to that of a proactive organisation
focused on enabling employees.
Some businesses expect to achieve fewer help
desk calls, both hardware and software related.
Employees are familiar with and comfortable
using their own devices, which eliminates training.
If employees do have questions related to their
personal devices, business can point them to their
telecom operator or device manufacturer instead
of the corporate help desk. Introducing more
mobile applications into the program however,
may drive an uptick in help desk calls and
requests.

When tackling the conundrum of which model to
adopt, the enterprise needs to weigh up the costs

Page |7
EOD drives innovation for CIOs and the business
by increasing the number of mobile application
users in the workforce. Rolling out applications
throughout the workforce presents myriad new
opportunities beyond traditional mobile email and
communications: applications such as time sheets,
site check-in/check-out, and employee self-service
HR applications and smarter business continuity
planning are just a few examples. Expanding
access and driving innovation could ultimately be
the legacy of the EOD phenomenon.

Developing a robust win-win
strategy
The consumerisation of IT is without doubt one of
the most important factors impacting the
enterprise arena over the last decade. That said,
it requires a measured response – one which
aligns the business objectives and ambitions with
those of the workforce.

As with many decisions when faced with an
overwhelming of often polarising information, the
truly smart path often lies somewhere in the
middle – one which sits between, on the one
hand, a highly rigid and overtly restrictive policy
which could appear blinded to the blurring of
employees’ work and personal lives, and the
other, a laissez-faire approach where employees
can decide to use any device they wish,
unchecked.
In short, a balance must be struck which satisfies
the employee desires and business goals, meets
compliance requirements throughout and creates
a robust platform for IT support.
Verizon understands the EOD challenges our
customers face. Our clear goal is to work with our
customers to create a strategic roadmap which
ensures they are positioned to reap the
commercial benefits driven by the increased
productivity and collaboration offered by EOD,
and then deliver hard against it.

Page |8
Conclusion
By partnering with Verizon, conducting a strategic
review of the impacts and opportunities within a
business presented by EOD, creating a strategic
roadmap for growth and implementing a EOD and
Mobile Workspace strategy, organisations will be
addressing some critical business concerns:
responding to the consumerisation of mobility
solutions and devices, plus support for more
devices, smartphones and tablets, and extending
internal systems for mobile access.
Most importantly, they will be best positioned to
benefit in five main functional areas: productivity,
risk management and compliance, cost control,
procurement and ecosystem management. As a

result, the strategy we design with you will ensure
that your business is fit for the purpose of
realising the potential of empowerment through
secure ‘anytime, anywhere’ access.
Both the impact and the advantage of our Verizon
solutions are company-wide. We work with our
customers to create a workplace solution that
takes full commercial advantage of mobility: cocreating a value enhancing solution that has
positive impact to our customers’ balance sheet,
their employees’ productivity and their
commercial ambitions, by providing them with the
key to unlock the intrinsic value of the EOD
opportunity.

Verizon Contributors

Cisco Contributors

Neil Cook,

Stacey Goldsmith,

Principal Consultant, UCC & Mobile
Craig Cerasi,

Business Development, Unified Workspace –
Smart Solutions

Head of Marketing Mobility Solutions

Martin Patten,

Gavan Egan,

Business Development, Unified Workspace –
Smart Solutions

Cloud & Security EMEA Sales VP for Verizon
Europe

Paul Durzan,
Director, Unified Workspace – Smart Solutions
Fabien Gandola,
Consulting SE, Unified Workspace – Smart
Solutions
Jason Freeth,
Architect, Cisco IT

About Verizon Enterprise Solutions
Verizon Enterprise Solutions provides intelligent networks, cloud, mobility, managed security and
machine-to-machine (M2M) solutions to the world's most successful companies. With industryspecific solutions and a full range of global wholesale offerings, Verizon Enterprise Solutions helps
open new opportunities around the world for innovation, investment and business transformation.
Visit verizonenterprise.com or the Verizon Enterprise Solutions News Room to learn more.

Page |9
Verizon Europe:

http://www.verizonenterprise.com

Cisco:

www.cisco.com

In collaboration with

Mais conteúdo relacionado

Último

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Destaque

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destaque (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Employee Owned Device European white paper done by Verizon and Cisco

  • 1. EMPLOYEE OWNED DEVICE AND THE MOBILE WORKSPACE A Verizon and Cisco Perspective In collaboration with
  • 2. Contents Executive summary ................................................................................................................................ 1 EOD is maturing – fast............................................................................................................................ 2 Unlocking the intrinsic value of EOD...................................................................................................... 4 IT need not be a barrier to growth ........................................................................................................ 4 Security and compliance ........................................................................................................................ 6 Network intelligence – the “IP” is the key ............................................................................................. 6 Cost and allocation ................................................................................................................................. 7 Supporting the EOD environment ......................................................................................................... 7 Developing a robust win-win strategy ................................................................................................... 8 Conclusion .............................................................................................................................................. 9 About Verizon Enterprise Solutions ....................................................................................................... 9 P a g e | Contents
  • 3. This paper, commissioned by Verizon and Cisco, examines the Employee Owned Device phenomenon in Europe, focusing on the factors that are driving adoption and the key considerations you’ll face when planning your EOD strategy. Users demand the freedom, spontaneity and availability of mobile and portable devices, in reality, their demand to work where they want to and how they want to, is outstripping the pace at which many businesses choose to react. If allowed to use the devices, applications and cloud services they prefer, and the time and location for work, employees have the potential to drive the next wave or corporate efficiency and productivity. Both Forrester and Gartner have identified consumerisation of IT as possibly the decade’s most disruptive trend. It is a trend which simply cannot be ignored. Executive summary Successive generations of technologies are forcing their way into the workplace in response to user demand, economic pressures and the overriding desire for competitive advantage. Many enterprises are starting to translate such disruption in to opportunity. There is no greater example of this than the EOD phenomenon, which allows employees to choose which devices they prefer to use at work, just as they do in their personal lives. Implemented effectively, harnessing the benefits of intelligent personal devices within the business environment can bring significant benefits for the enterprise in terms of reduced hardware costs and greater flexibility for the employee, resulting in improved operational efficiencies, productivity and staff satisfaction and retention. Ignored, implemented poorly or in a fragmented fashion, EOD has the ability to become that badly behaved child, demanding huge investments in time, risk management and IT infrastructure; trying to keep one step ahead of this disruptive force can result in a series of tactical ‘dead ends’ that has the ability to disrupt the enterprise at all levels. Page |1
  • 4. Average Number of Connected Devices per Knowledge Worker, 2012 and 2014 2012 2014 3.2 2.8 3.2 2.9 2.7 2.6 2.3 2.3 2.2 1.8 Total U.S. U.K. Germany 2.4 2.3 2.0 France 1.8 Russia 3.1 3.0 2.8 2.3 2.5 1.8 China India Mexico Source: Cisco IBSG, 2012 Brazil N = 4,892 42% of smartphones and 38% of laptops used in the workplace are now employee-owned. By 2016, 66% of the mobile workforce will own a smartphone and 40% of the global workforce will be mobile (Gartner research 2012). The average number of individual devices per user in the enterprise is on the rise across the globe. EOD is here to stay. Steps must be taken to ensure companies are addressing EOD securely and effectively. Old IT models will mature to the point where they are rendered an historical footnote. The pace of innovative change and the dynamics of global competition have created a new reality for many organisations. Organisational structures are increasingly collaborative and their complexity is commensurate with that change. Myriad pressures are changing the relationship between business, technology and the IT organisation. As the lines between personal and professional lives blur, security is no longer just a question of how to keep people out; it is also a question of how to let people in. IT has to balance security and enablement; IT has to bridge the gap between the pace of user demand and the protection of the organisation. By cultivating EOD with effective management and governance, companies can move from merely reacting to the disruption to harnessing a potent source of value. EOD is maturing – fast According to research by Gartner, half of the world’s companies will seek their workers to individually provide devices for work by 2017. According to Ovum’s EOD research study, 56.8% of employees are using a personal device as part of their professional activity. Compared to the previous edition of the survey, conducted in 2012, the practice of EOD among professionals is globally stable for a year. Over a third of employees are using their personal device to do work without informing the IT department. The number of employees using tablets has increased from 28.4% to 44.5% in the last 12 months, suggesting that businesses increasingly see these devices on their networks. Many organisations are trying to stay ahead of the demand curve therefore, and are finding innovative responses to the changing mobility landscape. However, in Europe especially, EOD has been viewed as something that was ‘happening to’ the organisation, that naughty child, without operational controls, disturbing the status quo, by gaining access to IT assets without an agreed framework. The reaction to this Page |2
  • 5. has been defensive, a fragmented guardian of IT security, driven by technology, often developed in isolation from the business. Many European IT leaders have been reluctant to support EOD among their employees consequently; they are seeing fewer employeeowned devices and a spike in non-approved applications. In short, they are reacting to minimise the threat rather than embracing it in order to improve the freedom of their employees to work the way they prefer. This has created a gap between the business need and the IT resolution. This potential gap has resulted in many organisations failing to realise the benefits available from EOD as the employee usage and demand outstrips the enterprises appetite and willingness to react. Denial and subsequent reactive defence are the usual starting point as an organisation wrestles with the EOD challenge. To embark on this journey with a tactical armoury may well solve tactical technology problems today, but winning businesses stop, think, evaluate then select the smartest strategic plan, maximising the EOD opportunity now and for the future. European enterprises could suffer in comparison to those in competing countries that are using EOD to realise employee-driven improvements in productivity, collaboration and execution. Tangible benefits are only realised as the organisation achieves acceptance and develops a workplace strategy that respects EOD as a valuable business driver and aligns proactively with the opportunity. “EOD is maturing faster than many companies can address or benefit from it” Page |3
  • 6. Unlocking the intrinsic value of EOD EOD is not just a tactical problem deserving of a purely technical solution. While the smart response to it involves a heavyweight technical understanding and ability to deliver specialist technical solutions, it is clear that we are dealing with a strategic business issue, which demands a strategic solution. With EOD, the enterprise can benefit from the greater agility and improved productivity an increasingly mobile workforce provides. Employees used to enjoy better technology at work than they had available to them at home. With the advent of smart devices this has reversed, giving rise to the demand of EOD delivering improved employee productivity, satisfaction and retention, as it corresponds more closely with the way in which they want to live and work. Customers and suppliers benefit too, as the business is able to respond more quickly and effectively to the changing needs of the entire supply chain. Doing nothing is not an option, yet some businesses are doing just that in the face of the EOD challenge. There are a growing number of businesses in Europe who recognise the need to act now to catch up with employee demand. And, of those, some are reacting to the inevitable while others are embracing it as a primary catalyst for strategic business growth. These benefits are only unlocked as measurable value when the EOD challenge is ‘reframed’ into positive thinking. If only defensive technology tactics are employed then the bigger picture and subsequent tangible benefits are diluted – or worse - destroyed in the mix. In short, only Enterprises that have an actionable strategy which not only supports but leverages this growing demand, will ever be able to unlock the intrinsic value of the EOD opportunity. IT need not be a barrier to growth “On average, 60% of employees use a mobile device for work — 13% more than are officially considered mobile workers” Designated Mobile Worker Use Mobile Device for Work 69% 67% 60% 58% 47% Total 58% 47% U.S. U.K. 50% 42% 52% 40% Germany France 55% 63% 59% 57% 51% 44% 48% 46% 37% Russia China India Mexico Brazil “60% of companies said that their users connect to their network with devices from outside the office, and more than 40% of companies do the same from inside the office” Page |4
  • 7. The consumerisation of technology and hardware, coupled with employee demand means that the EOD phenomenon continues to spread with or without IT. It has long been the case that many non-approved devices are introduced by executives within a business, regardless of existing IT protocols. Many were able to bypass policy, get connected and be supported. Therefore, it is unsurprising that most executive and management levels within a business are fully behind EOD, top down. Their employee base is driving demand from the bottom up. The result is simply put: IT is getting squeezed and is expected to find a way to make it work. Any discussion regarding EOD usually elicits concerns regarding data security, risk and compliance: often not with consideration of the benefits that new strictures of policy bring, but as a barrier to adoption. Most employees who own smartphones (67.8%) bring these devices to work, and 15.4% of those numbers do this without the knowledge of IT, and one fifth do so by challenging the rules of company’s anti-EOD policy. The thread that runs through is that IT is not always keeping up with the changing demands and behaviour patterns of the new mobilised, consumerised workforce. If employees are sourcing their own applications to do their job, then it could be that the enterprise and IT specifically is not delivering the right tools or a user experience for its employees. Mobility has become a mainstream event for nearly all enterprises and so too have the complexities for infrastructure which come with it. EOD and employee demands, plus user app fragmentation are growing at such a pace, that many companies find that their infrastructural capabilities are being stretched to the limit. In response, some businesses are now looking to utilise cloud based services to, for example, provide mobile device management and private app stores for their workforce. This is a part of a natural progression to enterprise mobility as a service (EMaaS) – a move which relocates most or all of the services normally provided by IT internal systems - device management, security management, app deployment and policy enforcement, to third party, cloud based services. Percentage of companies that find security the top EOD challenge 38% 33% 26% 23% 36% 25% 22% 19% 14% Total U.S. U.K. Germany France Russia China India Mexico 17% Brazil “The perceived danger of EOD to corporate network security is likely a major reason that companies in Europe have not embraced the trend as fully as others. Apart from China, European countries are the most concerned with the negative effects of EOD on the security of corporate networks. Interestingly, the concern over network security has not made Chinese companies reluctant to embrace EOD, since they believe the benefits far outweigh the potential costs” Page |5
  • 8. CIOs have a love/hate relationship with EOD Love:  Reduces cost of hardware acquisition and upgrades  Improves productivity  Enables agility and responsiveness  Increases employee satisfaction Hate:  Increases security threat  Creates a non-standardise environment  Increases support complexities  Technology roadmap poorly defined Security and compliance It is clear that long held worries over lost or stolen devices and network security remain at the top of corporate concerns, and as mobility increases, so does the associated threat for many businesses. In many heavily regulated sectors, such as banking, health, education and public, nothing can be allowed to compromise corporate, business and customer data records, or lead to any wavering from the road to compliance. However, many of the security risks and issues that come to mind when considering EOD adoption from the IT department’s perspective pre-exist EOD, simply in another guise. Very few organisations have robust policies in place to regulate and monitor printed matter being taken Network intelligence – the “IP” is the key The network touches everything – and no device with an IP address gets on or off the network without IPAM (IP Address Management). This makes the IPAM platform the network intelligence authority that holds the unique and critical data relationships between IP addresses, devices, users, physical location and network activity. The IP address is a unique network identifier assigned to each and every device on a network. As such, offsite, fully-safeguarded remote access on PCs at an employee’s home or even how and when memory sticks are used. Sensitive company data has always been mobile and will continue to be so, simply accessed and transported in another way. The real opportunity EOD affords IT specialists is to re-evaluate how their organisation handles all aspects of their security requirements, build in upgraded technological solutions to deal with distributed denial-of-service (DDoS) attacks, take advantage of the freedom provided by tight data, risk and compliance policies, utilise them to find solutions to pre-existing issues and embrace full EOD adoption. the IP address space holds enormous strategic value. The ability to centrally view and manage IP addresses within a business network with IPAM is the key to gaining network intelligence and insight. The rich source of network intelligence afforded by IPAM is essential for policy enforcement and to monitor which applications are being accessed, by whom, and how sensitive business data is being used. Together with the Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) core network services, IPAM is integral to the continued health and robustness of a network: Page |6
  • 9.  IPAM centrally manages and controls the network and addressing of personal device usage with the actual costs of managing an employee reimbursement process.  DNS connects any device to any Web site, application or other user  DHCP provisions each device’s connection to the network Whichever route is chosen by the business, any policy can only be as robust and accurate as the billing data it is provided by its vendors: the success of it is predicated upon the ease with which personal and business usage can be isolated. The IPAM platform consolidates all IPAM, DNS and DHCP data within a central network intelligence repository, enabling a business to better manage their networks and devices. To meet ever-rising expectations for business connectivity, an IPAM platform must deliver three key solutions:  Mobile security  Address management For many businesses today faced with EOD, it is likely that they will not have the technical capabilities in place to deal with the level of data manipulation and costs transparency required to prosecute such policies effectively.  Automation and self-service Without these three solutions, any business will not be able to gain the network intelligence required for successful network-dependent initiatives such as EOD, virtualisation and cloud services – much less take advantage of emerging technologies like machine-to-machine (M2M) and software-defined networking (SDN). Cost and allocation Even after the enterprise makes the choice between a corporate funded model (whereby employees choose their own mobile devices which are paid for and managed centrally) or makes employees responsible for all aspects of ownership, there is still one dilemma to resolve: how do they separate business and personal costs incurred through device usage? This can be an issue which is difficult enough to tackle when looking at voice related costs in isolation, but increases in complexity when one adds data related activity in to the mix. For a global business with a large workforce, the potential bills would be substantial. Further, with variable tariff charges over and above certain data usage levels, how would an enterprise adjudicate whether business or personal usage should be subject to lower or higher rates? Supporting the EOD environment As the range of devices within a company broadens, coupled with the increasing percentage of mobile workers within the global workforce, a smart, agile service and support structure is required. For the most part, mobile devices will be managed and supported by existing, finite IT departments. Implementing EOD programs should enable IT staff to be more productive because they are spending less time on general infrastructure upkeep, and IT staffing ratios should shift because support questions about smartphones and tablets are often easier and less complex to troubleshoot than PC configuration problems. This trend is part of a major shift to change the user perception of the IT team from a reactive organization or roadblock to that of a proactive organisation focused on enabling employees. Some businesses expect to achieve fewer help desk calls, both hardware and software related. Employees are familiar with and comfortable using their own devices, which eliminates training. If employees do have questions related to their personal devices, business can point them to their telecom operator or device manufacturer instead of the corporate help desk. Introducing more mobile applications into the program however, may drive an uptick in help desk calls and requests. When tackling the conundrum of which model to adopt, the enterprise needs to weigh up the costs Page |7
  • 10. EOD drives innovation for CIOs and the business by increasing the number of mobile application users in the workforce. Rolling out applications throughout the workforce presents myriad new opportunities beyond traditional mobile email and communications: applications such as time sheets, site check-in/check-out, and employee self-service HR applications and smarter business continuity planning are just a few examples. Expanding access and driving innovation could ultimately be the legacy of the EOD phenomenon. Developing a robust win-win strategy The consumerisation of IT is without doubt one of the most important factors impacting the enterprise arena over the last decade. That said, it requires a measured response – one which aligns the business objectives and ambitions with those of the workforce. As with many decisions when faced with an overwhelming of often polarising information, the truly smart path often lies somewhere in the middle – one which sits between, on the one hand, a highly rigid and overtly restrictive policy which could appear blinded to the blurring of employees’ work and personal lives, and the other, a laissez-faire approach where employees can decide to use any device they wish, unchecked. In short, a balance must be struck which satisfies the employee desires and business goals, meets compliance requirements throughout and creates a robust platform for IT support. Verizon understands the EOD challenges our customers face. Our clear goal is to work with our customers to create a strategic roadmap which ensures they are positioned to reap the commercial benefits driven by the increased productivity and collaboration offered by EOD, and then deliver hard against it. Page |8
  • 11. Conclusion By partnering with Verizon, conducting a strategic review of the impacts and opportunities within a business presented by EOD, creating a strategic roadmap for growth and implementing a EOD and Mobile Workspace strategy, organisations will be addressing some critical business concerns: responding to the consumerisation of mobility solutions and devices, plus support for more devices, smartphones and tablets, and extending internal systems for mobile access. Most importantly, they will be best positioned to benefit in five main functional areas: productivity, risk management and compliance, cost control, procurement and ecosystem management. As a result, the strategy we design with you will ensure that your business is fit for the purpose of realising the potential of empowerment through secure ‘anytime, anywhere’ access. Both the impact and the advantage of our Verizon solutions are company-wide. We work with our customers to create a workplace solution that takes full commercial advantage of mobility: cocreating a value enhancing solution that has positive impact to our customers’ balance sheet, their employees’ productivity and their commercial ambitions, by providing them with the key to unlock the intrinsic value of the EOD opportunity. Verizon Contributors Cisco Contributors Neil Cook, Stacey Goldsmith, Principal Consultant, UCC & Mobile Craig Cerasi, Business Development, Unified Workspace – Smart Solutions Head of Marketing Mobility Solutions Martin Patten, Gavan Egan, Business Development, Unified Workspace – Smart Solutions Cloud & Security EMEA Sales VP for Verizon Europe Paul Durzan, Director, Unified Workspace – Smart Solutions Fabien Gandola, Consulting SE, Unified Workspace – Smart Solutions Jason Freeth, Architect, Cisco IT About Verizon Enterprise Solutions Verizon Enterprise Solutions provides intelligent networks, cloud, mobility, managed security and machine-to-machine (M2M) solutions to the world's most successful companies. With industryspecific solutions and a full range of global wholesale offerings, Verizon Enterprise Solutions helps open new opportunities around the world for innovation, investment and business transformation. Visit verizonenterprise.com or the Verizon Enterprise Solutions News Room to learn more. Page |9