SlideShare uma empresa Scribd logo
1 de 18
Bring Your Own Device[ BYOD]
Implementation
Md Yousup Faruqu
IT
AGENDA
Background & Bring Your Own Device (BYOD) Overview
Implementation Roadmap And Approach
Costing And Budget
Analysis And Key Findings
Objectives Of BYOD
Recommendation
BYOD describes an end user computing strategy
supported by a set of policies and controls,
which in conjunction with a technical solution
provide a managed and secure
framework for employees to access corporate
data from their personal device whilst
providing the enterprise with a level of control
over both the device and the data it
can access.
AppleiPhone
Android
Mobile
Windows
Phone
AppleiPad
Android
Tablet
Blackberry
Playbook
Mobile Phone Tablet
Windows
Laptop
AppleMac
Hand Held Laptop
Mobile Device
Desktop
Device
BYOD
The BYOD policy must detail which
items are allowed and the controls
that will be applied.
When defining the scope of any BYOD
implementation consideration must
be given to which end user devices*
will be allowed.
Each device type has its own set of
risks and management issues.
 What devices will be subject to BYOD
 What over arching method of resource access will
be used for:
 Hand held devices
 Laptops
 How will the solution and end users be supported
 How will business units be charged for the service
Strategy
The business reasons for
adopting BYOD, for a
successful BYOD
implementation
Policy
Policy right protects the
business from the risks
associated with BYOD
 What devices makes and models will be allowed
 How will Antivirus be handled
 What actions does the company reserve the right
to carry out on an employees personal device
(e.g. remote wipe on loss)
 How will leavers be handled
 What access controls will be used (Certificate
based authentication, Pin Number lengths)
 Empower users to choose their own devices to
improve productivity, collaboration and mobility
 Protect sensitive information from loss and theft to
meet privacy, compliance and risk management
standards
 Reduce costs and simplify management through
self-service provisioning and automated management
and monitoring
 Simplify IT by deploying apps once for use on any
device
6
 On-demand delivery of data, apps and desktops to any device
– personal or business
 Transform corporate application as well as desktops into an
on-demand service available on device.
 A self-service app store providing unified access and single
sign-on to Windows, web and SaaS apps on any device, over
any network
 Secure file sync and sharing for any device
 Collaborative work platform with coworkers and clients
 A secure-by-design architecture including SSL VPN and
granular policy-based user authentication with tracking and
monitoring to support compliance and privacy.
Increased user mobility
Increased user satisfaction
Increase productivity*
Help retain top performers
Reduce capital costs
Helps to attract younger talent*
 Conduct baseline PoC to identify precise solutions to implement BYOD.
Citrix and VMware has been identified as a best solutions for ABC Inc
infrastructure.
 All tests done in PoC with CITRIX and VMware were successful.
 Use Citrix and VMware BYOD environment to publish or deliver Windows
XP, 7 virtual desktop and application to the selected end users devices:
 iOS device – iPhone, iPad
 Android device – Samsung Phone, Tablet
 Windows Phone – Nokia Lumia
9
Months
- Device & users selection
- Test report
- Provision desktop and
applications
Kick-Off
- Drawing up the RFP
- Publication
- Selection
- Assignment
Implementation
Dec. 2012 May,13 Jun,13
Project Management
RFP
Design &Analysis
- Optimized design
- Technical design
- BYOD Implementation plan
HW
Provisioning
Completion
Oct,13Feb,13
 Site Preparation, Product Delivery And Installation
 Equipment delivery
 Power preparation
 Network preparation
 H/W installation
 OS installation and configuration
 Host Integration (SAN integration)
 Install and configure hypervisor VMware ESX and Virtual Center
 Install and configure VMWare software and high availability
 Install and configure BYOD solution
 Provision virtual desktop and/or applications to the designated users
11
 Hardware Configuration (Total cost: $32k)
 2 physical server with 4X10-core (40) CPU and 196GB RAM
each, used for the host machines
 Software Configuration - Hypervisor (Total cost: $30k)
 VMware vSphere 5.o (8 CPU licenses. Each License covers 1
physical CPU) with 1 years warranty and support
 BYOD solution –Software, Licenses and support ($66k)
 BYOD solution software and licenses
 Storage (Total cost: $36k)
 3TB usable FC storage
13
 Identical physical servers are running at 20-35% utilization.
 With 30 servers consolidated on 3 ESX Server hosts, all the servers
will be operate at 60-80% utilization, resulting in a huge
improvement in server utilization as measured by average CPU and
memory usage.
 Uniform high availability across the entire virtualized IT
environment without the cost and complexity of failover solutions
tied to either operating systems or specific applications.
 The time is reduced for provisioning new servers to minutes. Before
virtualization, it took us 20-30 hours if we needed to prepare a new
system.
 Downtime and IT service disruptions will be minimize.
 E-mail
 HR Application
 ERP Systems
 File Servers [H & Z drive]
 Intranet Applications
Log On
Time
Last State
Change
Endpoint Name
Endpoint
Address
Endpoint
Hardware Id
Client
Version
Horizontal
Resolution
Vertical
Resolutio
n
9/9/12
11:48 AM
11/5/12
10:03 AM
WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768
11/5/12
7:42 AM
11/5/12
7:44 AM
xt45 172.71.237.15 421C1E03 320 480
11/6/12
8:50 AM
11/6/12
8:50 AM
WI_mitjsZpPOTw8J
oSBS
172.71.229.56 CE49DF52 768 1024
11/6/12
8:52 AM
11/6/12
8:53 AM
WI_m4ubYcezolIW
kWImB
172.71.103.49 363D7406 13.0.0.6685 1366 768
11/6/12
8:59 AM
11/6/12
9:00 AM
WI_tk6oktkdeMd19
jJeO
172.71.103.46 3FB64541 12.1.44.1 1280 800
User access report
Budget Head
Cost ($k)
Phase 1
Hardware
Server 32
Storage 36
Software
VMware ESX license 30
BYOD solutions and license 56
Professional Services
Implémentation service 10
Total 164
Costing & Budget
17
Most of the tests performed with CITRIX VDI in POC,
were successful.
We recommend deploy the solution in phased approach
and build the infrastructure gradually
The phase 1 implementation is planned to be done in
2013.
Meanwhile, we understood that there are many vendor
products available in the market, so we would be doing
the POC on VMware technology this year to determine
if there have been any development that more capable
in terms of reliability, and user experience compare to
CITRIX
Thank you!

Mais conteúdo relacionado

Mais procurados

Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Dell Strategic Management Presentation
Dell Strategic Management PresentationDell Strategic Management Presentation
Dell Strategic Management PresentationSophie Yanez
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptxahmad661583
 
Comparison Small, Medium & Large Companies
Comparison Small, Medium & Large CompaniesComparison Small, Medium & Large Companies
Comparison Small, Medium & Large CompaniesRam Iyer
 
Chapter14
Chapter14Chapter14
Chapter14Izaham
 
Corporate Strategy - Case Study - Google
Corporate Strategy - Case Study - GoogleCorporate Strategy - Case Study - Google
Corporate Strategy - Case Study - GoogleV. Castel
 
Information Technology Infrastructure
Information Technology Infrastructure Information Technology Infrastructure
Information Technology Infrastructure Hurriya Saeed rana
 
Dell Company Presentation
Dell Company PresentationDell Company Presentation
Dell Company PresentationDeepankar Nath
 
PESTEL Analysis
PESTEL AnalysisPESTEL Analysis
PESTEL AnalysisAl Mumin
 
Modern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure ADModern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure ADFabian Niesen
 
Odoo development workflow with pip and virtualenv
Odoo development workflow with pip and virtualenvOdoo development workflow with pip and virtualenv
Odoo development workflow with pip and virtualenvacsone
 

Mais procurados (20)

Apple Marketing Analysis
Apple Marketing AnalysisApple Marketing Analysis
Apple Marketing Analysis
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Lg marketing mix
Lg marketing mixLg marketing mix
Lg marketing mix
 
Apple supply chain analysis
Apple supply chain analysisApple supply chain analysis
Apple supply chain analysis
 
Azure Backup Simplifies
Azure Backup SimplifiesAzure Backup Simplifies
Azure Backup Simplifies
 
Dell Strategic Management Presentation
Dell Strategic Management PresentationDell Strategic Management Presentation
Dell Strategic Management Presentation
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptx
 
Comparison Small, Medium & Large Companies
Comparison Small, Medium & Large CompaniesComparison Small, Medium & Large Companies
Comparison Small, Medium & Large Companies
 
Chapter14
Chapter14Chapter14
Chapter14
 
Global Strategy
Global StrategyGlobal Strategy
Global Strategy
 
Corporate Strategy - Case Study - Google
Corporate Strategy - Case Study - GoogleCorporate Strategy - Case Study - Google
Corporate Strategy - Case Study - Google
 
Electronic Commerce - Bascis
Electronic Commerce - Bascis Electronic Commerce - Bascis
Electronic Commerce - Bascis
 
Nvidia
NvidiaNvidia
Nvidia
 
Information Technology Infrastructure
Information Technology Infrastructure Information Technology Infrastructure
Information Technology Infrastructure
 
Dell Company Presentation
Dell Company PresentationDell Company Presentation
Dell Company Presentation
 
PESTEL Analysis
PESTEL AnalysisPESTEL Analysis
PESTEL Analysis
 
Modern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure ADModern deployment with Autopilot and Azure AD
Modern deployment with Autopilot and Azure AD
 
Swot of apple
Swot of appleSwot of apple
Swot of apple
 
Odoo development workflow with pip and virtualenv
Odoo development workflow with pip and virtualenvOdoo development workflow with pip and virtualenv
Odoo development workflow with pip and virtualenv
 
Odoo experience 2018 - Odoo Documents
Odoo experience 2018 - Odoo DocumentsOdoo experience 2018 - Odoo Documents
Odoo experience 2018 - Odoo Documents
 

Destaque

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology ProposalDana L. Miller
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingFAIZAL T H
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementYole Developpement
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentationraj7
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Yole Developpement
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement Yole Developpement
 

Destaque (20)

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Sample BYOD Technology Proposal
Sample BYOD Technology ProposalSample BYOD Technology Proposal
Sample BYOD Technology Proposal
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
 
Clothing for Biosensing
Clothing for BiosensingClothing for Biosensing
Clothing for Biosensing
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
 
Human cloning
Human cloningHuman cloning
Human cloning
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
 

Semelhante a Business Case Of Bring Your Own Device[ BYOD]

Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization servicesAditi Shrivastava
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSiraj Syed
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxAbbadabbajabba1
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Md Yousup Faruqu
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Flexera
 
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 

Semelhante a Business Case Of Bring Your Own Device[ BYOD] (20)

Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
IS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptxIS Project_Ch5_IT_Infrastructure.pptx
IS Project_Ch5_IT_Infrastructure.pptx
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Wakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_AdminWakeel Ahmed_CV_IT_Admin
Wakeel Ahmed_CV_IT_Admin
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
VMworld 2013: VMware Horizon View Clients: Your Data, Applications and Deskto...
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Maninder_singh
Maninder_singhManinder_singh
Maninder_singh
 

Último

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Último (20)

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

Business Case Of Bring Your Own Device[ BYOD]

  • 1. Bring Your Own Device[ BYOD] Implementation Md Yousup Faruqu IT
  • 2. AGENDA Background & Bring Your Own Device (BYOD) Overview Implementation Roadmap And Approach Costing And Budget Analysis And Key Findings Objectives Of BYOD Recommendation
  • 3. BYOD describes an end user computing strategy supported by a set of policies and controls, which in conjunction with a technical solution provide a managed and secure framework for employees to access corporate data from their personal device whilst providing the enterprise with a level of control over both the device and the data it can access.
  • 4. AppleiPhone Android Mobile Windows Phone AppleiPad Android Tablet Blackberry Playbook Mobile Phone Tablet Windows Laptop AppleMac Hand Held Laptop Mobile Device Desktop Device BYOD The BYOD policy must detail which items are allowed and the controls that will be applied. When defining the scope of any BYOD implementation consideration must be given to which end user devices* will be allowed. Each device type has its own set of risks and management issues.
  • 5.  What devices will be subject to BYOD  What over arching method of resource access will be used for:  Hand held devices  Laptops  How will the solution and end users be supported  How will business units be charged for the service Strategy The business reasons for adopting BYOD, for a successful BYOD implementation Policy Policy right protects the business from the risks associated with BYOD  What devices makes and models will be allowed  How will Antivirus be handled  What actions does the company reserve the right to carry out on an employees personal device (e.g. remote wipe on loss)  How will leavers be handled  What access controls will be used (Certificate based authentication, Pin Number lengths)
  • 6.  Empower users to choose their own devices to improve productivity, collaboration and mobility  Protect sensitive information from loss and theft to meet privacy, compliance and risk management standards  Reduce costs and simplify management through self-service provisioning and automated management and monitoring  Simplify IT by deploying apps once for use on any device 6
  • 7.  On-demand delivery of data, apps and desktops to any device – personal or business  Transform corporate application as well as desktops into an on-demand service available on device.  A self-service app store providing unified access and single sign-on to Windows, web and SaaS apps on any device, over any network  Secure file sync and sharing for any device  Collaborative work platform with coworkers and clients  A secure-by-design architecture including SSL VPN and granular policy-based user authentication with tracking and monitoring to support compliance and privacy.
  • 8. Increased user mobility Increased user satisfaction Increase productivity* Help retain top performers Reduce capital costs Helps to attract younger talent*
  • 9.  Conduct baseline PoC to identify precise solutions to implement BYOD. Citrix and VMware has been identified as a best solutions for ABC Inc infrastructure.  All tests done in PoC with CITRIX and VMware were successful.  Use Citrix and VMware BYOD environment to publish or deliver Windows XP, 7 virtual desktop and application to the selected end users devices:  iOS device – iPhone, iPad  Android device – Samsung Phone, Tablet  Windows Phone – Nokia Lumia 9
  • 10. Months - Device & users selection - Test report - Provision desktop and applications Kick-Off - Drawing up the RFP - Publication - Selection - Assignment Implementation Dec. 2012 May,13 Jun,13 Project Management RFP Design &Analysis - Optimized design - Technical design - BYOD Implementation plan HW Provisioning Completion Oct,13Feb,13
  • 11.  Site Preparation, Product Delivery And Installation  Equipment delivery  Power preparation  Network preparation  H/W installation  OS installation and configuration  Host Integration (SAN integration)  Install and configure hypervisor VMware ESX and Virtual Center  Install and configure VMWare software and high availability  Install and configure BYOD solution  Provision virtual desktop and/or applications to the designated users 11
  • 12.  Hardware Configuration (Total cost: $32k)  2 physical server with 4X10-core (40) CPU and 196GB RAM each, used for the host machines  Software Configuration - Hypervisor (Total cost: $30k)  VMware vSphere 5.o (8 CPU licenses. Each License covers 1 physical CPU) with 1 years warranty and support  BYOD solution –Software, Licenses and support ($66k)  BYOD solution software and licenses  Storage (Total cost: $36k)  3TB usable FC storage
  • 13. 13  Identical physical servers are running at 20-35% utilization.  With 30 servers consolidated on 3 ESX Server hosts, all the servers will be operate at 60-80% utilization, resulting in a huge improvement in server utilization as measured by average CPU and memory usage.  Uniform high availability across the entire virtualized IT environment without the cost and complexity of failover solutions tied to either operating systems or specific applications.  The time is reduced for provisioning new servers to minutes. Before virtualization, it took us 20-30 hours if we needed to prepare a new system.  Downtime and IT service disruptions will be minimize.
  • 14.  E-mail  HR Application  ERP Systems  File Servers [H & Z drive]  Intranet Applications
  • 15. Log On Time Last State Change Endpoint Name Endpoint Address Endpoint Hardware Id Client Version Horizontal Resolution Vertical Resolutio n 9/9/12 11:48 AM 11/5/12 10:03 AM WES0080649E2FC8 172.71.103.114 3BB1698F 13.0.0.6685 1366 768 11/5/12 7:42 AM 11/5/12 7:44 AM xt45 172.71.237.15 421C1E03 320 480 11/6/12 8:50 AM 11/6/12 8:50 AM WI_mitjsZpPOTw8J oSBS 172.71.229.56 CE49DF52 768 1024 11/6/12 8:52 AM 11/6/12 8:53 AM WI_m4ubYcezolIW kWImB 172.71.103.49 363D7406 13.0.0.6685 1366 768 11/6/12 8:59 AM 11/6/12 9:00 AM WI_tk6oktkdeMd19 jJeO 172.71.103.46 3FB64541 12.1.44.1 1280 800 User access report
  • 16. Budget Head Cost ($k) Phase 1 Hardware Server 32 Storage 36 Software VMware ESX license 30 BYOD solutions and license 56 Professional Services Implémentation service 10 Total 164 Costing & Budget
  • 17. 17 Most of the tests performed with CITRIX VDI in POC, were successful. We recommend deploy the solution in phased approach and build the infrastructure gradually The phase 1 implementation is planned to be done in 2013. Meanwhile, we understood that there are many vendor products available in the market, so we would be doing the POC on VMware technology this year to determine if there have been any development that more capable in terms of reliability, and user experience compare to CITRIX