Professional Documents
Culture Documents
BYOD & The Implications For IT
BYOD & The Implications For IT
Table of Contents
Executive Summary......................................................................................................................................................................................................... 3
Security.....................................................................................................................................................................................................................3
Support .............................................................................................................................................................................................................................. 4
Business Community..........................................................................................................................................................................................................4
Performance.....................................................................................................................................................................................................................4
Conclusion .......................................................................................................................................................................................................................... 5
This infatuation with iPads has also driven more employees to start
Executive Summary using MacBooks instead of PC laptops for work, forcing IT to support
an array of personal Apple devices.
The predictions that many industry pundits have been making about
the rise of BYOD (bring your own device) are coming to fruition. The
Businesses are also beginning to accept that their hard-working
surprise is that it is happening at a much-accelerated rate at businesses
employees want to do some personal tasks while they’re on the clock.
of all sizes, around the world. While BYOD is increasingly important for
In fact, a recent ISACA Shopping on the Job Survey5 found that 96
employee satisfaction, it poses significant challenges to IT in terms of
percent of companies expected employees to use company-supplied
security risks, productivity loss, support issues and costs.
computers or smartphones to shop during the 2011 holiday season,
and 92 percent also expected workers to use personal devices during
By adopting desktops as a service (DaaS), businesses can embrace
office hours to shop. Companies allow this type of behavior because
BYOD while ensuring security of corporate data. Employees will be able
they want to promote work-life balance.
to easily access their desktops from any—and multiple—devices, and
IT can set clear policies around usage and support that make sense for
It’s becoming increasingly clear: Businesses that don’t
your users and your company.
embrace consumerization of IT and BYOD are putting
themselves at risk for low employee morale. And that’s not good for
The Onslaught of BYOD: Why Now? productivity, employee retention or competitive standing.
Signs pointing to BYOD’s growth are all around us. Gartner found
that 50 percent of employees use personal devices for work to one Implications for IT
degree or another1. The research firm predicts that 90 percent of
companies will support corporate applications on personal mobile Before embarking on a large-scale BOYD initiative, you need to
devices by 20142. In businesses that allow BYOD today, nearly a understand the implications on corporate IT. BYOD raises several rather
third of the mobile devices connecting to the corporate network are substantial questions and challenges that should be addressed up
employee-owned. Most—66 percent—are laptops, but a full quarter are front, ranging from security and support to business productivity and
smartphones and nearly 10 percent are tablets3. This suggests that, not performance.
only are more people working from their own devices, but they are also
accessing their corporate applications and data from more than one Security
personal system. Security tops the list of concerns that most companies have about
BYOD. A study by Timico6 found that 72 percent of companies are
There are a number of reasons why BYOD’s growth chart resembles a worried about protecting sensitive data as employees use their own
hockey stick. First, the impending expiration of Windows XP support devices for work.
in 2014 is driving IT organizations to evaluate alternative desktop
strategies, making them much more open to concepts like BYOD When data resides on a personal device, there is tremendous risk
than they would have been just a few years ago. Another factor is the due to viruses and theft or loss of that device. You will need to
growth of smartphones, which, according to IDC, continues to outpace consider whether employees will be required to install particular anti-
PCs4. A lot of these smartphones are owned by employees who get virus software on their devices, and then figure out how to enforce
some form of reimbursement from their employers. These smartphones compliance—and whether to pay for that software. Additionally, if
are more than capable of accessing and manipulating corporate employees access your corporate network from their personal devices,
applications, and employees want to use them to do just that, whether then your network—and your company—are exposed to that risk. IT
they’re at the office, at home, or somewhere in between. must decide how to deal with allowing devices that you don’t know or
trust to plug into the corporate network. For instance, are you going to
Perhaps the biggest influence on BYOD growth has been the iPad. It restrict access to sites that could potentially introduce viruses, such as
took off faster than anyone had guessed. Executives started buying YouTube or shopping sites? If you do, you may end up compromising
iPads and pressuring IT to allow iPad access to corporate data, and the goodwill that was the whole reason for allowing BYOD in the first
they were quickly followed by people throughout the corporate world. place.
Support Now, with BYOD on the rise, DaaS—or cloud-hosted virtual desktop
Do you want to manage the endpoint hardware or leave that up to each infrastructure (VDI)—is even more compelling.
or even employees attempting to circumvent corporate policy. But on the employee’s personal device. This makes it possible for
keep in mind that it’s difficult, time-consuming and expensive for IT businesses to adopt BYOD while ensuring data security and employee
to manage such a variety of endpoint devices, particularly when they productivity—all without burdening IT staff.
Finally, if your IT department decides not manage the BYODs, you DaaS provides a much simpler, more affordable way of onboarding
have to determine what to do for employees who don’t bring their own BYOD than alternatives such as traditional, on-premise VDI. On premise
devices. For instance, if you support corporate-owned devices for requires building out your own installation for X number of desktops,
those other employees, you may want to use more cost-effective thin which is typically tied to employee count so that your company
client computers. doesn’t have to maintain and pay for unused capacity. Not only does
on-premise VDI require tremendous upfront capital expenditures and
Business Community ongoing maintenance for the data center equipment needed to support
VDI, but there are also cost and time-drain implications when the
How will you restore business continuity when an employee’s own
company hits inflection points. As the number of BYOD desktops rises,
device breaks down and needs to be repaired or is lost or stolen? Will
you need to add storage systems, additional clusters of data center
your company provide these employees with a spare computer while
servers, SQL Server database licenses, etc.
they get their devices fixed or replaced? If so, you’ll have to figure out
a process for provisioning those desktops so employees can get back
to productivity as soon as possible. If that necessitates having extra
Enhance security and make it easy to enforce
devices on hand for this purpose, in addition to determining how many Instead of data residing on the employee’s personal device, with DaaS,
you’ll need, you should also calculate whether the cost and time of company data resides in your business’ data center. This means that,
maintaining these devices justifies this use case. while employees’ personal documents and applications may be at risk
if their devices are compromised, lost or stolen, your corporate data is
Performance secure because it was never on those devices.
Embrace BYOD employees to access whatever web sites, email programs, etc., they
want from their own devices. Now, you can legitimately block access
without impacting employee morale.
DaaS (desktops as a service) has been adopted by many companies
that want to gain visibility into and control over the desktop
environment, while making it much more cost-efficient to manage.
Because the corporate desktop is completely separate from the rest Boost workforce productivity
of the personal device, you can easily delineate who is responsible for Decoupling the corporate desktop from the personal device also
what aspect of security. IT can be responsible for the corporate desktop makes it easy to maintain business continuity. The corporate desktop
/VM security while the employee is responsible for maintaining overall “application” can be accessed from any device. If an employee’s
security on the personal device at their own expense. primary device goes down, IT does not have to be concerned about
how long it takes to provision a replacement desktop, or how much it
DaaS provides additional peace of mind when it comes to security costs to maintain enough spare desktop computers. Employees can
because, since it was built for the internet, it is pre-configured for the easily access their desktop from another of their own devices (iPad,
internet security paradigm. DaaS has two-factor authentication— smartphone, MacBook) or, if any are available, corporate-supplied
typically something the user knows such as a password and something thin client or other computers. This goes a long way to minimizing any
the user must obtain, such as a text code to a mobile device. It also has interruption of employee productivity.
an external security gateway that allows access to the corporate virtual
desktop but prevents those desktops from being directly accessed Ensure positive user experience
from the internet. This is in contrast to on-premise VDI, which was
DaaS is ideal for companies that have a distributed workforce and
built for the corporate LAN. On-premise is risky because anyone who
want to adopt BYOD. By leveraging a service provider’s global DaaS
plugs in while on-site can get access to your entire network, whereas
distribution network—which has many more points of presence than
DaaS allows IT to specify who gets access and what each person can
a single corporate data center—you eliminate potential latency issues
access.
that could result in a less-than-optimal employee experience.
Corporate Headquarters (Japan) Oceania (Australia) North America (USA & Canada) Asia Europe (EMEA)
NEC Corporation NEC Australia Pty Ltd NEC Corporation of America NEC Corporation NEC Philips Unified Solutions
www.nec.com www.nec.com.au www.necam.com www.nec.com www.nec-philips.com
About NEC Corporation of America Headquartered in Irving, Texas, NEC Corporation of America is a leading provider of innovative IT, network and communications products and solutions for service carriers, Fortune 1000 and SMB
businesses across multiple vertical industries, including Healthcare, Government, Education and Hospitality. NEC Corporation of America delivers one of the industry’s broadest portfolios of technology solutions and professional services,
including unified communications, wireless, voice and data, managed services, server and storage infrastructure, optical network systems, microwave radio communications and biometric security. NEC Corporation of America is a wholly-
owned subsidiary of NEC Corporation, a global technology leader with operations in 30 countries and more than $42 billion in revenues. For more information, please visit www.necam.com.
WP130010 | v.03.27.13
© 2013 NEC Corporation. All rights reserved. NEC, NEC logo, and UNIVERGE are trademarks or registered trademarks of NEC Corporation that may be registered in Japan and other jurisdictions.
All trademarks identified with ® or ™ are registered trademarks or trademarks respectively. Models may vary for each country. Please refer to your local NEC representatives for further details.