1 / 30

Consumerization of IT

Consumerization of IT. (Bring Your Own Device ). The C onsumerization of IT is Driven by…. Cloud Computing. Data Explosion. Social Computing. Browser-based Apps. Ecosystem of Computers. Personal Devices in the Workplace. Ubiquitous Connectivity. Natural Interaction.

jasia
Télécharger la présentation

Consumerization of IT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Consumerization of IT (Bring Your Own Device)

  2. The Consumerization of IT is Driven by… Cloud Computing Data Explosion Social Computing Browser-based Apps Ecosystemof Computers Personal Devicesin the Workplace Ubiquitous Connectivity Natural Interaction

  3. The Consumerization of IT is Driven by… Cloud Computing Data Explosion Social Computing Browser-based Apps Ecosystem of Computers Personal Devices in the Workplace Ubiquitous Connectivity Natural Interaction

  4. The Consumerization Brings a Lot of Issues • Infected managed PCs on the network • Accessing corporate content from unmanaged devices • VPN support • Unable to manage PCs and phones on the Internet • Access and identity • Device management • Business productivity • Remote access • Application development • Remote wipe devices • Authorized mobile device access • Increasing support costs • No data access strategy • Prevent data leakage • Confidential information on personal devices • Sensitive data on lost or stolen laptop • Compliance • Unmanaged device access to sensitive data • Personal devices on the corporate network

  5. A Minute in the History of the Work Environment • Two billion mobile Internet devices today in the world • 2/3 of companies worldwide have adopted tablets • Only 20% of tablet owners use the device for content creation • Around 371 million computers sold in 2011 • Around 6 billion mobile phones worldwide • 16 phones per PC • Around 21 million tablets worldwide • 17 PCs per tablet, 285 phones per tablet Location Screen An activity We are all consumers and workers already. Just depending on what you are doing CONSUMERIZATION HAS ALREADY HAPPENED Sources: International Telecommunications Union, “Tablet Demand and Disruption” Morgan Stanley, IDC

  6. WORK LIFE balance “People = Consumers = Workers” Want to: Connect Collaborate Create Customize Do things faster We are: Complex Technically capable Self-supported Cost-aware Worried about security Create and protect our intellectual property Expect: 24/7 Instant response Instant information Share The world to be relevant to us Evolution Revolution LIFE family friends work

  7. Microsoft Vision for Consumerization

  8. Strategy

  9. Bring your own computer Thin clients Virtual desktop interface Consumer devices Smart phones Managed desktops Managed laptops Environment Desktop … What Is Your Strategy?

  10. Environment Desktop … What Is Your Strategy? • Bring your own computer • Managed laptops • Managed desktops • Smart phones • Consumer devices • Virtual desktop interface • Thin clients

  11. Microsoft is Embracing the Consumerization of ITFour Components to the Strategy: Security and management to support flexible workstyles Windows-based devices that people love Best productivity experience Unified application development

  12. Start Here

  13. Three Dimensions Who User Need Where Device + location Choice What Apps+ data Enterprise control

  14. Bring Your Own Framework Choose Your Own White-listing devices Loose policies • On Your Own • Any device • No policies Choose Your Own White-listing devices Loose policies On Your Own Any device No policies Bring Your Own Freedom of devices Loose policies Here is Your Own Predefined device Strict policies Here is Your Own Predefined device Strict policies • Bring Your Own • Freedom of devices • Loose policies

  15. Bring Your Own Framework Choice On Your Own Bring Your Own Choose Your Own Here Is Your Own Enterprise control Your decision should be based on the level of freedom vs. control you need

  16. One:Who? • Enablement • Proxy LOB applications • Public collaboration • Mobility • Business value • Collaboration needs • LOB applications • Engagement with technology • Mobility • Secure and compliant environment • LOB applications • Business value • Collaboration needs • Mobility Contractor Project Manager Account Manager Stock Trader Nothing Simplified enablement Enterprise enablement Compliancy enterprise enablement

  17. One:Who? Contractor Project Manager Account Manager Stock Trader • Enablement • Proxy LOB applications • Public collaboration • Mobility • Business value • Collaboration needs • LOB applications • Engagement with technology • Mobility • Secure and compliant environment • LOB applications • Business value • Collaboration needs • Mobility Compliancy enterprise enablement Nothing Simplified enablement Enterprise enablement

  18. Two: Where? On Your Own Bring Your Own Choose Your Own Here Is Your Own

  19. Three: What? None User Public Data Low Medium High business impact Device + location Zero Leakage Apps+ data Business impact of data loss, corruption, or exposure?

  20. Bringing it Together Unified access gateway Low Email • Seamless access Presence and IM Voice/communications Project Manager Account Manager Moderate Stock Trader CRM Central documents Secure < High > Virtualization Business intelligence LOB applications Public web Contractor

  21. Steps to Consumerization

  22. Assess the Impact to Your Organization Ambition Program Plan On Your Own Bring Your Own Choose Your Own Here’s Your Own Policies • User • Basic • Domain • Enterprise Policy / legal impact Security Financial impact Vendor contractual changes • User-managed • Local admin • Local admin • Basic policy enforcement: • Encryption check • Virus scanned check • Password policy, remote wipe • Central managed • Local user • Authentication (password complexity) • Device policies • Application access • Central managed • Strong authentication (SmartCard) • Drive encryption Data availability changes Employee benefits changes Impact Assessment IT • LEGAL Health • User-driven health management • Health assessment • Quarantined access • Health enforcement • Patch, firewall, configuration • Lock down templates • Device policies Application changes Infrastructure changes Concerns Support process changes Security policy changes Financial Compliance Data Apps IT Infra • FINANCE • HR

  23. Understand People + Business High Autonomy 5% 20% 15% Low Mobility High Mobility 60% Low Autonomy

  24. Establish Policies Devices Management Assets Bring Your Own Choose Your Own Here is Your Own Corporate Public Low Business Impact Medium Business Impact High Business Impact • Bring Your Own • Choose Your Own Partial • Public • Low Business Impact • Medium Business Impact On Your Own • Bring Your Own • Choose Your Own Proxied • Public • Low Business Impact • Medium Business Impact • High Business Impact On Your Own • Bring Your Own • Choose Your Own Public • Public

  25. Establish Service Portfolio Consumer Devices IT services portfolio Consumer Devices IT Services Portfolio On Your Own • Client Services • Client Services Data Center Services Data Center Services User interface Application Services Application Services Business Productivity Services Business Productivity Services • Document authoring and publishing Local, RemoteApp File and print Web Collaboration • Social and communication Application delivery LOB Platform Enterprise content management Bring Your Own • User state Hosted Desktop Remote Web Access Desktop delivery Process management Enterprise search • User authentication CYO,HYO Identity and access Integration Reporting and analysis • Content synchronization CYO,HYO Consumer Devices Consumer Devices Service delivery Reporting and analysis Unified communications • File discovery and sharing Choose Your Own CYO,HYO Direct Access NAP, Access Gateway, Remote Desktop Gateway, • Protection Protection Data warehouse Messaging and calendering BYO, CYO,HYO • Virtualization Advanced networking Development LOB suite CYO,HYO • Management agent Here Is Your Own • Devices and peripherals Basic Infrastructure Basic Infrastructure Service operations Processing Basic networking Storage • Connectivity

  26. Evaluate Current Capabilities IT Assessment

  27. Build a Roadmap Contractor Project Manager Account Manager Stock Trader IT Assessment What Where Who IT Assessment

  28. Start Delivering Services Who User Need Identity management Identity federation + directory services Where Location + devices Choice Access management, device management Network access services, asset + config. management, virtualization What Apps + data Enterprise control Information protection, app delivery Digital rights management, encryption, virtualization

  29. Q&A Aka.ms\ConsumerizationStrategy

  30. Backup

More Related