Bring Your Own Device (BYOD) - KFH

kfh.ch

Bring Your Own Device (BYOD) - KFH

Bring Your Own Device (BYOD)

walter.hofstetter@eu.citrix.com


• Main driver is “consumerization”

– Fight against it

– Embrace it

• Challenges

Device Chaos

– Application Chaos

– Data Chaos

– What’s about security

– What’s about legal, tax impact, work life balance …


data

people

apps


apps


eMail FTP USB Cloud


Collaboration

Support

Desktop

Apps

Data

Network

Compute

Traditional IT

Physical

On-site

Device

Installed

Distributed

Corporate

Datacenter

Virtual

Computing

Virtual

On-line

Service

On-demand

Follow-me

Public

Cloud


Device

Device-centric

Corporate PC

Image & deploy

Limited access

Fixed costs

Service

People-centric

Any type of device

Self-service experience

Dynamic access

Usage-based costs


• Mobility empowers Freedom of Choice

Requirements

Location independence

Device independence

Personalization

Collaborative

Command and Control

Orchestration

Benefits

Workshifting, hoteling, workforce continuity

Time-slicing, mobile workspaces, BYO computing

Virtual work styles, profile management, personalization

Mind-sharing, global office experience, Follow-Me Data

Lifecycle security, compliance, privacy and cost optimization

Automation of the desired experience and results via policy


• Increases productivity 20 to 27%

• Increases employee happiness 200%

• Saves companies $20,000 per year

per employee on average

• Saves the planet


• Grades of Devices – consumer, enterprise, and mission-grade

• Methods of Usage – online, offline/disconnected, and

synchronized

• Data Sensitivity – public, confidential, and restricted material

• Policy – defining the intersection of devices, usage methods,

and data sensitivity


• Not all devices are equal

85

Consumer Grade

93

Enterprise Grade

99

Mission Grade


• Online usage requires a constant network connection to

resources in order to be functional.

• Offline usage allows a worker to be productive while

disconnected. For users that need to carry sensitive information

with them for offline access, that information must be carried in a

secure encrypted vault.

• Synchronized usage enables data to be consistent between

devices and centralized storage, such as datacenter or cloud

storage.


BYO

Enterprise Owned

Any Grade

Device

Consumer Grade

Device

Enterprise Grade

Device

Mission Grade

Device

Restricted Access Denied Access Denied Virtualized Access

Follow-Me Data

Enabled

Confidential Virtualized Access Virtualized Access

Follow-Me Data

Enabled

Follow-Me Data

Enabled

Public

Follow-Me Data

Enabled

Follow-Me Data

Enabled

Follow-Me Data

Enabled

Follow-Me Data

Enabled


XenApp

XenDesktop

StoreFront

services

Web & SaaS

Data

Mobile

Gateway

services


• App, browser or data

wrapped with policy

• Local storage encrypted

• Network access secured

• User auth required

• Allow local storage

• Offline access allowed

• Restrict doc sharing

• Restrict API’s

• Control network


NetScaler

CloudStack

NetScaler

ESX Hyper-V XenServer

VIRTUALIZATION

KVM OVM

Compute

Network

Storage


Laptop

users

USER TYPES

Task

workers

Local

VM

Streamed

VHD

Hosted

VDI

Hosted

Shared

XenClient


Provides access to desktops, apps,

docs & IT services from any device

More magazines by this user
Similar magazines