Home Industry Strategy BYOD is dead, IT provider says
Oliver Descoeudres Oliver Descoeudres

Proactive demand for strategic mobility consultancy is outstripping reactive demand for BYOD point solutions, according to one IT service provider.

To address changing customer requirements, international IT solutions and managed services provider Logicalis has outlined a five step process to help organisations reviewing their mobility options tackle the growing opportunity and challenge of enabling employees in different departments, roles and locations to use a myriad of devices, applications, data and content securely.

Devised by its experienced customer-facing solutions architects nationwide, Logicalis said that its five step approach recognises that a successful mobile strategy allows employees to work ‘natively’ while using technology applications, devices and data for insights and automation to perform their role and meet KPIs.

Logicalis said its approach also acknowledges various stakeholders in the strategy with the user expecting an experience which matches how they like to work, the IT team expecting the solution to allow for self enrolment and onboarding of devices and the security team expecting apps and data to be delivered in a secure fashion whilst securing the network from the threats of the new devices.

Management, HR, legal and IT, meanwhile, all expect the solution to be driven by tight policies while delivering tangible business value.

"We’re in the business of delivering “Tomorrow’s Workplace – work being something people do instead of a place they go,” said Oliver Descoeudres, Marketing Director at Logicalis.

“This means we help customers identify, implement and manage technologies that strike a perfect balance between two business imperatives: technologies that enable operational efficiency and which give people the tools they need to do their best work.”

“Last year, six out of ten customer and prospect conversations were around BYOD where now easily nine out of ten people are proactively requesting strategic counsel on mobility as part of an operational productivity strategy.

"The focus on device ownership is somewhat misplaced given the spotlight should be on the value, processes and outcomes the device and its contents actually enable, but we see that the conversation on BYOD has essentially served as an interim step to where it needs to be,” added Descoeudres.

Logicalis’ five step approach incorporates the following principles:

Foundation: Strategy: the key to successful mobility is in the plan. It’s around gathering the business requirements for now and, if possible, for the next 1-3 years.

Step one: Policy: develop the policies needed to be able to implement a solution that will meet the business requirements. Those policies include HR, Legal, Security, and Usage. When these policies are created we can choose technologies that can deliver those policies, rather than choosing technologies and creating policies around the capabilities of the technology.

Step two: Network: it all starts at the network and the aim of unified access is to transform wired and wireless networks into one converged and unified infrastructure in order to create greater simplicity, greater intelligence, operational consistency and scale, ultimately leading to greater business agility and efficiency.

Step three: Devices: securing the device consists of mobile device management (MDM) technologies. Mobile Device Management (MDM) offers The CIO a way to address the management and control of both corporate owned and non-corporate owned mobile devices across both the main tablet platforms based on iOS and Android and a wide variety of smart phones.

Step four: Apps and data: being able to deliver the users apps, as they want to use them, and doing so in a user-centric secure manner.

Step five: Services: The services layer consists of solutions which can be overlayed on a mobility-enabled network. These consist of collaboration, Virtual Desktop Infrastructure (VDI), Bring Your Own Device (BYOD) towards the holy grail of Tomorrow’s Workplace.

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

David Swan

David Swan is a tech journalist from Melbourne and is iTWire's Associate Editor. Having started off as a games reviewer at the age of 14, he now has a degree in Journalism from RMIT (with Honours) and owns basically every gadget under the sun. He also writes for Junkee and Fasterlouder. You can email him at david.swan@itwire.com or follow him at twitter.com/swan_legend

Connect