E-Book, Englisch, 451 Seiten
Keyes Bring Your Own Devices (BYOD) Survival Guide
Erscheinungsjahr 2013
ISBN: 978-1-4665-6504-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 451 Seiten
            ISBN: 978-1-4665-6504-3 
            Verlag: Taylor & Francis
            
 Format: PDF
    Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.
Bring Your Own Devices (BYOD) Survival Guide explains the psycho-techno phenomenon also known as bring your own technology (BYOT). Providing the guidance necessary for living in this new world, it describes the new end-users (Millennials) and their demands, as well as the strategic and tactical ramifications of these demands.
Examining the business aspects of BYOD—selection, purchasing, and corporate culture—the book covers the broad range of technical considerations including selection, connectivity, training, support, and security. It also includes an extensive set of best practices.
The book is geared for the small- to medium-size enterprise that needs to integrate BYOD into their environment. It addresses topics such as content and data management, risk assessment, performance measurement, management, and even configuration management.
The text includes a set of Quick Start guides that provide tips for such things as assessing costs, cloud integration, and even legal issues. There is also a full set of appendices that supply helpful information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.
Zielgruppe
C-level executives, business managers, and entrepreneurs.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
The BYOD Revolution
What’s in It for the Organization? 
So, What Can Go Wrong? 
Mobile Device Management 
Consumerization of IT 
Business as Usual
Making a Financial Case for BYOD 
Supporting BYOD 
Cost-Benefit Analysis 
Break-Even Analysis 
Estimating ROI for an IT Project 
Earned-Value Management 
Rapid Economic Justification 
Value Measuring Methodology 
     Step 1: Develop a Decision Framework 
          Task 1—Identify and Define Value Structure 
          Task 2—Identify and Define Risk Structure 
          Task 3—Identify and Define Cost Structure 
          Task 4—Begin Documentation 
     Step 2: Alternative Analysis—Estimate Value, Costs, and Risk 
          Task 1—Identify and Define Alternatives 
          Task 2—Estimate Value and Cost 
          Task 3—Conduct Risk Analysis 
          Task 4—Ongoing Documentation 
     Step 3: Pull Together the Information 
          Task 1—Aggregate the Cost Estimate 
          Task 2—Calculate the Return on Investment 
          Task 3—Calculate the Value Score
          Task 4—Calculate the Risk Scores
          Task 5—Compare Value, Cost, and Risk
     Step 4: Communicate and Document
          Task 1—Communicate Value to Customers and Stakeholders
          Task 2—Prepare Budget Justification Documents
          Task 3—Satisfy Ad Hoc Reporting Requirements
          Task 4—Use Lessons Learned to Improve Processes
     Uncertainty Analysis
     Sensitivity Analysis
Glossary
Reference
Integrating BYOD into Performance Measurement and Management Systems
Why Measure?
Understanding Performance Management
     Define Organizational Vision, Mission, and Strategy
     Develop Performance Objectives, Measures, and Goals
     Give Measures Time to Evolve
Attributes of Successful Performance Measurement Systems
Developing Benchmarks
     Plan
     Collect
     Analyze
     Adapt
Using Balanced Scorecard to Measure BYOD Effectiveness
Representative IT Balanced Scorecard Value Metrics
Keeping Track of What’s Going On
Validation and Verification
References
Assessment and Mitigation of Risks in a BYOD Environment
Initiating the Risk Assessment
A Typical Organization’s Computer System
System Architecture
System Operational Authority/Ownership
Threats to A Typical Organization’s Assets
Current Security Measures
COG Contingency Planning
Divisional Contingency Planning
Protection against Network-Related Threats
Vulnerabilities Reported by the Risk Assessment Team
Recommendations for Mitigating the Identified Vulnerabilities
Summary
Reference
Guidelines for Managing and Securing Mobile Devices in the Enterprise
Mobile Device Overview
High-Level Threats and Vulnerabilities
Use of Untrusted Mobile Devices and Networks
Use of Applications Created by Unknown Parties
Interaction with Other Systems
Use of Untrusted Content
Use of Location Services
Technologies for Mobile Device Management
     Components and Architectures
Capabilities
     General Policy
     Data Communication and Storage
     User and Device Authentication
     Applications
Security for the Enterprise Mobile Device Solution Life Cycle
     Initiation
     Development
     Implementation
     Operations and Maintenance
     Disposal
Case Study
Cloud Best Practices
Selecting a Cloud Service
CSP and End-User Agreements
     Terms of Service Agreements
     Non-Disclosure Agreements
     Service Level Agreements
     Terms and Definitions
     Measuring SLA Performance
     SLA Enforcement Mechanisms
CSP, Organization, and Integrator Roles and Responsibilities
     Contracting with Integrators
     Clearly Defined Roles and Responsibilities
Standards
Security
     Continuous Monitoring
     Incident Response
     Key Escrow
     Forensics
     Audit Logs
     Privacy Impact Assessments (PIA)
     Data Location
     Breach Response
Reference
Configuration Management in a BYOD Environment
CM and Process Improvement
Measurement and Metrics
Benefits of BYOD CM
CM Components
Configuration Identification
Configuration Change Control
Configuration Status Accounting
Configuration Auditing
Implementing CM in the Organization
Manage the Risks of CM
Configuration Management and Data Management
     Document Identification
     Data Status Level Management
     Data and Product Configuration Relationships
     Data Version Control
     Digital Data Transmittal
     Data Access Control
Content Management, Mobile, and Otherwise
Content Management System (CMS)
Document Management Systems/Electronic Document Management Systems (DMS/EDMS)
Records Management Systems (RMS)
     Reliability
     Authenticity
     Integrity
     Usability
     What Are the Records Management Risks Associated with Websites?
Digital Asset Management (DAM)
Mobile Device Management and Mobile Content Management (MDM/MCM)
Integrating BYOD into Resource Management
Data Management Roles
     Data Sponsor
     Data Steward
     Data Administration
     Database Administration
     System Administration and System Support
Data Management Responsibilities
     Development and Management Requirements
     Identification and Enforcement Standards, Design, and Implementation
     Data and Mapping Standards
     Quality Control, Data Integrity, and Backup/Recovery
     Data Sharing
     Change Management and Impact Analysis
     Connectivity
     Input and Update
     Security
     Metadata
     Training
Guidelines
     Guideline 1
     Guideline 2
     Guideline 3
     Guideline 4
     Guideline 5
     Guideline 6
     Guideline 7
     Guideline 8
     Guideline 9
     Guideline 10
     Guideline 11
     Guideline 12
     Guideline 13
     Guideline 14
     Guideline 15
     Guideline 16
     Guideline 17
Glossary of Data Management Terms
BYOD Means Social Networking
     Tools That Provide Networking Capabilities
     Wikis in Action
     Meaning-Based Computing
     Semantic Web
     Virtual Worlds
     Knowledge Management Tools
     Mashups
     References
Quick Start 1: Software-Based Authentication
     Procedures/Issues/Policies
     Bibliography
Quick Start 2: BYOD: Making It Work for Your Firm
     Procedures/Issues/Policies
     Bibliography
Quick Start 3: Software Selection from Multiple Packages
     Procedures/Issues/Policies
     Bibliography
Quick Start 4: The Make-Buy Decision
     Procedures/Issues/Policies
     Bibliography
Quick Start 5: Balanced Scorecard Metrics
Quick Start 6: Common BYOD Mistakes
     Procedures/Issues/Policies
     Bibliography
Quick Start 7: BYOD Corporate Policy
     Procedures/Issues/Policies
     Bibliography
Quick Start 8: Mobile Device Management Functionality Guide
     Procedures/Issues/Policies
     Bibliography
Quick Start 9: Legal Issues with BYOD
     Procedures/Issues/Policies
     The Fixes: How to Inoculate Your Company against Potential Legal Trouble
     Bibliography
Quick Start 10: Managing Online Content Checklist
     Procedures/Issues/Policies
          General
          Content Management Issues
Bibliography
Quick Start 11: Selecting a Content Management System Checklist
     Procedures/Issues/Policies
     Before You Start
     Determining Project Goals and Targets
     Determining and Documenting Business Requirements
     Producing Documentation
     Evaluating and Selecting a CMS
Bibliography
Quick Start 12: BYOD Lessons Learned
     Procedures/Issues/Policies
     Each Unique
     Survey…Survey…Survey
     Clarity
     Each and Every Platform Should Be IT’s BFF
     The App Store Problem
     Virtualization: Might It Be a Temporary Savior?
Bibliography
Quick Start 13: BYOD Risks
     Procedures/Issues/Policies
     Bibliography
Quick Start 14: Getting Started with BYOD
     Procedures/Issues/Policies
     Bibliography
Quick Start 15: BYOD Security Tips
     Procedures/Issues/Policies
     Bibliography
Quick Start 16: Cloud Migration Tips
     Procedures/Issues/Policies
     Bibliography
Quick Start 17: Hitching Your Network to BYOD
     Procedures/Issues/Policies
     Bibliography
Appendix A: Security Glossary
Appendix B: Employee Mobile Device Agreement
Appendix C: Mobile Device Security Checklist
Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices
Appendix E: Traditional IT Metrics Reference
Appendix F: Cloud Procurement Questions
Appendix G: Computer Use Policy
Acknowledgment
Appendix H: Benchmarking Data Collection Methods
Appendix I: Wireless Device Agreement
Appendix J: Mobile Device Management Vendors
Appendix K: Best Practices Security Checklist
Index




