dcsimg

BYOD to BYOPC: Five Steps for Success

  • BYOD to BYOPC: Five Steps for Success-

    Apps and Services

    Think about the applications and services a user will need for work and make sure they are available. By providing the applications and services a user needs, the experience of using their own PC will be frictionless. From printing to AD group membership, consider where they may need help along the way.

    If using a client-hosted virtual desktop, lock the user rights down so that only apps from the company can be installed in the virtual PC, and make sure that these applications can be patched and updated in the same way as on physical PCs. With a client-hosted virtual desktop, and IT approval, users can choose to install what they like on their own PCs or Macs without affecting the licensing standpoint, security and stability of the corporate virtual PC. However, users should be aware of the dangers/legal implications of certain applications for their own and ultimately the company's benefit. Make sure to educate them as you ramp up the BYOPC program.

1 | 2 | 3 | 4 | 5 | 6 | 7

BYOD to BYOPC: Five Steps for Success

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • BYOD to BYOPC: Five Steps for Success-6

    Apps and Services

    Think about the applications and services a user will need for work and make sure they are available. By providing the applications and services a user needs, the experience of using their own PC will be frictionless. From printing to AD group membership, consider where they may need help along the way.

    If using a client-hosted virtual desktop, lock the user rights down so that only apps from the company can be installed in the virtual PC, and make sure that these applications can be patched and updated in the same way as on physical PCs. With a client-hosted virtual desktop, and IT approval, users can choose to install what they like on their own PCs or Macs without affecting the licensing standpoint, security and stability of the corporate virtual PC. However, users should be aware of the dangers/legal implications of certain applications for their own and ultimately the company's benefit. Make sure to educate them as you ramp up the BYOPC program.

The advent of bring your own device (BYOD) has brought about a revolution in the way employees access corporate resources, namely via their smartphones and tablets. And, although initially resisted by IT departments, many organizations now have a policy in place and allow employees to use their own smart devices for work. Enterprises, however, are no longer focusing only on BYOD, but instead have broadened their responsibility to encompass the bring-your-own-PC (BYOPC) movement.

As BYOPC evolves and takes hold, IT departments must decide whether the current technology offerings in the market are reliable and secure enough to protect corporate data. To do so, organizations need to establish a solid plan for dealing with BYOPC. In this slideshow, 1E outlines steps organizations should take to develop a successful BYOPC program.