For Infrastructure & Operations Professionals

Five Steps To A Successful BYOC Program

A Pragmatic Approach To Achieve Both Freedom And Security

    Why Read This Report

    In 2012, as an I&O workforce computing professional, you will be faced with more people using their own computer for work than ever before. Many highly influential employees are already doing so, and are staying comfortably outside of your control. This creates an unstable situation because you are still on the hook for supporting them, and assuring security, but are being denied access or are not equipped with the right tools for the job. This report provides the guidance you need to establish a framework for managing and supporting employee-owned computers efficiently, while offering as much freedom to workers as possible and ensuring security at the same time. Platform-specific tool kit documents will also help you evaluate and choose the right tools for the level of management that's appropriate for your organization.
    US $499
    Add To Cart
    Become A Client

    Get objective, pragmatic guidance that helps you make tough decisions and succeed in a complex world. Contact us to learn more.

    Already A Client?
    Log in to read this document.


    • Still Don't Have A BYOC Program? Get Ready For The Flood
    • I&O Stagnation Is Fueling BYOC Demand
    • Making The Case: Empowerment Equals Competitive Advantage
    • Step 1: Stop Fighting Your Workers, And Channel Their Ideas Instead
    • Step 2: Develop Personas To Understand Employee Work Styles
    • Step 3: Determine Which Personas Will Benefit Most From BYOC
    • Step 4: Define Your Self-Support Zones
    • Step 5: Use Client Virtualization To Expand The Self-Support Zone

      Ready, Fire, Aim! You're Not Quite Ready Yet!
    • Supplemental Material
    • Related Research Documents