Your SlideShare is downloading. ×
Ben Goodman - Unlocking the Power of Mobility
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ben Goodman - Unlocking the Power of Mobility


Published on

Published in: Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Unlocking the Power of Mobility Ben Goodman Lead Evangelist, End User Computing VMware © 2014 VMware Inc. All rights reserved.
  • 2. Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population 2011-2015 Forecast Tablets are forecasted to reach 467 Million in 2017 Source: Gartner Forecast: Devices by Operating System and User Type, Worldwide, 2010-2017, 3Q13 Update Mobile phones are forecasted to reach 2.128 Billion in 2017 Source: Gartner Forecast: Devices by Operating System and User Type, Worldwide, 2010-2017, 3Q13 Update Over 60% of workers report using a personal device at least once a day in their work Source: Gartner Bring Your Own Device: The Facts and the Future, 11 April 2013
  • 3. Device Portfolio Expanding Future Past Android Apple iOS BlackBerry Windows Mobile Limited Choice Present Android HTC Kindle Fire Lenovo Motorola Panasonic Samsung Apple iOS BlackBerry Windows Mobile Windows Phone Android API Proliferation Devices Smartphones Tablets Laptops Mac Windows Peripherals and M2M Diagnostic Printers Scanners Sensors Complete Portfolio
  • 4. BYOD is Evolving Past Present Future Compromised detection Passcode policy Device compliance based on OS, device type, model Role-based policies and configuration Enterprise wipe Policy definition Services bundles Email access IT access to VPN, Wi-Fi Device workspaces AD/LDAP authentication App Catalog for public, private, VPP applications Enterprise APIs Collaboration App compliance with whitelists, blacklists, version requirements Security Enablement IT Enablement Business Enablement
  • 5. Enterprise Integration is Critical Past Present Future Security Infrastructure IT Infrastructure Business Systems AD/LDAP VPN Certificates for Email, Wi-Fi and VPN SharePoint Network Access Control Intranet Service Desk Telecom Expense Management HRIS Identity and Access Management CRM ERP Procurement Portals
  • 6. Cloud Adoption is Accelerating Past Present Future Early Adopters Key Enablers Strategic Decisions Security concerns Mitigate risk Product SAML, Cloud Connector, APIs Forced Adopters Knowledge Time Budget IT constraints Lack of knowledge Data stored in the cloud, Information flow, Outage ramifications Flexibility Cost Change management Security Resources Privacy policies Security audits Certifications
  • 7. Cost Management is a Challenge Past Present Future -Detect roaming -Try to manually react and notify -Monthly bill shock -Manual lists of worst offenders -Basic compliance and automated actions • Disable email • Notify user • Disable data -Platform variation -Best effort / workflows defined -Improved reporting -Granular policies by device ownership -Advanced capabilities to react real-time -Manage all content based on contextual awareness -Workflows automated
  • 8. Next-Gen IT Stack Legacy IT Stack Disruptive Mobile Technologies Shifting Investments
  • 9. Market Consolidation Past Present MDM EMM Platform Future EMM Platform Email App Catalog End User Computing SDK App Wrapping Content Collaboration Containerization Peripherals M2M (IoT) Virtualization
  • 10. Thank You