SlideShare a Scribd company logo
1 of 20
Download to read offline
Enterprise Mobility
Enterprise Mobility
Page ii Advaiya Solutions Pvt. Ltd.
Contents
Introduction...........................................................................................................................................................1
Trends, Challenges, and Drivers...........................................................................................................................2
Enterprise Mobility Maturity and Optimization Framework............................................................................4
Key Mobility Considerations and Vendor Characteristics.................................................................................6
Conclusion............................................................................................................................................................12
References............................................................................................................................................................13
Glossary................................................................................................................................................................15
Enterprise Mobility
Page i Advaiya Solutions Pvt. Ltd.
Introduction
IT grapples with the need to extend enterprise architecture to include mobility considerations
making personal devices as business tools. Mobile devices bring enterprise data to new roles,
supporting a seamless mobile experience. Businesses pursue opportunities to stay ahead of
the competition, providing users with secure and compliant information, anytimeand
anywhere on mobile infrastructure. Theprimary research of current landscape of mobile
solutions for varying business needs provided with the mobility optimization framework and
considerations for mobile app management.
Various analyst firms and IT firms including IDC, Gartner, Aberdeen, Intel etc. have carried our
researches and conducted surveys on Enterprise Mobility. In one such study, Gartner observed
that consumerization and the ubiquity of connected smart devices, people's behavior has
caused a convergenceof these forces. A Nexus of converging forces — social, mobile, cloud and
information — is building upon and transforming user behavior while creating new business
opportunities. Mobile computing is forcing the biggest change to the way work. It changes how
they spend theirday. Mass adoption forces new infrastructure. It spawns new businesses. And it
threatens the status quo1
. The innovation rate in mobile devices, social software and cloud
computing is accelerating fasterthan the enterprise adaptation rate. IT organizations that fail to
adapt to this new reality will lose their relevance in the era of pervasive mobility.2
With this comes the responsibility for Businesses to consider mobility management as
important as datacenter management. This is the core premise of study – that enterprise
mobility management deals with Mobile Strategy and Roadmap, Mobile Device Management,
Mobile Device Security, Mobile Device Policy, Enterprise Application Enablement, Mobile App
Management. We have studied mobility trends and studies from various analysts, mobility
solutions of leader vendors and developed Enterprise Mobility framework with three maturity
levels (Mobileaware, Mobile enabled, Mobile enterprise) of these capabilities through which
organizations can advancewith a strategic roadmap and accruemeasurable business value.3
This paper discusses trends and challenges affecting enterprise mobility and how
organizations can effectively build and deploy around enterprise mobility framework
1
Gartner, The Nexus of Forces: Foundational Research for the Technical Professional, June 2012,
http://www.gartner.com/technology/research/technical-professionals/nexus-of-forces.jsp
2
Gartner, Enterprise Mobility and Its Impact on IT, April 2012,
http://www.gartner.com/technology/research/technical-professionals/mobility.jsp
3
Aberdeen Group, Enterprise Mobility Management 2012, April 2012,
http://content.maas360.com/www/content/ar/Aberdeen_SoMoClo_2012.pdf
Analyzing mobility infrastructure
and architecture helps enterprise
to quickly assess the technology
landscape, current trends and
make company data available in
real time with device support
across various platforms.
Enterprise Mobility
Page ii Advaiya Solutions Pvt. Ltd.
Trends, Challenges, and Drivers
In today’s changing markets, enterprises face several challenges in creating an enterprise mobility strategy. The challenge is not building
mobile application but providing mobile application platform. They need to slowly move up the maturity curve in adopting mobility.
Trends
 70% of mobile professionals will conduct their work on personal smart devices by 20184
 BYOC is attracting interest from organizations that look to reduce IT costs and satisfy user demands for device choice, While "bring
your own computer" removes some of IT's desktop management responsibility, IT must make additional management investments
to make it work.5
 Enterprise tablet adoption will grow by 50 percent annually. In addition, 71 percent of workers surveyed use tablets as an additional
device rather than a computer replacement6
 More than 40 percent of all enterprise web applications will have mobile apps by 2014, and 90 percent of companies will support
corporate apps on mobile devices by 20147
 Expect MDM to fade from marketing language in 2013, replaced by MAM (mobile application management) or MEM (mobile
enterprise management).8
 2013 will bring a lot more integration between mobile apps and the cloud. Wherever possible, you won't have data that resides on
the device.9
 Security, manageability, and remote wipe capabilities are top requirements for a successful BYOD program10
Drivers11
4
Gartner, Bring Your Own Device, 2013
http://www.gartner.com/technology/topics/byod.jsp
5
Gartner, The Impact of BYOC on Management and Support, October 2011
http://www.gartner.com/id=1820215
6
ClickSoftware.com, 2013
http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/
7
Gartner, 2013
http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/
8
Information Week, 2013
http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-predictions-for-20/240145435
9
451 Research – Hazelton, 2013
http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-predictions-for-20/240145435?pgno=2
10
Intel, Insights on the Current State of BYOD, October 2012
http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/consumerization-enterprise-byod-peer-research-paper.pdf
11
Cognizant, F orces Driving Enterprise Mobility
http://www.cognizant.com/insights/perspectives/forces-driving-enterprise-mobility
Support flexible
workstyle to drive
employee
satisfaction
Enhancing remote
productivity
Increased Use of
Mobility by
Consumers
Enterprise Mobility
Page iii Advaiya Solutions Pvt. Ltd.
Challenges12
12
IQT, The Challenges of Enterprise Mobility
http://www.iqt.org/portfolio/on-our-ra dar/Enterprise_mobility.pdf
Securing
corporate
Information
systems with
increase in offsite
work through
personal devices
Integrating mobile
apps with
enterprise systems
Supporting variety
of mobile devices
and rapidly
changing mobile
technology
Managing what’s
on the mobile
device
Enterprise Mobility
Page iv Advaiya Solutions Pvt. Ltd.
Enterprise Mobility Maturity and Optimization Framework
Optimization is a structured, systematic process of assessing mobile infrastructure and architecture maturity across IT and Business
world. Theprocess begins with where the mobility infrastructure is and where the enterprise wants it to be. Enterprise mobility
framework defines 3 maturity phases as Mobile Aware, Mobile Enabled and Mobile Enterprise. The Enterprise Mobility Maturity Model
capabilities, maturity definitions and features are illustrated below.
Capability Mobile Aware Mobile Enabled Mobile Enterprise
Mobile Strategy and
Roadmap
Agreed upon strategic
direction, no mobile strategy
roadmap
Strategy published and
communicated, bottom-
up driven roadmap
Mobile strategy drives the
mobility roadmap, measured
results feed the strategy
Mobile Device Management Limited platform specific
management
Platform specific,
comprehensive device
management
Centrally managed, policy driven,
integrated device management
Features  Web based authentication
 Corporate device provisioning by IT
 Certificates, passcodes, multifactorauthentication, single sign-on to apps and data
 Device enrollment through web-portal, e-mail, over-the-air using smartphones/tablets
application, or SMS with OTP authentication.
 Central policy management system for endpoint devices
 Predictive analytics, proactive alerting, real-time diagnostics and problem resolution
 Remote support and troubleshooting including VOIP and chat
 AD/LDAP based authentication
 Personal device provisioning and self-service enrollment
 Management console with strong dashboard and detailed reporting capabilities (role-based
views)
Mobile Device Security Limited platform specific device
security
Cross platform mobile
device security
Fully managed cross platform
mobile device security
Features  Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking,
context-aware policies, app blacklist/whitelist
 Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking,
context-aware policies, app blacklist/whitelist
 Encryption policy (phone, SD)
 Lockdown security (camera, SD, Bluetooth, Wi-Fi)
 Password enforcement
 Remote lock and wipe
Mobile
Aware
Unmanaged user devices
used in the organization in
limitied capacity
Use of pilot application
Mobile
Enabled
Partially managed devices
connect to limited
company resources
Handful of mobile
applications
Mobile
Enterprise
Fully managed employees
and company devices
participate in enterprise
workflow
1 2 3
Enterprise Mobility
Page v Advaiya Solutions Pvt. Ltd.
 App inventory, distribution
 Real-time, permission-based remote control
 Enterprise data boundary with selective wipe and privacy policies
 Access Control (Sentry) with ActiveSync connection activity, device visibility and blocking of
email access
 Certificate distribution
 Secure administration with role-based access, group-based actions and persistent logs and
audit trails
 Lost phone recovery (locate and map)
Mobile Device Policy Platform specific mobile device
policy
Established cross platform
device policies
Fully defined & enforced mobile
device policies across all devices
Features  Web content filtering and URL filtering on mobile devices
 Mobile policies based on OS and patch levels, passcodes, device ownership, apps and device
resources, platform-specific policies, encryption, device status and location
 Quarantine noncompliant devices based on policies, devices, operating system versions, and
complianceviolation
Enterprise Application
Enablement
Limited enablement of select
enterprise functions
Key enterprise functions
and processes are mobile
enabled
Mobility enables business
process innovation
Features  Embedded VPN and sandbox that can control and encrypt application traffic.
 App wrapping to import mobileapps
 Enables smartphone/tablet users to subscribe to enterprise document and database updates
through the enterprise application distribution function
 SMS Integration with other services/Applications using APIs
 Application authorization even on platforms that do not support blacklisting /whitelisting
Mobile App Management Unmanaged mobile Apps Unmanaged commercial
and managed custom
mobile apps
Fully managed mobilebusiness
apps portfolio
Features  Enterprise App Catalogues
 Advanced distribution rules selecting eligible devices based on both inclusion and exclusion
criteria
 Push updated versions automatically for on-demand apps
 On-demand installation using app catalog
 Public Appstore integration
 Prevent data backup and automatically remove apps on un-enrollment
 Track and view installed/approved/blacklisted applications at the device/user level
 Remotely manage application settings on supported apps through Application Profiles
 Container approach to separate personal versus corporate data
 Secure business apps and data with encryption and mobile DLP technologies
 Granular policy-based management and access controls
Overall Unmanaged consumer mobile
devices used in organization
in limited capacity
Partially managed
devices connect to
limited company
resources
Fully managed company and
employee devices participate
in enterprise workflow
Enterprise Mobility
Page vi Advaiya Solutions Pvt. Ltd.
Key Mobility Considerations and Vendor Characteristics
There are three leading platforms in the mobilesegment—smartphones, tablets, and notebooks PCs - and new In-Stat (www.in-
stat.com) research forecasts that this category of mobile “magnet platforms” will grow at a CAGR of 25.7% through 2015 as com pared
to 8.7% for the overall mobile market.
Employees use smartphones, tablets or personal devices at workplaces to access corporate networks, business applications and data to
maximize connectivity and productivity. This demands for the need of secure and compliant access to applications and data on various
mobile platforms.
The mobility landscape in India is rapidly evolving. Enterprises are embracing mobility to improve work productivity and experience of
customers.13
The research lays emphasis on the essentials of enterprise mobility and its integration i.e. Mobile Device Management, Controlled
Services Exposure, SMS based Service Invocation, Enterprise Mobility Gateway and Business Service Interface.
14
Mobile Device Management: Mobile device management (MDM) solutions help enterprises manage smartphones and tablets by
providing centralized, multivendor device management that results in lower risk and improved cost of ownership. Although the MDM
market is fragmented with point solutions, it is evolving toward broader solutions that will eventually support application, security,
policy, and device and service management. Important MDM features that enterprises need to consider:
 Device Registration/De-registration
 Bring Your Own Device
 Authentication Methods
Vendor Characteristics
Enterasys Mobile IAM
13 NASSCOM, Mobility on the Move in India, Zinnov Managemen Consulting
http://www.nasscom.org/mobility-move-india?fg=162893
14
Gartner, Mobile Device Management Evaluation Criteria, January 2012
http://www.gartner.com/DisplayDocument?docC ode=217549&ref=g_fromdoc
Key Trends
 ERP, CRM, SCM, along with email solutions
expected to fuel the growth of the mobility
market
 Application maturity increase from the
current dashboarding level to complete
back-end integration
 Declining mobility solutions costs are
enabling SMBs to join the enterprise
mobility bandwagon
India’s mobility landscape:
 840 million active mobiles operational
 15% of smartphone market share
 About 15 million mobile subscribers added
every month
 Laptop market is growing at a CAGR of 50
per cent
 PC penetration in urban households have
reached 38 per cent
 There is an installed base of 25 million
computers in India
Enterprise Mobility
Page vii Advaiya Solutions Pvt. Ltd.
 Simplified onboarding and provisioning
 Secure, IT controlled BYOD solution with predictable network experience
 Web based registration, Kerberos Snooping or activeAuthentication via 802.1X
AirWatch’s Mobile Device Management
 Employee owned and corporate owned devices deployed by IT admin or end user
 Support for all major mobile platforms for a flexible BYOD program
 Directory-based authentication, Via AD/LDAP, SAML, smart-card or tokens, two-factor user authentication
MaaS360 Mobile Device Management
 Over the air (OTA) enrollment requests (SMS, emails, custom URL)
 Device decommissioning by removal of corporate data
 Corporate and employee owned (BYOD) device
 Authenticate against Active Directory (AD)/ Lightweight Directory Access Protocol (LDAP), using a one-timepasscode, or with
Security Assertion Markup Language (SAML)
Boxtone
 OTA automated device self-provisioning
 Enterprise-wide device Activate/Deactivate/Wipe/Quarantine
 Users’ personal devices for BYOD
ProMDM
 OTA Device enrollment using iPhone/iPad application, or SMS with OTP authentication.
 BYOD with separation of private and business information based on multipleprofiles
 Simple Certificate Enrollment Protocol (SCEP) certificates for authentication
Case Study
Henry Ford Health System has deployed AirWatch − which currently secures and ensures BYOD compliancefor approximately 3,000
corporate-owned mobile devices and 2,500 personal devices.
“Much of what we do as an IT organization is in response to what our customer base wants. With the capabilities of the [MDM platform], it
fulfills what we need to do. We’re very pleased with the product and the way it is in our environment.” - Michael Staroscia, Client Technical
Services Manager
http://bit.ly/ZL1GQq
Controlled Servicesexposure: Controlled Services exposure solutions help enterprises to expose applications and services (or just the
specific features) to users and devices through a specific set of rules. This helps enterprises cost effectively provide security, compliance,
application provisioning and management for BYOD environments. Important features that enterprises need to consider:
 Centralized user access management
 Application Level Policy
 User Level Policy
 Device Level Policy
Vendor Characteristics
Enterasys Mobile IAM
 End-to-end visibility and control over access levels of applications, in multi-vendor infrastructures
 identity and role based policy management
 Mobile device complianceat network layer
AirWatch’s Mobile Device Management
Enterprise Mobility
Page viii Advaiya Solutions Pvt. Ltd.
 Configure device security policies based on device ownership
 Set up enrollment restrictions to block users or devices based on platform, version, etc.
 Require acceptance of Terms of Use before granting access
 Enforce restrictions on device features, apps and web browsing
 Detect compromised devices and perform automated actions
 Restrict native apps on a device, including YouTube, Siri and Camera
 Whitelist or blacklist publicly available apps
 Enforce application compliancepolicies and monitorstatus
 Control user’s ability to edit, share or open files in unauthorized applications
 Require user to view content online or prevent download over cellular connection
 Restrict document access to a specific location through geofencing
Absolute Manage for Mobile Device
 Publish a list of approved apps onto each device and provide a single-click download/install process
 Silently install/remove apps using management APIs
 Policies to define window of time to access secured documents and corporate networks.
 Policy-locked configuration profiles to stop non-compliant devices
AT&T Mobile Device Management
 Centrally manage user roles and access controls
 Set device policies per job function and user group
Case Study
City of Redlands Arms and Manages Mobile Devices for its Officers on Patrol. Now the force has access to critical information,
regardless of where they are, with the security that is demanded.
“What AT&T proposed to uswas MobileIron, a centralized platform for managing all our devices remotely. It immediately solved the biggest
issue, which was getting the 175 devices authenticated to use our Departmental apps. It also created our own private app store that makes
our apps available toevery device, as needed. Ad we continue to develop our custom applications and push more and more information
out to the mobile devices, we need to make sure that sensitive information isn’t accidentally made publicor put into the wrong hands.”
http://soc.att.com/VcNuwZ
SMS based servicesinvocation: SMS based services invocation solutions help enterprise integrate text/voice/multimedia messages to
enhance application value and business to harness the power of SMS for application interface and usability enhancements, customer
interaction, marketing etc. Important features that enterprises need to consider:
 SMS Integration with other services/Applications using APIs
 2 way SMS
 Bulk SMS
Vendor Characteristics
SMS Global
 Seamless integration with applications, including web sites, intranets, CRM's, ERP's and other corporate software through APIs
 Support of 2-way SMS for one-to-one communication with customers
 Set up a personalized sender ID for SMS
 Support of bulk SMS and WAP Push and VCard SMS
ZNI
 Platform independent APIs to integrate with applications for better control and functionality
 Used for lead generation and receiving feedbacks from customers
 Supports bulk SMS packages that can be sent directly from Excel sheet
Enterprise Mobility
Page ix Advaiya Solutions Pvt. Ltd.
SMS Matrix
 Send bulk message in fraction of seconds
 Integration with legacy applications via use of simple APIs
 Handles 2-way messaging using SMS, Voice and Text-to-Speech worldwide
 Offers bulk FAX broadcasting
 Bulk SMS scheduling
Easy SMS: Communicator 2
 Integrate with any backend system or application seamlessly with wide range of APIs
 Use of 2-way messaging and short codes for direct line of communication
 Set priority in bulk SMS while sending high volume of messages
 Send email to SMS to send out reminders
Enterprise Direct SMS
 Standard protocols to integrate with enterprises' applications
 Supports automated 2-way SMS communication channel forcustomers
 Personalized short codes without rental or purchase fees
 Multiple plans for different type of user
Mozeo Text Messaging
 Allow mobilecustomers share their thoughts and pictures in real time
 Text message marketing through use of uniquemobile keywords for interaction
 Supports mobile voting for an event, website or any marketing collaterals
 Bulk SMS text blasting through online account center
Case Study
Five Tuition, needed an easy and cost effective way to communicatewith a growing number staff and an expanding clientele base. With
SMSGlobal's API, Five Tuition integrated SMS into their existing database, to contact students, parents and staff via SMS.
"With growing communication demands, weneeded to find a method of communication that would integrate seamlessly with our
current system. Following the very simple online instructions, and with limited programming skills, I was able to successfully integrate
our existing system with SMSGlobal's HTTP API. Our staff can now send bulk SMS's to tutors, students, or parents with ease." Peter
Hanley, Manager, Five Tuition.
http://bit.ly/Wjz2oi
Enterprise Mobility Gateway: Enterprise Mobility gateway solutions helps organizations to selectively distribute enterprise application
and data with remote users accessing enterprise information through variety of personal and corporate devices. Important features that
enterprises need to consider:
 Enterprise application availability for mobile user
 User Access Controls
 Users/Device Authentication
Vendor Characteristics
Symantec App Center
 Policy enforcement for defining access controls for enterprise
 Enforce policies like user authentication, re-authentication, data encryption on local storage access, off-lineaccess
 Distribution of apps with corporate security and branding wrappers
NetScaler Access Gateway
 Seamless point of secure remote access
Enterprise Mobility
Page x Advaiya Solutions Pvt. Ltd.
 Supports single sign-on capabilities for all applications and data
 Manage access control and set polices based on identity, location and the configuration of the endpoint device
 User and device authentication based on the active directory
WSO2 Cloud Gateway
 Allows user to selectively publish services and data to the cloud in secure environment
 User based authentication and authorization.
 Administrator to manage access control and set polices based on user identity and roles
Roverapp
 Connect mobile devices with companies intranet applications securely without VPN
 Access corporate applications and data based on their access policies and controls
 Supports advance authentication methods
Case Study
To enable interactions between the mobilePOS systems and back-end software, ODEL has used components of the WSO2 Mobile
Services Gateway Solution. This mobile POS systems serves as an express checkout option for those customers using a credit card to
purchase five or fewer items.
“WSO2 is a valuable partnerin enabling us to offer new solutions like the mobile POS systems that help drive customer loyalty and set us
apart in the market.” – Thilanka Kiriporuwa, ODEL head of human resources and operations.
http://bit.ly/qtqmxH
Business Service Interface: Business Service Interface solutions allow organizations to expose internal applications through
intermediary services to facilitate effective business collaboration in B2B and remote working scenarios. Important features that
enterprises need to consider:
 Messaging format supports
 API support
 Integration solution library
Vendor Characteristics
e-Zest Enterprise Application Integration
 Supports Services oriented architectures (SOA’s) Messaging
 Object Request Broker (ORB), Remote Procedure Call (RPC) and Subscribe based communication integration
iWay Application System Adapters
 Supports transportation over messaging software like WebSphere MQ and JMS
 Provides direct links into packaged applications using a variety of APIs
Enterprise Application Integration
 Interactions with SaaS-based data via published APIs
 Drag and drop assembly of application integration flows
 Easily modifiable snaps based on open and standardized development environment
MuleSoft Connectors
 Instant API connectivity to most applications and services
 Provision of a library of repeatable integration solutions
EDI Application Integrator
 Powerful architecture to build a library of application program interfaces (API’s)
Enterprise Mobility
Page xi Advaiya Solutions Pvt. Ltd.
 EDI Application Integrator for drag and drop mapping
Jitterbit Application Integration Solutions
 Application integration solutions supporting Enterprise Service Bus (ESB), Service Oriented Architecture (SOA), and point-to-point
integration architectures
Case Study
ACAL BFi turned to Jitterbit to replace its unreliable coding-based integration with a standard platform to reduce the costs and
resources required to provide a single view of the company’s ERP and CRM data.
“Our previous integration tools were very slow and needed constant monitoring. In contrast, Jitterbit provided us with a st andard platform
on which to build our integration projects, allowing us to quickly and cost-effectively synchronize data between our ERP and CRM
applications. I have been able to configure and manage Jitterbit by myself, while giving the rest of the company an up -to-date view of all
our pertinent data within the application they use on a daily basis.” -Keith Lovern, Technical Operations
http://bit.ly/15kS2Ds
Enterprise Mobility
Page xii Advaiya Solutions Pvt. Ltd.
Conclusion
Consumerization of IT has significantly increased the use of mobile devices in everyday life. With this widespread use of personalized
devices to access corporate data, enterprise mobility management has gain prominence across various business verticals. With the
Flexible work style scenarios enterprise apps can no more be restricted to inside the firewall usage. Though consumerization of IT has
boosted employee productivity and flexibility but IT still has the responsibility to protect organizational intellectual property and is
struggling with bring your own device (BYOD) programs and mobile data management. The mobility management framework helps
business to determine current stage of enterprise mobility management, set and accomplish goals, and build roadmap to advance.
Enterprise Mobility
Page xiii Advaiya Solutions Pvt. Ltd.
References
Enterasys Mobile IAM
http://www.enterasys.com/products/advanced-security-apps/enterasys-network-access.aspx
http://onefabric.net/byod/ETS_Mobile_IAM-Tracking_Users_and_Devices.pdf
MaaS360 Mobile Device Management
http://www.maas360.com/products/mobile-device-management/
http://content.maas360.com/www/content/ds/ds_maas360_mdm_overview.pdf
AirWatch’s Mobile Device Management
http://www.air-watch.com/solutions/mobile-device-management
AirWatch's Mobile Security Solution
http://www.air-watch.com/solutions/mobile-security
Boxtone
http://boxtone.com/mobile-device-management.aspx
ProMDM
http://www.promdm.com/product-overview/
Absolute Manage for Mobile Device
http://www.absolute.com/products/absolute-manage-mdm
SMS Global
http://www.smsglobal.com/in/en/sms/apis.php
http://www.smsglobal.com/in/en/sms/bulk_sms.php
http://www.smsglobal.com/in/en/sms/2-way_sms.php
SMS Matrix
http://www.smsmatrix.com/?sms-messaging
ZNI
http://www.znisms.com/index.html
Easy SMS: Communicator 2
http://www.clickatell.com/get-creative-with-sms/
Enterprise Direct SMS
http://www.maxis.com.my/business/lmc/data/eds.asp
Mozeo Text Messaging
http://www.mozeo.com/text-messaging-services-features.php
Symantec App Center
Enterprise Mobility
Page xiv Advaiya Solutions Pvt. Ltd.
http://www.symantec.com/app-center-enterprise-edition
NetScaler Access Gateway
http://www.citrix.com/products/netscaler-access-gateway/overview.html
WSO2 Cloud Gateway
http://wso2.com/products/cloud-gateway/
Roverapp
http://roverapps.com/secure-browser
e-Zest Enterprise Application Integration
http://www.e-zest.net/it-services/custom-it-development/eai/
iWay Application System Adapters
http://www.informationbuilders.com/products/applicationsystemadapters
http://www.informationbuilders.com/products/pdf/iWaySysAdapters.pdf
Enterprise Application Integration
http://www.snaplogic.com/what-we-do/solutions/enterprise-application-integration.php
http://www.snaplogic.com/resources/white-paper/future-proof-your-cloud-integration.pdf
MuleSoft Connectors
http://www.mulesoft.com/cloud-connectors-full
EDI Application Integrator
http://www.gecti.com/gxs.html
Jitterbit Application Integration Solutions
http://www.jitterbit.com/Solutions/application-integration
Enterprise Mobility
Page xv Advaiya Solutions Pvt. Ltd.
Glossary
Term Long form/ Expansion Definition
BYOD Bring Your Own Device Bring your own device (BYOD) (also called bring your own technology (BYOT), bring
your own phone (BYOP), and bring your own PC (BYOPC/BYOC)) means thepolicy of
permitting employees to bring personally owned mobiledevices (laptops, tablets, and
smart phones) to their workplace, and use those devices to access privileged company
information and applications
AD Active Directory It is the software system that stores, organizes and provides access to information in a
directory. In software engineering, a directory is a map between names and values. It
allows the lookup of values given a name, similar to a dictionary
LDAP Lightweight Directory Access
Protocol
It is an application protocol for accessing and maintaining distributed directory
information services over an Internet Protocol (IP) network.
OTP One-time password A one-time password (OTP) is a password that is valid for only one login session or
transaction
SMS Short Message Service (SMS) Short Message Service (SMS) is a text messaging service component of phone, web, or
mobile communication systems, using standardized communications protocols that
allow the exchange of short text messages between fixed line or mobilephone devices
VOIP Voice Over Internet Protocol It commonly refers to the communication protocols, technologies, methodologies, and
transmission techniques involved in the delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Rooting It is the process of allowing users of smartphones, tablets, and other devices running
the mobile operating system to attain privileged control (known as "root access")
within subsystem.
Jailbreak
detection
Jailbreaking is the process of removing the limitations on mobile devices through the
use of software and hardware exploits. Jailbreaking permits root access to the
operating system, allowing the download of additional applications, extensions, and
themes that are unavailable through the official App Store.
Encryption Encryption is the process of encoding messages (or information) in such a way that
eavesdroppers or hackers cannot read it, but that authorized parties can
Single sign-
on
Single sign-on (SSO) is a property of access control of multiple related, but
independent software systems. With this property a user logs in once and gains access
to all systems without being prompted to log in again at each of them.
Conversely, Single sign-off is the property whereby a single action of signing out
terminates access to multiplesoftware systems.
App
blacklisting/
Whitelisting
Application Whitelisting is a proactive security method where only approved
programs are allowed to run and blocking rest of the programs from running by
default.
On the contrary, Application Blacklisting blocks certain programs while allowing rest to
run by default.
SD Secure Digital Secure Digital or (SD) is a non-volatile memory card format for use in portable devices,
such as mobile phones, digital cameras, GPS navigation devices, and tablet computers.
Sandbox Sandbox (computer security), a virtual container in which untrusted programs can be
safely run.
Sandbox (software development), an online environment in which code or content
changes can be tested without affecting the original system
DLP Data Leakage Prevention Data loss/leak prevention solution is a system that is designed to detect potential data
breach / data ex-filtration transmissions and prevent them by monitoring, detecting &
blocking sensitive data while in-use(endpoint actions), in-motion (network traffic), and
Enterprise Mobility
Page xvi Advaiya Solutions Pvt. Ltd.
at-rest (data storage)
OTA Over-the-Air A general term for wireless programming of devices such as mobile phones and set-
top boxes
SAML Security Assertion Markup
Language
It is an XML-based open standard data format for exchanging authentication and
authorization data between parties, in particular, between an identity provider and a
service provider.
SCEP Simple Certificate Enrollment
Protocol
Simple Certificate Enrollment Protocol is an Internet Draft in the Internet Engineering
Task Force (IETF). This protocol is being referenced by several manufacturers of
network equipment and software who are developing simplified means of handling
certificates for large-scale implementation to everyday users.
Quarantine Isolation of unfit devices to ensure data and application security
API Application Programming
Interface
An application programming interface (API) is a protocol intended to be used as an
interface by software components to communicatewith each other. An API is a library
that may includespecification for routines, data structures, object classes, and
variables.
CRM Customer Relationship
Management
Customer relationship management (CRM) is a model for managing a company’s
interactions with current and future customers. It provides a 360 degree view of
customer data. [citation needed] It involves using technology to organize, automate,
and synchronize sales, marketing, customer service, and technical support.
ERP Enterprise Resource Planning Enterprise resource planning (ERP) systems integrate internal and external
management information across an entire organization—embracing
finance/accounting, manufacturing, sales and service, customer relationship
management, etc. ERP systems automate this activity with an integrated software
application. The purpose of ERP is to facilitate the flow of information between all
business functions inside the boundaries of the organization and manage the
connections to outside stakeholders.
WAP Wireless Application Protocol Wireless Application Protocol (WAP) is a technical standard for accessing information
over a mobile wireless network. A WAP browser is a web browser for mobile devices
such as mobile phones that uses the protocol.
VCard vCard is a file format standard for electronic business cards
VPN Virtual Private Network A virtual private network (VPN) extends a private network and the resources contained
in the network across public networks like the Internet. It enables a host computer to
send and receive data across shared or public networks as if it were a private network
with all the functionality, security and management policies of the private network
SOA Services oriented Architecture Service-oriented architecture (SOA) is a set of principles and methodologies for
designing and developing software in the form of interoperable services. These services
have well-defined business functionalities that are built as software components
(discrete pieces of code and/or data structures) which can be reused for different
purposes
ORB Object Request Broker Object request broker (ORB) is a piece of middleware software that allows
programmers to make program calls from one computer to another via a network (so-
called remote procedure calls). ORBs promote interoperability of distributed object
systems because they enable users to build systems by piecing together objects from
different vendors, so that they communicatewith each other via the ORB.
Enterprise Mobility
Page xvii Advaiya Solutions Pvt. Ltd.
RPC Remote Procedure Call Remote procedure call (RPC) is an inter-process communication that allows a computer
program to cause a subroutine or procedure to execute in another address space
(commonly on another computer on a shared network) without the programmer
explicitly coding the details for this remote interaction.
SaaS Software as a Service Software as a service, sometimes referred to as "on-demand software", is a software
delivery model in which software and associated data are centrally hosted on the
cloud. SaaS is typically accessed by users using a thin client via a web browser.
EDI Electronic data interchange It is a method for transferring data between different computer systems or computer
networks. It is commonly used by big companies for e-commercepurposes, such as
sending orders to warehouses or tracking their order.
ESB Enterprise Service Bus An enterprise service bus (ESB) is a software architecture model used for designing and
implementing the interaction and communication between mutually interacting
software applications in service-oriented architecture (SOA). As a software architecture
model for distributed computing it is a specialty variant of the more general client
server software architecture model and promotes agility and flexibility with regards to
communication and interaction between applications.
Enterprise Mobility
Page xviii Advaiya Solutions Pvt. Ltd.
Contact Us
Advaiya Solutions Pvt. Ltd.
G14-17, IT Park, Madri Industrial Area, Udaipur 313002 India
Phone:+91 294 305 1100 | Fax:+91 294 305 1300
infoudr@advaiya.com
Advaiya, Inc. (Washington)
2475 140th Ave NE, Suite 201, Bellevue, WA 98005 USA
Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201
Advaiya, Inc. (Silicon Valley)
440 North Wolfe Road, Sunnyvale, CA 94085, Silicon Valley
Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201

More Related Content

What's hot

Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)Ian Gertler
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessKloudData Inc
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesJan Vermeesch
 
Apperian 2014 Executive Enterprise Mobility Report
Apperian 2014 Executive Enterprise Mobility ReportApperian 2014 Executive Enterprise Mobility Report
Apperian 2014 Executive Enterprise Mobility ReportJennifer Walker
 
Mastering Code Halos Using Digital Insights to Drive Customer Experiences
Mastering Code Halos Using Digital Insights to Drive Customer ExperiencesMastering Code Halos Using Digital Insights to Drive Customer Experiences
Mastering Code Halos Using Digital Insights to Drive Customer ExperiencesCognizant
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceTricia Stream
 
Wearable for individual enterprise
Wearable for individual enterpriseWearable for individual enterprise
Wearable for individual enterpriseRichard Jo
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your OrganizationCognizant
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)Dr Dev Kambhampati
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Sophie Jasson-Holt
 
The cognitive advantage
The cognitive advantageThe cognitive advantage
The cognitive advantageYann Lecourt
 
Four ways to improve dmps
Four ways to improve dmpsFour ways to improve dmps
Four ways to improve dmpsJim Nichols
 
The unified user profile fin. (1)
The unified user profile fin. (1)The unified user profile fin. (1)
The unified user profile fin. (1)abdullah-059
 
18 misconceptions in Enterprise Mobility
18 misconceptions in Enterprise Mobility18 misconceptions in Enterprise Mobility
18 misconceptions in Enterprise MobilityCloudPact
 
Application modernization
Application modernizationApplication modernization
Application modernizationDaniel Sapir
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
Tb mobile office presentation
Tb   mobile office presentationTb   mobile office presentation
Tb mobile office presentationDorothy Davis
 

What's hot (20)

Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companies
 
Apperian 2014 Executive Enterprise Mobility Report
Apperian 2014 Executive Enterprise Mobility ReportApperian 2014 Executive Enterprise Mobility Report
Apperian 2014 Executive Enterprise Mobility Report
 
Mastering Code Halos Using Digital Insights to Drive Customer Experiences
Mastering Code Halos Using Digital Insights to Drive Customer ExperiencesMastering Code Halos Using Digital Insights to Drive Customer Experiences
Mastering Code Halos Using Digital Insights to Drive Customer Experiences
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital Workspace
 
Wearable for individual enterprise
Wearable for individual enterpriseWearable for individual enterprise
Wearable for individual enterprise
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your Organization
 
Nr crm
Nr crmNr crm
Nr crm
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
 
The cognitive advantage
The cognitive advantageThe cognitive advantage
The cognitive advantage
 
Four ways to improve dmps
Four ways to improve dmpsFour ways to improve dmps
Four ways to improve dmps
 
Isbb chapter1
Isbb chapter1Isbb chapter1
Isbb chapter1
 
The unified user profile fin. (1)
The unified user profile fin. (1)The unified user profile fin. (1)
The unified user profile fin. (1)
 
18 misconceptions in Enterprise Mobility
18 misconceptions in Enterprise Mobility18 misconceptions in Enterprise Mobility
18 misconceptions in Enterprise Mobility
 
Application modernization
Application modernizationApplication modernization
Application modernization
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Tb mobile office presentation
Tb   mobile office presentationTb   mobile office presentation
Tb mobile office presentation
 
IT Orchestration Frameworks
IT Orchestration Frameworks IT Orchestration Frameworks
IT Orchestration Frameworks
 

Viewers also liked

Running Internet Systems in China
Running Internet Systems in ChinaRunning Internet Systems in China
Running Internet Systems in ChinaCasey Lau
 
Soa best practices_1013x_drop3
Soa best practices_1013x_drop3Soa best practices_1013x_drop3
Soa best practices_1013x_drop3Meng He
 
Amitec RF and Microwave Product catalog
Amitec RF and Microwave Product catalogAmitec RF and Microwave Product catalog
Amitec RF and Microwave Product catalogSumit Sharma
 
Desenvolvimento web com Ruby on Rails (parte 2)
Desenvolvimento web com Ruby on Rails (parte 2)Desenvolvimento web com Ruby on Rails (parte 2)
Desenvolvimento web com Ruby on Rails (parte 2)Joao Lucas Santana
 
The Future of Telecoms in Africa, Feb 2014, Deloitte
The Future of Telecoms in Africa, Feb 2014, DeloitteThe Future of Telecoms in Africa, Feb 2014, Deloitte
The Future of Telecoms in Africa, Feb 2014, DeloitteAdrian Hall
 
Zimbabwe's Broadband Infrastructure: Shifting focus from supply to consumption
Zimbabwe's Broadband Infrastructure: Shifting focus from supply to consumptionZimbabwe's Broadband Infrastructure: Shifting focus from supply to consumption
Zimbabwe's Broadband Infrastructure: Shifting focus from supply to consumptiontechzimslides
 
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5Splunk
 
Future of Wearable Tech 2014 (PSFK, IQ Intel)
Future of Wearable Tech 2014 (PSFK, IQ Intel)Future of Wearable Tech 2014 (PSFK, IQ Intel)
Future of Wearable Tech 2014 (PSFK, IQ Intel)Vasily Ryzhonkov
 
41186744 study-of-indian-leather-industry-2003-version
41186744 study-of-indian-leather-industry-2003-version41186744 study-of-indian-leather-industry-2003-version
41186744 study-of-indian-leather-industry-2003-versionAbdul Mannan
 
La Bénédiction - The Blessing
La Bénédiction - The BlessingLa Bénédiction - The Blessing
La Bénédiction - The BlessingFreekidstories
 
Automotive+megatrends+magazine+q2+2014
Automotive+megatrends+magazine+q2+2014Automotive+megatrends+magazine+q2+2014
Automotive+megatrends+magazine+q2+2014dkcvoom
 

Viewers also liked (18)

Running Internet Systems in China
Running Internet Systems in ChinaRunning Internet Systems in China
Running Internet Systems in China
 
SSNZ Auckland Newsletter September issue 22
SSNZ Auckland Newsletter September issue 22SSNZ Auckland Newsletter September issue 22
SSNZ Auckland Newsletter September issue 22
 
Soa best practices_1013x_drop3
Soa best practices_1013x_drop3Soa best practices_1013x_drop3
Soa best practices_1013x_drop3
 
Alccs brochure
Alccs brochureAlccs brochure
Alccs brochure
 
Amitec RF and Microwave Product catalog
Amitec RF and Microwave Product catalogAmitec RF and Microwave Product catalog
Amitec RF and Microwave Product catalog
 
Artigo anonymous
Artigo anonymousArtigo anonymous
Artigo anonymous
 
Desenvolvimento web com Ruby on Rails (parte 2)
Desenvolvimento web com Ruby on Rails (parte 2)Desenvolvimento web com Ruby on Rails (parte 2)
Desenvolvimento web com Ruby on Rails (parte 2)
 
Securing android applications
Securing android applicationsSecuring android applications
Securing android applications
 
The Future of Telecoms in Africa, Feb 2014, Deloitte
The Future of Telecoms in Africa, Feb 2014, DeloitteThe Future of Telecoms in Africa, Feb 2014, Deloitte
The Future of Telecoms in Africa, Feb 2014, Deloitte
 
Zimbabwe's Broadband Infrastructure: Shifting focus from supply to consumption
Zimbabwe's Broadband Infrastructure: Shifting focus from supply to consumptionZimbabwe's Broadband Infrastructure: Shifting focus from supply to consumption
Zimbabwe's Broadband Infrastructure: Shifting focus from supply to consumption
 
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
 
Future of Wearable Tech 2014 (PSFK, IQ Intel)
Future of Wearable Tech 2014 (PSFK, IQ Intel)Future of Wearable Tech 2014 (PSFK, IQ Intel)
Future of Wearable Tech 2014 (PSFK, IQ Intel)
 
Alternative Civil Society Declaration
Alternative Civil Society DeclarationAlternative Civil Society Declaration
Alternative Civil Society Declaration
 
Beach Life Issue#Issue3
Beach Life Issue#Issue3Beach Life Issue#Issue3
Beach Life Issue#Issue3
 
41186744 study-of-indian-leather-industry-2003-version
41186744 study-of-indian-leather-industry-2003-version41186744 study-of-indian-leather-industry-2003-version
41186744 study-of-indian-leather-industry-2003-version
 
Katalog produk-chauvin-arnoux-2014-tridinamika
Katalog produk-chauvin-arnoux-2014-tridinamikaKatalog produk-chauvin-arnoux-2014-tridinamika
Katalog produk-chauvin-arnoux-2014-tridinamika
 
La Bénédiction - The Blessing
La Bénédiction - The BlessingLa Bénédiction - The Blessing
La Bénédiction - The Blessing
 
Automotive+megatrends+magazine+q2+2014
Automotive+megatrends+magazine+q2+2014Automotive+megatrends+magazine+q2+2014
Automotive+megatrends+magazine+q2+2014
 

Similar to Assessing Enterprise Mobility Trends, Challenges and Optimization Framework

Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachRapidValue
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
Enabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesEnabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesNIIT Technologies
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung at Work
 
G06.2014 magic-quadrant-for-enterprise-mobility-management-suites
G06.2014   magic-quadrant-for-enterprise-mobility-management-suitesG06.2014   magic-quadrant-for-enterprise-mobility-management-suites
G06.2014 magic-quadrant-for-enterprise-mobility-management-suitesSatya Harish
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
HTCpro White Paper
HTCpro White PaperHTCpro White Paper
HTCpro White Papersthakkar12
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsTAKE Supply Chain
 
201306 CIO NET Mobility Survey
201306 CIO NET Mobility Survey201306 CIO NET Mobility Survey
201306 CIO NET Mobility SurveyFrancisco Calzado
 
Wearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital FrontierWearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital FrontierCognizant
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco
 
Ubiwhere Research and Innovation Profile
Ubiwhere Research and Innovation ProfileUbiwhere Research and Innovation Profile
Ubiwhere Research and Innovation ProfileUbiwhere
 
mobility-new-enterprise-platform-2033534 (1)
mobility-new-enterprise-platform-2033534 (1)mobility-new-enterprise-platform-2033534 (1)
mobility-new-enterprise-platform-2033534 (1)Debora Cintron
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyMobile Labs
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfJPLoft Solutions
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 

Similar to Assessing Enterprise Mobility Trends, Challenges and Optimization Framework (20)

Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approach
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Enabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesEnabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth Opportunities
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
 
G06.2014 magic-quadrant-for-enterprise-mobility-management-suites
G06.2014   magic-quadrant-for-enterprise-mobility-management-suitesG06.2014   magic-quadrant-for-enterprise-mobility-management-suites
G06.2014 magic-quadrant-for-enterprise-mobility-management-suites
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
HTCpro White Paper
HTCpro White PaperHTCpro White Paper
HTCpro White Paper
 
Handheld Applications guidebook
Handheld Applications guidebookHandheld Applications guidebook
Handheld Applications guidebook
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
201306 CIO NET Mobility Survey
201306 CIO NET Mobility Survey201306 CIO NET Mobility Survey
201306 CIO NET Mobility Survey
 
Wearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital FrontierWearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital Frontier
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
Ubiwhere Research and Innovation Profile
Ubiwhere Research and Innovation ProfileUbiwhere Research and Innovation Profile
Ubiwhere Research and Innovation Profile
 
mobility-new-enterprise-platform-2033534 (1)
mobility-new-enterprise-platform-2033534 (1)mobility-new-enterprise-platform-2033534 (1)
mobility-new-enterprise-platform-2033534 (1)
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 

More from Advaiya Solutions, Inc.

Microsoft PSA: Service Automation in Action
Microsoft PSA: Service Automation in ActionMicrosoft PSA: Service Automation in Action
Microsoft PSA: Service Automation in ActionAdvaiya Solutions, Inc.
 
Power BI reports and dashboards for Microsoft Project Server
Power BI reports and  dashboards for Microsoft Project ServerPower BI reports and  dashboards for Microsoft Project Server
Power BI reports and dashboards for Microsoft Project ServerAdvaiya Solutions, Inc.
 
What is Influencer marketing and Influencer Activator ?
What is Influencer marketing and Influencer Activator ?What is Influencer marketing and Influencer Activator ?
What is Influencer marketing and Influencer Activator ?Advaiya Solutions, Inc.
 
What is Persona development and how to create effective user persona?
What is Persona development and how to create effective user persona?What is Persona development and how to create effective user persona?
What is Persona development and how to create effective user persona?Advaiya Solutions, Inc.
 
Yammer - A Social platform for Enterprise
Yammer - A Social platform for EnterpriseYammer - A Social platform for Enterprise
Yammer - A Social platform for EnterpriseAdvaiya Solutions, Inc.
 
Top Social media marketing tips for success | Advaiya
Top Social media marketing tips for success | AdvaiyaTop Social media marketing tips for success | Advaiya
Top Social media marketing tips for success | AdvaiyaAdvaiya Solutions, Inc.
 
Why your business should invest in Search Engine Optimization (SEO) today
Why your business should invest in Search Engine Optimization (SEO) todayWhy your business should invest in Search Engine Optimization (SEO) today
Why your business should invest in Search Engine Optimization (SEO) todayAdvaiya Solutions, Inc.
 
5 ways to improve your enterprise social collaboration with SharePoint2013 | ...
5 ways to improve your enterprise social collaboration with SharePoint2013 | ...5 ways to improve your enterprise social collaboration with SharePoint2013 | ...
5 ways to improve your enterprise social collaboration with SharePoint2013 | ...Advaiya Solutions, Inc.
 
Quagmire of Projects and Deadlines - Advaiya EPM Man to the rescue
Quagmire of Projects and Deadlines - Advaiya EPM Man to the rescueQuagmire of Projects and Deadlines - Advaiya EPM Man to the rescue
Quagmire of Projects and Deadlines - Advaiya EPM Man to the rescueAdvaiya Solutions, Inc.
 
Primavera vs Microsoft Project Professional
Primavera vs Microsoft Project ProfessionalPrimavera vs Microsoft Project Professional
Primavera vs Microsoft Project ProfessionalAdvaiya Solutions, Inc.
 
Is Content Marketing still the king | infographic
Is Content Marketing still the king | infographicIs Content Marketing still the king | infographic
Is Content Marketing still the king | infographicAdvaiya Solutions, Inc.
 
Wearable Tech Roundup: What’s on Offer
Wearable Tech Roundup: What’s on OfferWearable Tech Roundup: What’s on Offer
Wearable Tech Roundup: What’s on OfferAdvaiya Solutions, Inc.
 

More from Advaiya Solutions, Inc. (20)

Microsoft PSA: Service Automation in Action
Microsoft PSA: Service Automation in ActionMicrosoft PSA: Service Automation in Action
Microsoft PSA: Service Automation in Action
 
7 Updates in Microsoft Project 2016
7 Updates in Microsoft Project 20167 Updates in Microsoft Project 2016
7 Updates in Microsoft Project 2016
 
Power BI reports and dashboards for Microsoft Project Server
Power BI reports and  dashboards for Microsoft Project ServerPower BI reports and  dashboards for Microsoft Project Server
Power BI reports and dashboards for Microsoft Project Server
 
Share point 2016
Share point 2016Share point 2016
Share point 2016
 
Search trends 2016
Search trends 2016Search trends 2016
Search trends 2016
 
What is Influencer marketing and Influencer Activator ?
What is Influencer marketing and Influencer Activator ?What is Influencer marketing and Influencer Activator ?
What is Influencer marketing and Influencer Activator ?
 
What is Persona development and how to create effective user persona?
What is Persona development and how to create effective user persona?What is Persona development and how to create effective user persona?
What is Persona development and how to create effective user persona?
 
Yammer - A Social platform for Enterprise
Yammer - A Social platform for EnterpriseYammer - A Social platform for Enterprise
Yammer - A Social platform for Enterprise
 
Top Social media marketing tips for success | Advaiya
Top Social media marketing tips for success | AdvaiyaTop Social media marketing tips for success | Advaiya
Top Social media marketing tips for success | Advaiya
 
Why your business should invest in Search Engine Optimization (SEO) today
Why your business should invest in Search Engine Optimization (SEO) todayWhy your business should invest in Search Engine Optimization (SEO) today
Why your business should invest in Search Engine Optimization (SEO) today
 
5 ways to improve your enterprise social collaboration with SharePoint2013 | ...
5 ways to improve your enterprise social collaboration with SharePoint2013 | ...5 ways to improve your enterprise social collaboration with SharePoint2013 | ...
5 ways to improve your enterprise social collaboration with SharePoint2013 | ...
 
Open source CMS comparison
Open source CMS comparisonOpen source CMS comparison
Open source CMS comparison
 
Windows 10 - Adoption on the rise
Windows 10 - Adoption on the riseWindows 10 - Adoption on the rise
Windows 10 - Adoption on the rise
 
Quagmire of Projects and Deadlines - Advaiya EPM Man to the rescue
Quagmire of Projects and Deadlines - Advaiya EPM Man to the rescueQuagmire of Projects and Deadlines - Advaiya EPM Man to the rescue
Quagmire of Projects and Deadlines - Advaiya EPM Man to the rescue
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Enterprise apps
Enterprise appsEnterprise apps
Enterprise apps
 
Primavera vs Microsoft Project Professional
Primavera vs Microsoft Project ProfessionalPrimavera vs Microsoft Project Professional
Primavera vs Microsoft Project Professional
 
Ladies to the rescue
Ladies to the rescueLadies to the rescue
Ladies to the rescue
 
Is Content Marketing still the king | infographic
Is Content Marketing still the king | infographicIs Content Marketing still the king | infographic
Is Content Marketing still the king | infographic
 
Wearable Tech Roundup: What’s on Offer
Wearable Tech Roundup: What’s on OfferWearable Tech Roundup: What’s on Offer
Wearable Tech Roundup: What’s on Offer
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Assessing Enterprise Mobility Trends, Challenges and Optimization Framework

  • 2. Enterprise Mobility Page ii Advaiya Solutions Pvt. Ltd. Contents Introduction...........................................................................................................................................................1 Trends, Challenges, and Drivers...........................................................................................................................2 Enterprise Mobility Maturity and Optimization Framework............................................................................4 Key Mobility Considerations and Vendor Characteristics.................................................................................6 Conclusion............................................................................................................................................................12 References............................................................................................................................................................13 Glossary................................................................................................................................................................15
  • 3. Enterprise Mobility Page i Advaiya Solutions Pvt. Ltd. Introduction IT grapples with the need to extend enterprise architecture to include mobility considerations making personal devices as business tools. Mobile devices bring enterprise data to new roles, supporting a seamless mobile experience. Businesses pursue opportunities to stay ahead of the competition, providing users with secure and compliant information, anytimeand anywhere on mobile infrastructure. Theprimary research of current landscape of mobile solutions for varying business needs provided with the mobility optimization framework and considerations for mobile app management. Various analyst firms and IT firms including IDC, Gartner, Aberdeen, Intel etc. have carried our researches and conducted surveys on Enterprise Mobility. In one such study, Gartner observed that consumerization and the ubiquity of connected smart devices, people's behavior has caused a convergenceof these forces. A Nexus of converging forces — social, mobile, cloud and information — is building upon and transforming user behavior while creating new business opportunities. Mobile computing is forcing the biggest change to the way work. It changes how they spend theirday. Mass adoption forces new infrastructure. It spawns new businesses. And it threatens the status quo1 . The innovation rate in mobile devices, social software and cloud computing is accelerating fasterthan the enterprise adaptation rate. IT organizations that fail to adapt to this new reality will lose their relevance in the era of pervasive mobility.2 With this comes the responsibility for Businesses to consider mobility management as important as datacenter management. This is the core premise of study – that enterprise mobility management deals with Mobile Strategy and Roadmap, Mobile Device Management, Mobile Device Security, Mobile Device Policy, Enterprise Application Enablement, Mobile App Management. We have studied mobility trends and studies from various analysts, mobility solutions of leader vendors and developed Enterprise Mobility framework with three maturity levels (Mobileaware, Mobile enabled, Mobile enterprise) of these capabilities through which organizations can advancewith a strategic roadmap and accruemeasurable business value.3 This paper discusses trends and challenges affecting enterprise mobility and how organizations can effectively build and deploy around enterprise mobility framework 1 Gartner, The Nexus of Forces: Foundational Research for the Technical Professional, June 2012, http://www.gartner.com/technology/research/technical-professionals/nexus-of-forces.jsp 2 Gartner, Enterprise Mobility and Its Impact on IT, April 2012, http://www.gartner.com/technology/research/technical-professionals/mobility.jsp 3 Aberdeen Group, Enterprise Mobility Management 2012, April 2012, http://content.maas360.com/www/content/ar/Aberdeen_SoMoClo_2012.pdf Analyzing mobility infrastructure and architecture helps enterprise to quickly assess the technology landscape, current trends and make company data available in real time with device support across various platforms.
  • 4. Enterprise Mobility Page ii Advaiya Solutions Pvt. Ltd. Trends, Challenges, and Drivers In today’s changing markets, enterprises face several challenges in creating an enterprise mobility strategy. The challenge is not building mobile application but providing mobile application platform. They need to slowly move up the maturity curve in adopting mobility. Trends  70% of mobile professionals will conduct their work on personal smart devices by 20184  BYOC is attracting interest from organizations that look to reduce IT costs and satisfy user demands for device choice, While "bring your own computer" removes some of IT's desktop management responsibility, IT must make additional management investments to make it work.5  Enterprise tablet adoption will grow by 50 percent annually. In addition, 71 percent of workers surveyed use tablets as an additional device rather than a computer replacement6  More than 40 percent of all enterprise web applications will have mobile apps by 2014, and 90 percent of companies will support corporate apps on mobile devices by 20147  Expect MDM to fade from marketing language in 2013, replaced by MAM (mobile application management) or MEM (mobile enterprise management).8  2013 will bring a lot more integration between mobile apps and the cloud. Wherever possible, you won't have data that resides on the device.9  Security, manageability, and remote wipe capabilities are top requirements for a successful BYOD program10 Drivers11 4 Gartner, Bring Your Own Device, 2013 http://www.gartner.com/technology/topics/byod.jsp 5 Gartner, The Impact of BYOC on Management and Support, October 2011 http://www.gartner.com/id=1820215 6 ClickSoftware.com, 2013 http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 7 Gartner, 2013 http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 8 Information Week, 2013 http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-predictions-for-20/240145435 9 451 Research – Hazelton, 2013 http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-predictions-for-20/240145435?pgno=2 10 Intel, Insights on the Current State of BYOD, October 2012 http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/consumerization-enterprise-byod-peer-research-paper.pdf 11 Cognizant, F orces Driving Enterprise Mobility http://www.cognizant.com/insights/perspectives/forces-driving-enterprise-mobility Support flexible workstyle to drive employee satisfaction Enhancing remote productivity Increased Use of Mobility by Consumers
  • 5. Enterprise Mobility Page iii Advaiya Solutions Pvt. Ltd. Challenges12 12 IQT, The Challenges of Enterprise Mobility http://www.iqt.org/portfolio/on-our-ra dar/Enterprise_mobility.pdf Securing corporate Information systems with increase in offsite work through personal devices Integrating mobile apps with enterprise systems Supporting variety of mobile devices and rapidly changing mobile technology Managing what’s on the mobile device
  • 6. Enterprise Mobility Page iv Advaiya Solutions Pvt. Ltd. Enterprise Mobility Maturity and Optimization Framework Optimization is a structured, systematic process of assessing mobile infrastructure and architecture maturity across IT and Business world. Theprocess begins with where the mobility infrastructure is and where the enterprise wants it to be. Enterprise mobility framework defines 3 maturity phases as Mobile Aware, Mobile Enabled and Mobile Enterprise. The Enterprise Mobility Maturity Model capabilities, maturity definitions and features are illustrated below. Capability Mobile Aware Mobile Enabled Mobile Enterprise Mobile Strategy and Roadmap Agreed upon strategic direction, no mobile strategy roadmap Strategy published and communicated, bottom- up driven roadmap Mobile strategy drives the mobility roadmap, measured results feed the strategy Mobile Device Management Limited platform specific management Platform specific, comprehensive device management Centrally managed, policy driven, integrated device management Features  Web based authentication  Corporate device provisioning by IT  Certificates, passcodes, multifactorauthentication, single sign-on to apps and data  Device enrollment through web-portal, e-mail, over-the-air using smartphones/tablets application, or SMS with OTP authentication.  Central policy management system for endpoint devices  Predictive analytics, proactive alerting, real-time diagnostics and problem resolution  Remote support and troubleshooting including VOIP and chat  AD/LDAP based authentication  Personal device provisioning and self-service enrollment  Management console with strong dashboard and detailed reporting capabilities (role-based views) Mobile Device Security Limited platform specific device security Cross platform mobile device security Fully managed cross platform mobile device security Features  Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking, context-aware policies, app blacklist/whitelist  Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking, context-aware policies, app blacklist/whitelist  Encryption policy (phone, SD)  Lockdown security (camera, SD, Bluetooth, Wi-Fi)  Password enforcement  Remote lock and wipe Mobile Aware Unmanaged user devices used in the organization in limitied capacity Use of pilot application Mobile Enabled Partially managed devices connect to limited company resources Handful of mobile applications Mobile Enterprise Fully managed employees and company devices participate in enterprise workflow 1 2 3
  • 7. Enterprise Mobility Page v Advaiya Solutions Pvt. Ltd.  App inventory, distribution  Real-time, permission-based remote control  Enterprise data boundary with selective wipe and privacy policies  Access Control (Sentry) with ActiveSync connection activity, device visibility and blocking of email access  Certificate distribution  Secure administration with role-based access, group-based actions and persistent logs and audit trails  Lost phone recovery (locate and map) Mobile Device Policy Platform specific mobile device policy Established cross platform device policies Fully defined & enforced mobile device policies across all devices Features  Web content filtering and URL filtering on mobile devices  Mobile policies based on OS and patch levels, passcodes, device ownership, apps and device resources, platform-specific policies, encryption, device status and location  Quarantine noncompliant devices based on policies, devices, operating system versions, and complianceviolation Enterprise Application Enablement Limited enablement of select enterprise functions Key enterprise functions and processes are mobile enabled Mobility enables business process innovation Features  Embedded VPN and sandbox that can control and encrypt application traffic.  App wrapping to import mobileapps  Enables smartphone/tablet users to subscribe to enterprise document and database updates through the enterprise application distribution function  SMS Integration with other services/Applications using APIs  Application authorization even on platforms that do not support blacklisting /whitelisting Mobile App Management Unmanaged mobile Apps Unmanaged commercial and managed custom mobile apps Fully managed mobilebusiness apps portfolio Features  Enterprise App Catalogues  Advanced distribution rules selecting eligible devices based on both inclusion and exclusion criteria  Push updated versions automatically for on-demand apps  On-demand installation using app catalog  Public Appstore integration  Prevent data backup and automatically remove apps on un-enrollment  Track and view installed/approved/blacklisted applications at the device/user level  Remotely manage application settings on supported apps through Application Profiles  Container approach to separate personal versus corporate data  Secure business apps and data with encryption and mobile DLP technologies  Granular policy-based management and access controls Overall Unmanaged consumer mobile devices used in organization in limited capacity Partially managed devices connect to limited company resources Fully managed company and employee devices participate in enterprise workflow
  • 8. Enterprise Mobility Page vi Advaiya Solutions Pvt. Ltd. Key Mobility Considerations and Vendor Characteristics There are three leading platforms in the mobilesegment—smartphones, tablets, and notebooks PCs - and new In-Stat (www.in- stat.com) research forecasts that this category of mobile “magnet platforms” will grow at a CAGR of 25.7% through 2015 as com pared to 8.7% for the overall mobile market. Employees use smartphones, tablets or personal devices at workplaces to access corporate networks, business applications and data to maximize connectivity and productivity. This demands for the need of secure and compliant access to applications and data on various mobile platforms. The mobility landscape in India is rapidly evolving. Enterprises are embracing mobility to improve work productivity and experience of customers.13 The research lays emphasis on the essentials of enterprise mobility and its integration i.e. Mobile Device Management, Controlled Services Exposure, SMS based Service Invocation, Enterprise Mobility Gateway and Business Service Interface. 14 Mobile Device Management: Mobile device management (MDM) solutions help enterprises manage smartphones and tablets by providing centralized, multivendor device management that results in lower risk and improved cost of ownership. Although the MDM market is fragmented with point solutions, it is evolving toward broader solutions that will eventually support application, security, policy, and device and service management. Important MDM features that enterprises need to consider:  Device Registration/De-registration  Bring Your Own Device  Authentication Methods Vendor Characteristics Enterasys Mobile IAM 13 NASSCOM, Mobility on the Move in India, Zinnov Managemen Consulting http://www.nasscom.org/mobility-move-india?fg=162893 14 Gartner, Mobile Device Management Evaluation Criteria, January 2012 http://www.gartner.com/DisplayDocument?docC ode=217549&ref=g_fromdoc Key Trends  ERP, CRM, SCM, along with email solutions expected to fuel the growth of the mobility market  Application maturity increase from the current dashboarding level to complete back-end integration  Declining mobility solutions costs are enabling SMBs to join the enterprise mobility bandwagon India’s mobility landscape:  840 million active mobiles operational  15% of smartphone market share  About 15 million mobile subscribers added every month  Laptop market is growing at a CAGR of 50 per cent  PC penetration in urban households have reached 38 per cent  There is an installed base of 25 million computers in India
  • 9. Enterprise Mobility Page vii Advaiya Solutions Pvt. Ltd.  Simplified onboarding and provisioning  Secure, IT controlled BYOD solution with predictable network experience  Web based registration, Kerberos Snooping or activeAuthentication via 802.1X AirWatch’s Mobile Device Management  Employee owned and corporate owned devices deployed by IT admin or end user  Support for all major mobile platforms for a flexible BYOD program  Directory-based authentication, Via AD/LDAP, SAML, smart-card or tokens, two-factor user authentication MaaS360 Mobile Device Management  Over the air (OTA) enrollment requests (SMS, emails, custom URL)  Device decommissioning by removal of corporate data  Corporate and employee owned (BYOD) device  Authenticate against Active Directory (AD)/ Lightweight Directory Access Protocol (LDAP), using a one-timepasscode, or with Security Assertion Markup Language (SAML) Boxtone  OTA automated device self-provisioning  Enterprise-wide device Activate/Deactivate/Wipe/Quarantine  Users’ personal devices for BYOD ProMDM  OTA Device enrollment using iPhone/iPad application, or SMS with OTP authentication.  BYOD with separation of private and business information based on multipleprofiles  Simple Certificate Enrollment Protocol (SCEP) certificates for authentication Case Study Henry Ford Health System has deployed AirWatch − which currently secures and ensures BYOD compliancefor approximately 3,000 corporate-owned mobile devices and 2,500 personal devices. “Much of what we do as an IT organization is in response to what our customer base wants. With the capabilities of the [MDM platform], it fulfills what we need to do. We’re very pleased with the product and the way it is in our environment.” - Michael Staroscia, Client Technical Services Manager http://bit.ly/ZL1GQq Controlled Servicesexposure: Controlled Services exposure solutions help enterprises to expose applications and services (or just the specific features) to users and devices through a specific set of rules. This helps enterprises cost effectively provide security, compliance, application provisioning and management for BYOD environments. Important features that enterprises need to consider:  Centralized user access management  Application Level Policy  User Level Policy  Device Level Policy Vendor Characteristics Enterasys Mobile IAM  End-to-end visibility and control over access levels of applications, in multi-vendor infrastructures  identity and role based policy management  Mobile device complianceat network layer AirWatch’s Mobile Device Management
  • 10. Enterprise Mobility Page viii Advaiya Solutions Pvt. Ltd.  Configure device security policies based on device ownership  Set up enrollment restrictions to block users or devices based on platform, version, etc.  Require acceptance of Terms of Use before granting access  Enforce restrictions on device features, apps and web browsing  Detect compromised devices and perform automated actions  Restrict native apps on a device, including YouTube, Siri and Camera  Whitelist or blacklist publicly available apps  Enforce application compliancepolicies and monitorstatus  Control user’s ability to edit, share or open files in unauthorized applications  Require user to view content online or prevent download over cellular connection  Restrict document access to a specific location through geofencing Absolute Manage for Mobile Device  Publish a list of approved apps onto each device and provide a single-click download/install process  Silently install/remove apps using management APIs  Policies to define window of time to access secured documents and corporate networks.  Policy-locked configuration profiles to stop non-compliant devices AT&T Mobile Device Management  Centrally manage user roles and access controls  Set device policies per job function and user group Case Study City of Redlands Arms and Manages Mobile Devices for its Officers on Patrol. Now the force has access to critical information, regardless of where they are, with the security that is demanded. “What AT&T proposed to uswas MobileIron, a centralized platform for managing all our devices remotely. It immediately solved the biggest issue, which was getting the 175 devices authenticated to use our Departmental apps. It also created our own private app store that makes our apps available toevery device, as needed. Ad we continue to develop our custom applications and push more and more information out to the mobile devices, we need to make sure that sensitive information isn’t accidentally made publicor put into the wrong hands.” http://soc.att.com/VcNuwZ SMS based servicesinvocation: SMS based services invocation solutions help enterprise integrate text/voice/multimedia messages to enhance application value and business to harness the power of SMS for application interface and usability enhancements, customer interaction, marketing etc. Important features that enterprises need to consider:  SMS Integration with other services/Applications using APIs  2 way SMS  Bulk SMS Vendor Characteristics SMS Global  Seamless integration with applications, including web sites, intranets, CRM's, ERP's and other corporate software through APIs  Support of 2-way SMS for one-to-one communication with customers  Set up a personalized sender ID for SMS  Support of bulk SMS and WAP Push and VCard SMS ZNI  Platform independent APIs to integrate with applications for better control and functionality  Used for lead generation and receiving feedbacks from customers  Supports bulk SMS packages that can be sent directly from Excel sheet
  • 11. Enterprise Mobility Page ix Advaiya Solutions Pvt. Ltd. SMS Matrix  Send bulk message in fraction of seconds  Integration with legacy applications via use of simple APIs  Handles 2-way messaging using SMS, Voice and Text-to-Speech worldwide  Offers bulk FAX broadcasting  Bulk SMS scheduling Easy SMS: Communicator 2  Integrate with any backend system or application seamlessly with wide range of APIs  Use of 2-way messaging and short codes for direct line of communication  Set priority in bulk SMS while sending high volume of messages  Send email to SMS to send out reminders Enterprise Direct SMS  Standard protocols to integrate with enterprises' applications  Supports automated 2-way SMS communication channel forcustomers  Personalized short codes without rental or purchase fees  Multiple plans for different type of user Mozeo Text Messaging  Allow mobilecustomers share their thoughts and pictures in real time  Text message marketing through use of uniquemobile keywords for interaction  Supports mobile voting for an event, website or any marketing collaterals  Bulk SMS text blasting through online account center Case Study Five Tuition, needed an easy and cost effective way to communicatewith a growing number staff and an expanding clientele base. With SMSGlobal's API, Five Tuition integrated SMS into their existing database, to contact students, parents and staff via SMS. "With growing communication demands, weneeded to find a method of communication that would integrate seamlessly with our current system. Following the very simple online instructions, and with limited programming skills, I was able to successfully integrate our existing system with SMSGlobal's HTTP API. Our staff can now send bulk SMS's to tutors, students, or parents with ease." Peter Hanley, Manager, Five Tuition. http://bit.ly/Wjz2oi Enterprise Mobility Gateway: Enterprise Mobility gateway solutions helps organizations to selectively distribute enterprise application and data with remote users accessing enterprise information through variety of personal and corporate devices. Important features that enterprises need to consider:  Enterprise application availability for mobile user  User Access Controls  Users/Device Authentication Vendor Characteristics Symantec App Center  Policy enforcement for defining access controls for enterprise  Enforce policies like user authentication, re-authentication, data encryption on local storage access, off-lineaccess  Distribution of apps with corporate security and branding wrappers NetScaler Access Gateway  Seamless point of secure remote access
  • 12. Enterprise Mobility Page x Advaiya Solutions Pvt. Ltd.  Supports single sign-on capabilities for all applications and data  Manage access control and set polices based on identity, location and the configuration of the endpoint device  User and device authentication based on the active directory WSO2 Cloud Gateway  Allows user to selectively publish services and data to the cloud in secure environment  User based authentication and authorization.  Administrator to manage access control and set polices based on user identity and roles Roverapp  Connect mobile devices with companies intranet applications securely without VPN  Access corporate applications and data based on their access policies and controls  Supports advance authentication methods Case Study To enable interactions between the mobilePOS systems and back-end software, ODEL has used components of the WSO2 Mobile Services Gateway Solution. This mobile POS systems serves as an express checkout option for those customers using a credit card to purchase five or fewer items. “WSO2 is a valuable partnerin enabling us to offer new solutions like the mobile POS systems that help drive customer loyalty and set us apart in the market.” – Thilanka Kiriporuwa, ODEL head of human resources and operations. http://bit.ly/qtqmxH Business Service Interface: Business Service Interface solutions allow organizations to expose internal applications through intermediary services to facilitate effective business collaboration in B2B and remote working scenarios. Important features that enterprises need to consider:  Messaging format supports  API support  Integration solution library Vendor Characteristics e-Zest Enterprise Application Integration  Supports Services oriented architectures (SOA’s) Messaging  Object Request Broker (ORB), Remote Procedure Call (RPC) and Subscribe based communication integration iWay Application System Adapters  Supports transportation over messaging software like WebSphere MQ and JMS  Provides direct links into packaged applications using a variety of APIs Enterprise Application Integration  Interactions with SaaS-based data via published APIs  Drag and drop assembly of application integration flows  Easily modifiable snaps based on open and standardized development environment MuleSoft Connectors  Instant API connectivity to most applications and services  Provision of a library of repeatable integration solutions EDI Application Integrator  Powerful architecture to build a library of application program interfaces (API’s)
  • 13. Enterprise Mobility Page xi Advaiya Solutions Pvt. Ltd.  EDI Application Integrator for drag and drop mapping Jitterbit Application Integration Solutions  Application integration solutions supporting Enterprise Service Bus (ESB), Service Oriented Architecture (SOA), and point-to-point integration architectures Case Study ACAL BFi turned to Jitterbit to replace its unreliable coding-based integration with a standard platform to reduce the costs and resources required to provide a single view of the company’s ERP and CRM data. “Our previous integration tools were very slow and needed constant monitoring. In contrast, Jitterbit provided us with a st andard platform on which to build our integration projects, allowing us to quickly and cost-effectively synchronize data between our ERP and CRM applications. I have been able to configure and manage Jitterbit by myself, while giving the rest of the company an up -to-date view of all our pertinent data within the application they use on a daily basis.” -Keith Lovern, Technical Operations http://bit.ly/15kS2Ds
  • 14. Enterprise Mobility Page xii Advaiya Solutions Pvt. Ltd. Conclusion Consumerization of IT has significantly increased the use of mobile devices in everyday life. With this widespread use of personalized devices to access corporate data, enterprise mobility management has gain prominence across various business verticals. With the Flexible work style scenarios enterprise apps can no more be restricted to inside the firewall usage. Though consumerization of IT has boosted employee productivity and flexibility but IT still has the responsibility to protect organizational intellectual property and is struggling with bring your own device (BYOD) programs and mobile data management. The mobility management framework helps business to determine current stage of enterprise mobility management, set and accomplish goals, and build roadmap to advance.
  • 15. Enterprise Mobility Page xiii Advaiya Solutions Pvt. Ltd. References Enterasys Mobile IAM http://www.enterasys.com/products/advanced-security-apps/enterasys-network-access.aspx http://onefabric.net/byod/ETS_Mobile_IAM-Tracking_Users_and_Devices.pdf MaaS360 Mobile Device Management http://www.maas360.com/products/mobile-device-management/ http://content.maas360.com/www/content/ds/ds_maas360_mdm_overview.pdf AirWatch’s Mobile Device Management http://www.air-watch.com/solutions/mobile-device-management AirWatch's Mobile Security Solution http://www.air-watch.com/solutions/mobile-security Boxtone http://boxtone.com/mobile-device-management.aspx ProMDM http://www.promdm.com/product-overview/ Absolute Manage for Mobile Device http://www.absolute.com/products/absolute-manage-mdm SMS Global http://www.smsglobal.com/in/en/sms/apis.php http://www.smsglobal.com/in/en/sms/bulk_sms.php http://www.smsglobal.com/in/en/sms/2-way_sms.php SMS Matrix http://www.smsmatrix.com/?sms-messaging ZNI http://www.znisms.com/index.html Easy SMS: Communicator 2 http://www.clickatell.com/get-creative-with-sms/ Enterprise Direct SMS http://www.maxis.com.my/business/lmc/data/eds.asp Mozeo Text Messaging http://www.mozeo.com/text-messaging-services-features.php Symantec App Center
  • 16. Enterprise Mobility Page xiv Advaiya Solutions Pvt. Ltd. http://www.symantec.com/app-center-enterprise-edition NetScaler Access Gateway http://www.citrix.com/products/netscaler-access-gateway/overview.html WSO2 Cloud Gateway http://wso2.com/products/cloud-gateway/ Roverapp http://roverapps.com/secure-browser e-Zest Enterprise Application Integration http://www.e-zest.net/it-services/custom-it-development/eai/ iWay Application System Adapters http://www.informationbuilders.com/products/applicationsystemadapters http://www.informationbuilders.com/products/pdf/iWaySysAdapters.pdf Enterprise Application Integration http://www.snaplogic.com/what-we-do/solutions/enterprise-application-integration.php http://www.snaplogic.com/resources/white-paper/future-proof-your-cloud-integration.pdf MuleSoft Connectors http://www.mulesoft.com/cloud-connectors-full EDI Application Integrator http://www.gecti.com/gxs.html Jitterbit Application Integration Solutions http://www.jitterbit.com/Solutions/application-integration
  • 17. Enterprise Mobility Page xv Advaiya Solutions Pvt. Ltd. Glossary Term Long form/ Expansion Definition BYOD Bring Your Own Device Bring your own device (BYOD) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC/BYOC)) means thepolicy of permitting employees to bring personally owned mobiledevices (laptops, tablets, and smart phones) to their workplace, and use those devices to access privileged company information and applications AD Active Directory It is the software system that stores, organizes and provides access to information in a directory. In software engineering, a directory is a map between names and values. It allows the lookup of values given a name, similar to a dictionary LDAP Lightweight Directory Access Protocol It is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. OTP One-time password A one-time password (OTP) is a password that is valid for only one login session or transaction SMS Short Message Service (SMS) Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobilephone devices VOIP Voice Over Internet Protocol It commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Rooting It is the process of allowing users of smartphones, tablets, and other devices running the mobile operating system to attain privileged control (known as "root access") within subsystem. Jailbreak detection Jailbreaking is the process of removing the limitations on mobile devices through the use of software and hardware exploits. Jailbreaking permits root access to the operating system, allowing the download of additional applications, extensions, and themes that are unavailable through the official App Store. Encryption Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can Single sign- on Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Conversely, Single sign-off is the property whereby a single action of signing out terminates access to multiplesoftware systems. App blacklisting/ Whitelisting Application Whitelisting is a proactive security method where only approved programs are allowed to run and blocking rest of the programs from running by default. On the contrary, Application Blacklisting blocks certain programs while allowing rest to run by default. SD Secure Digital Secure Digital or (SD) is a non-volatile memory card format for use in portable devices, such as mobile phones, digital cameras, GPS navigation devices, and tablet computers. Sandbox Sandbox (computer security), a virtual container in which untrusted programs can be safely run. Sandbox (software development), an online environment in which code or content changes can be tested without affecting the original system DLP Data Leakage Prevention Data loss/leak prevention solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting & blocking sensitive data while in-use(endpoint actions), in-motion (network traffic), and
  • 18. Enterprise Mobility Page xvi Advaiya Solutions Pvt. Ltd. at-rest (data storage) OTA Over-the-Air A general term for wireless programming of devices such as mobile phones and set- top boxes SAML Security Assertion Markup Language It is an XML-based open standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SCEP Simple Certificate Enrollment Protocol Simple Certificate Enrollment Protocol is an Internet Draft in the Internet Engineering Task Force (IETF). This protocol is being referenced by several manufacturers of network equipment and software who are developing simplified means of handling certificates for large-scale implementation to everyday users. Quarantine Isolation of unfit devices to ensure data and application security API Application Programming Interface An application programming interface (API) is a protocol intended to be used as an interface by software components to communicatewith each other. An API is a library that may includespecification for routines, data structures, object classes, and variables. CRM Customer Relationship Management Customer relationship management (CRM) is a model for managing a company’s interactions with current and future customers. It provides a 360 degree view of customer data. [citation needed] It involves using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support. ERP Enterprise Resource Planning Enterprise resource planning (ERP) systems integrate internal and external management information across an entire organization—embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. The purpose of ERP is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders. WAP Wireless Application Protocol Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol. VCard vCard is a file format standard for electronic business cards VPN Virtual Private Network A virtual private network (VPN) extends a private network and the resources contained in the network across public networks like the Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network SOA Services oriented Architecture Service-oriented architecture (SOA) is a set of principles and methodologies for designing and developing software in the form of interoperable services. These services have well-defined business functionalities that are built as software components (discrete pieces of code and/or data structures) which can be reused for different purposes ORB Object Request Broker Object request broker (ORB) is a piece of middleware software that allows programmers to make program calls from one computer to another via a network (so- called remote procedure calls). ORBs promote interoperability of distributed object systems because they enable users to build systems by piecing together objects from different vendors, so that they communicatewith each other via the ORB.
  • 19. Enterprise Mobility Page xvii Advaiya Solutions Pvt. Ltd. RPC Remote Procedure Call Remote procedure call (RPC) is an inter-process communication that allows a computer program to cause a subroutine or procedure to execute in another address space (commonly on another computer on a shared network) without the programmer explicitly coding the details for this remote interaction. SaaS Software as a Service Software as a service, sometimes referred to as "on-demand software", is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser. EDI Electronic data interchange It is a method for transferring data between different computer systems or computer networks. It is commonly used by big companies for e-commercepurposes, such as sending orders to warehouses or tracking their order. ESB Enterprise Service Bus An enterprise service bus (ESB) is a software architecture model used for designing and implementing the interaction and communication between mutually interacting software applications in service-oriented architecture (SOA). As a software architecture model for distributed computing it is a specialty variant of the more general client server software architecture model and promotes agility and flexibility with regards to communication and interaction between applications.
  • 20. Enterprise Mobility Page xviii Advaiya Solutions Pvt. Ltd. Contact Us Advaiya Solutions Pvt. Ltd. G14-17, IT Park, Madri Industrial Area, Udaipur 313002 India Phone:+91 294 305 1100 | Fax:+91 294 305 1300 infoudr@advaiya.com Advaiya, Inc. (Washington) 2475 140th Ave NE, Suite 201, Bellevue, WA 98005 USA Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201 Advaiya, Inc. (Silicon Valley) 440 North Wolfe Road, Sunnyvale, CA 94085, Silicon Valley Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201