Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile


Published on

BYOD, CoIT and the ubiquity of mobile technologies has created new opportunities for enterprises to deliver applications that improve customer service, productivity and efficiency. Because all mobile applications are not created equal, enterprises need to rethink their mobile strategy, balancing technology and security with user experience and adoption. InnoviMobile’s white paper, Mobilizing Enterprise Data, outlines the keys to adoption, development approaches, security and implementation.

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile

  1. 1. MobilizingEnterpriseDataby Alex Zaltsman, CEO InnoviMobile
  2. 2. Mobile Integration PlanIdentify The Information Security PlanImplementation OptionsProject Action PlanBlank Project Action PlanAdoption FormulaPlan for integrating Components and StakeholdersIdentify Staffing RequirementsContents92678
  3. 3. Mobile Integration PlanAdoption FormulaThere are many components of an optimal mobile strategy but the most significant is the design foradoption. Creating a fancy user interface with limited functionality, or deploying an application withtoo strict security will lead to the app being deemed unusable resulting in wasted time and effort.We express the elements of successful mobile deployment as a simple formula:The first two operands, Usability and Desirability, are inextricably linked. They illustrate the core ofthe most important factors that employees will consider when using a mobile application.MOBILIZING ENTERPRISE DATA 2(Usability + Desirability) × Security = AdoptionUsabilityUsability is more of an art than a science. Significant thought needs to go into the design, whichdoes not need to be complex. In fact, less complex is better! The application must be easy andintuitive to wield without the need for an instruction guide. The ides is to make the jobs ofemployees easier, not harder.DesirabilityCreating desire means crafting an emotional shift from a less desirable alternative (legacytechnology) to a more desirable product. If you cannot envision a positive emotional outcomeas a result of using the mobile app then adoption will suffer. The mobile app must make anemotional connection with the employees and make a meaningful difference to them.
  4. 4. Plan For Integrating ComponentsAnd StakeholdersIt’s important to identify the components that will interface directly or indirectly with mobile applications.Some examples include:The last operand is Security. Note the use of the mathematical symbol for multiplication; the purpose isto emphasize the significance of security of any enterprise mobile application deployment. ITmanagement needs to be able to sleep at night knowing that data that is accessible on mobile devicesis secure. Employees need to feel comfortable that security is the cornerstone of the application theyuse every day, yet it needs to be transparent. Though it is strongly encouraged that a generaleducation plan and policies around mobile security are implemented, users should not be burdenedwith any complexities associated with IT management’s security requirements as this will impactthe first two operands — usability and desirability.MOBILIZING ENTERPRISE DATA 3CLIENT/SERVER OR WEB APPLICATIONSPRODUCT EXPERT LIAISONACCESS TO DATA FROM INTRANETDATABASESACCESS TO DATA FROM INTERNETAPPLICATION SUPPORTTHIRD-PARTY VENDORSERVER TEAM ADMINPRODUCT USERNETWORK ADMINDATABASE ADMINFIREWALL/SECURITY ADMINDESKTOP SUPPORT CONTACTVENDOR SUPPORT CONTACTSome questions you may need to ask while developing your mobility vision:1.) Does this app make the employee’s day easier and allow them to focus on more meaningful tasks?2.) How many less steps will the employee take by using mobile technology?3.) How will the contemplated mobile technology reduce stress, anxiety, and increase passion and creativity on theemployee’s role?4.) Will the mobile technology position the company (and employees) to be viewed as more technologically advancedthan competitors?Some questions you may need to ask while developing your mobility vision:Component Stakeholder
  5. 5. In general, it is best to meet with various users of the existing applications, and those who will likely usethe mobile version, along with all technical contacts that will provide technical support. The user, alsoreferred to as the “product expert,” is uniquely positioned to explain how the application is utilized in itscurrent state and can make recommendations on features and functionality required for the applicationon a mobile device. Product experts can also serve as the interface to others in providing feedback.All other roles are typically of a technical nature and will need to work closely with the users of theapplications to ensure the goals of the mobile product are met.Identify Staffing RequirementsBased on your project timelines does your company have the internal expertise to deliver a finishedproduct that meets the requirements of the user community?Title RoleSets the vision and goals.Understands mobile ecosystem, defines feature set.Coordinates tasks between developers, designers, and communicatesproject updates to Product Manager and Product Executive.Staff experiences in user experience/user interface design for mobile.Developers to write the code for the platforms necessary to support your product.MOBILIZING ENTERPRISE DATA 4A typical mobile project will require:Project ExecutiveProduct ManagerProject ManagerDesigner(s)Mobile platform developersServer developers Developers for any back-end systems integration.
  6. 6. Team in place but stretchedtoo thin, or no time to put teamtogetherExecute with in-house team. Augment with external resources in case of timeconstraints.It is critical to choose a partner, not just an outsourcing firm. Many outsourcing firms provide just thesoftware development portion. While enterprise organizations have various resources, it takes significantlymore than software development alone to create a mobile application that is widely adopted, secure andimplemented within budget.Situation OutcomeTeam with mobile experience is inplace with guaranteed resourcesSeveral, but not all key teammembers are on staffEntire team is in place but seeksguidance on strategyConsider partnering with a mobile development firm that can fulfill theneeds of all rolesConsider partnering with a mobile development firm that can fill in the gapsConsider partnering with a mobile development firm that can help withmobile strategyMOBILIZING ENTERPRISE DATA 5Typical scenarios depicting how enterprises approach mobile applications development:
  7. 7. Preparing your information security infrastructure prior to or concurrently with mobile applicationsdevelopment initiatives will make your team better prepared for the launch of your mobile product. Someof the components that take care of data security, such as Good Dynamics, need to be integrated intothe mobile application during development.Category Threat SolutionData in Motionand Data In UseData At RestMobile ApplicationManagementMobile ApplicationDistributionUnauthorized access to data whilebeing transmitted over local andwireless networks.Attempts to decompile the mobileapplication and unauthorizedaccess to app data storagecontainers.Lost or stolen devices withapps that access corporatedata.Publishing internal apps topublic app stores exposesproprietary applications tothe general public.End-to-End encryption of data while in transit from thesource servers to the mobile device. We recommend GoodTechnology’s Dynamics product.Encryption of data stored on the device. We recommendGood Technology’s Dynamics product.Platform that provides ability to remotely remove mobile apps fromthe device. We recommend AppCentral’s ManagementConsole and AppGuardian (recently acquired by Good Technology).AppCentral’s Mobile Storefront provides an internal appstore for internal app distribution.MOBILIZING ENTERPRISE DATA 6Security in the context of mobile applications generally falls into the following categories:Identify the InformationSecurity PlanThe key essentials of mobile application security include connectivity and encryption of data duringtransmission and on the device. Management and control of applications is necessary to preventunauthorized access in case of device loss or theft.
  8. 8. It’s very important to choose the right approach for your project and budget from the beginning.Changing approaches during your mobile project will delay deployment and could significantly increasecosts while impacting the user experience.Perspective Tools OutcomeIndividual platform SDKsWeb Based platformCentralized platformHybridNative devicedevelopment tools.HTML5MEAPNative, HTML5, MEAPBest experience and performance that usesnative device features and unique UI capabilities.Support for offline use, push notifications, stronganalytics.Capabilities of mobile web sites are limited tothe capabilities and UI of mobile web browsers.Offline use (other than caching) is not supported.Requires strong Internet connectivity, eithercellular or WiFi.Rudimentary experience, lowest commondenominator approach to do “build once,deploy to many” development methodology.Source code usable only with MEAP vendor’splatforms. Significant vendor lock-in.Significantly more complex development andmaintenance by having to integrate disparatetools and technologies. Some benefits could beachieved by re-using existing web technology.Four Approaches To Mobile Technology In The Enterprise*MOBILIZING ENTERPRISE DATA 7Implementation OptionsDeciding on the right approach for development is highly dependent on the specific application thatis being contemplated. There are four general approaches to implementing mobile technology in theenterprise.* MEAP was coined by Gartner in a 2008 Magic Quadrant report and is an acronym for Mobile Enterprise Application Platform. MEAP tools aretypically purchased and hosted on-premise or used as Software as a Service web site. The key benefit promoted by MEAP vendors is the ability towrite code, often using a proprietary scripting language or well-established language like JavaScript. The code is then exported into nativeapplication platform code and can be distributed to other devices.
  9. 9. Metrics(vital factors/wins)Key StrategiesAction StepsPriority Mobile Product Development Goals1.2.3.4.Owners 30 60 905.Deploy mobile technology to 1,000 field staffReduce paper document transactions by %25 the first yearReduce 30 minutes of data entry per person per dayReduce documentation errors by %25 the first yearTarget ROI within 12 monthsIdentify inefficient processes in the fieldReceive feedback from key leaders in the fieldLaunch 5% pilot program to field and evaluate feedbackExecutive buy-inForm the mobile product teamIdentify gaps in skill setIdentify key development partnerIdentify team lead from user populationConfirm budget with CFOJohnPaulMaryJenSteve2/12/152/12/122/153/13/153/13/134/14/154/14/12MOBILIZING ENTERPRISE DATA 8Project Action PlanProject Action Plans (PAP) are crucial to the success of your mobile implementation project. They help setpriorities, define owners of tasks, and in general, outline expectations so that the entire project team is awareof the timeline for the final product release.Below is an example of a Project Action Plan for one portion of the project, which is product development.There could be a few of PAPs for different roles. For example, the development team could use their own PAPto identify key metrics, strategies, and action steps.
  10. 10. Metrics(vital factors/wins)Key StrategiesAction StepsPriority Mobile Product Development Goals1.2.3.4.Owners 30 60 905.MOBILIZING ENTERPRISE DATA 9
  11. 11. © InnoviMobileDesigned by Springboard – Marketing, Public Relations, Social MediaInnoviMobile creates mobile applications for enterprise businesses across abroad range of industries. Let us help you get started today!645.588.0011 ext.2info@innovimobile.cominnovimobile.comWritten by Alex Zaltsman, CEO InnoviMobile