CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing

CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing



It’s been a generation since the first workers to grow up with personal computers at home entered the workforce. Twenty years ago, this new generation of workers helped fuel the massive expansion of ...

It’s been a generation since the first workers to grow up with personal computers at home entered the workforce. Twenty years ago, this new generation of workers helped fuel the massive expansion of business computer use and the productivity gains that ensued.



Total Views
Views on SlideShare
Embed Views



1 Embed 13 13



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.


12 of 2

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • Very interesing statistics - you may enjoy ’Consumer Driven IT’ - excellent highlights from an IDC report full of stats
    Are you sure you want to
    Your message goes here
  • this is a higly valuable with itd futristic approach
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Document Transcript

    • CIO Strategies forConsumerization:The Future ofEnterprise MobileComputingby Paul D’Arcy, Executive Director,Large Enterprise MarketingDell CIO Insight Series
    • CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight SeriesThe Inevitable equivalents. Today, the issue is Five Trends Shaping theConsumerization of most pronounced with consumer Future of Enterprise Mobility smartphones, media tablets, andEmployee Devices & Internet applications which haveApplications been intentionally excluded by 2011 will see a perfect storm of many company’s IT policies. consumerization as five trendsIt’s been a generation since the first intersect to create an importantworkers to grow up with personal With the cloud providing workplace inflection point:computers at home entered the applications and computingworkforce. Twenty years ago, power to anyone with a credit Trend # 1: The rise of social mediathis new generation of workers card, employees are increasingly as a business applicationhelped fuel the massive expansion bypassing IT altogether to get the tools and technology that It’s hard to underestimate theof business computer use and the impact of social media on not justproductivity gains that ensued. they desire without the hassle of outdated IT processes. the workplace, but on society in Unfortunately, employee self- general. By the beginning of 2011,2011 will mark a similar milestone the average Facebook user spentas the first new knowledge workers provisioning of third party cloud services includes complex enterprise 1,400 minutes, or 23.3 hours, on theraised with the Internet begin site each month.2 With more thangraduating from college and applications that may store sensitive corporate data in the cloud. 500 million active users around theentering the workforce. When world, U.S. Facebook users spendthese workers learned to read, the the equivalent of roughly 29% ofWorld Wide Web and email were For IT, the key issue is what we call the “Consumerization Catch-22” their leisure time on the site.3in a period of mass expansion andcommercialization. They were in which can be summarized along the The newsworthy growth ofelementary school when the dot- following lines: Corporate IT policies social media goes well beyondcom boom peaked, and in college that ban the use of employee- the meteoric rise of social media and smartphone owned devices in the name of According to Nielson, “the worldusage exploded. security inadvertently create new now spends over 110 billion minutes bigger security holes as users skirt IT on social networks and blog sites.Already, the expectations of a new restrictions. In other words, locking This equates to 22% of all timegeneration of workers are resetting down the employee computing online or one in every four andthe CIO agenda. As social media environment forces users to find half minutes. For the first time ever,becomes a foundational component their own alternatives, undermining social network or blog sites areof work life and corporate the very policies that IT is trying visited by three quarters of globalcollaboration, as new mobile to enforce. Often, one of the first consumers who go online, after thedevices and application platforms offenders is a C-level executive numbers of people visiting theseproliferate, and as more employees who requireswork from home, traditional network access forcorporate policies on personal their own personal Corporate IT policies that smartphone, PC, orcomputer usage, data security, tablet. ban the use of employee-and application usage are quicklybecoming antiquated. owned devices in the name of This difficultThe result is the rapid situation is echoed security inadvertently createconsumerization of IT. We define by Gartner which advises that, “most new security holes.consumerization as the migration ofconsumer technology -- including organizations realizeelectronic devices, platforms, and that they cannot stop the influx of sites increased by 24% over lastapplications – into enterprise personal devices and are looking year. The average visitor spends 66%computing environments as to the post-consumerization era, more time on these sites than a yearhome technology becomes, in seeking ways to stop managing the ago.” 4some instances – as capable and devices used by workers.“1cost effective as its enterprise With the growth of social media, it’s not just technology that is changing, 3
    • Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computingit’s people and society itself that are Trend # 2: The blurring of work the flow of corporate informationevolving alongside the new online and home and intellectual property beyond theworld. Few statistics demonstrate company’s walls. IT departmentsthis better than the fact that one- For CIOs, the blurring of work and need to develop policies to deliverin-six U.S. couples who married in home environments complicates and secure sensitive date on boththe last three years met online.5 the development of employee IT-owned and employee-ownedAround the world, social media and technology policy. Flexible work mobile devices are becoming arrangements that encourageextensions of personal relationships employees toin a way that makes it difficult work from hometo separate the technology from – or any location – Over the next year, 35% make it difficult topersonal social networks. control employee of employers plan toIt’s in this context that today’s technology usage. provide more flexible workemployees arrive at workeach day. They expect instant For employers in arrangements for employees.communication and access to the United States,the sorts of applications that help the adoption ofthem be effective in their personal flexible work arrangements is rapidly Trend # 3: The emergence of newlife. For knowledge workers, accelerating. Over the next year, mobile devicespersonal devices and consumer 35% of employers plan to providesocial networks are ideal tools for more flexible work arrangements Every decade, the world sees a newbuilding work relationships and for employees. In particular, 73% paradigm for end user computing.conducting business. But at work, plan to implement flexible schedules So far, there have been distinct56% of employers prohibit access and 41% plan to implement eras for mainframe computing,to non-work related websites telecommuting options.7 As a result, minicomputers, personaland 63% prohibit the storage of 43% of the American Workforce – computing, the desktop Internet,personal data and files on company more than 63 million workers -- will and most recently, devices forresources. As a result, a recent telecommute occasionally by 2016.8 mobile Internet reports that “Nearly half of all As knowledge workers increasingly With each era, there has beeniWorkers (46%) surveyed give their work from outside the office, it is exponential growth in the numberemployers extremely low marks for difficult for corporations to control of devices in use at any one point inthe integration of consumer devices device usage, application usage, time: When there was a worldwideand social networks with enterprise and most importantly, to monitor market for a million mainframes,applications.” 6 the market for minicomputers was closer to 10 million+ units, the early New Computing Cycle Characteristics PC market was 100 million+ units, Computing Growth Drivers Over Time, 1960 – 2020 and the desktop internet market is 1 billion+ units. In the next era -- 1,000,000 Mobile/Gadget mobile Internet devices including Internet smart phones, media tablets, and 100,000 internet-connected personal media Devices/Users (MMin Log Scale) Desktop Internet 10,000 10,000? players – the number of new 1,000 1,000+ devices will far exceed the size PC of the total PC market. According 100 Minicomputer 100+ to Vinod Khosla, a prominent 10 10+ entrepreneur and investor, it is Mainframe possible that ten years from now the 1 1+ full market for these devices could be as high as 10 billion units (Fig. 1).9 1960 1970 1980 1990 2000 2010 2020 By next year, global smartphone Figure 1. shipments – a subset of the mobile Note: PC installed base reached 100MM in 1993, cellphone / Internet users reached 1B in 2002 / 2005 respectively; Source: ITU, Mark Lipacis, Morgan Stanley Research. Note: PC installed base reached 100MM in 1993, cellphone / Internet users reached Internet device market – will exceed 1B in 2002 / 2005 respectively; Source: ITU, Mark Lipacis, Morgan Stanley Research.4
    • CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Seriespersonal computer shipments for As the use of social media social networks. Some customersthe first time in history. Just a year and mobile devices explodes, even create Web sites or blogs tolater, in 2013, global smartphone it is changing the technology praise or punish brands.”14shipments are expected to exceed relationship between employerspersonal computer shipments by and employees. These same trends As more of the economymore than 150 million units.10 also affect the relationship between shifts towards personal businesses and their customers recommendations and socialWith these changes, employees and public institutions and their media accelerates the impact ofare showing up to work with their constituents. personal recommendations onpersonal devices with increasing almost every type of business,frequency. A September 2010 With an explosion of mobile devices, companies will increasingly needGartner survey of 512 U.S.-based mobile ecommerce is expected to a new set of workforce skills. Inknowledge workers found that “33% grow to one quarter of ecommerce particular, companies will needof respondents used their personal sales in the United States by next Internet savvy knowledge workersdevices while at work during the year.13 With the proliferation who can navigate the complexpast 30-days (of the date of the of mobile devices and mobile ecosystems of social media. As thesurvey) to access social networking operating systems, businesses are control of corporate brands shiftssites such as Facebook”.11 According challenged with developing new to online conversations outside ofto a separate study, “iWorkers report mobile applications and Internet corporate control, organizationsusing an average of four consumer services to interact with their will increasingly value employeesdevices and multiple third-party customers. who are influencers in their social networks. While mobile“33% of respondents used their commerce is an It’s in this context thatpersonal devices while at work important trend for businesses, consumerization will become as much of a business decision asduring the past 30-days (of the it pales in a technology decision. To attract comparison to and retain the right employeesdate of the survey) to access the impact that – and to make sure they thrive –social networking sites such as social media is many organizations will need to already having increase the types of devices andFacebook”.11 on many applications that they support and traditional pay for.applications, such as social industries. According to McKinsey & Company, “word of mouth is Trend # 5: Employee expectationsnetworking sites, in the course of of corporate IT are changingtheir day.”12 the primary factor behind 20 to 50 percent of all purchasing With a new generation ofToday’s IT departments typically decisions. Its influence is greatest knowledge workers, end userdecide what devices and software when consumers are buying a technology is increasinglyto deploy on their environment. product for the first time or when becoming a talent recruitment andThis approach simplifies support, products are relatively expensive, retention issue. Companies thatimage management, application factors that tend to make people invest in end user technology anddeployment, as well as device conduct more research, seek more implement innovative technologymaintenance, security, and opinions, and deliberate longer policy will see advantages as theymanagement. With the coming than they otherwise would. And look to recruit the new generationproliferation of devices, applications, its influence will probably grow: of knowledge workers.and operating systems, IT the digital revolution has amplifieddepartments will face tremendous and accelerated its reach to the According to a recent study, “achallenges to deliver end user point where word of mouth is no majority of employees indicateservice and support. longer an act of intimate, one-on- that the technology tools provided one communication. Today, it also to them and supported by theirTrend # 4: Shifting business operates on a one-to-many basis: organizations would be a critical ormodels require tech savvy product reviews are posted online positive factor in taking a job withemployees and opinions disseminated through a new employer.”15 Unfortunately, 5
    • Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile ComputingWhen the employee opens their user technology that limits many companies’ ability to attract talentnew PC, they are even more and compete in the new business area.surprised to see that the new This same gap also limits the abilitycomputer is running a locked of leadership to drive productivitydown version of an operating gains that can come from these new technologies. According tosystem that was first released McKinsey & Company, “the heart of what knowledge workers dowhen a 2011 college graduate on the job is collaborate, whichwas 12 years old. in the broadest terms means they interact to solve problems, servemost new employees are shocked customers, engage with partners,to find that their employers -- For most organizations, consumerization quickly becomes a and nurture new ideas. Technologywhile keen to innovate and eager and workflow processes supportto compete in this fast changing talent management issue – it’s a key part of any strategy for workforce knowledge worker success and aretechnology era – provide new increasingly sources of comparativeemployees with little more than an enablement in the comingentry-level PC. When the employee decade ofopens their new PC, they are even technological “a majority of employees change. Today,more surprised to see that the new too many indicate that the technologycomputer is running a locked downversion of an operating system companies tools provided to them andthat was first released when a 2011 are driving forcollege graduate was 12 years old. innovation in supported by their organizationsAs These Trends Collide, the market but restricting would be a critical or positiveConsumerization Becomes a internal factor in taking a job with a newBusiness Decision technology usage with employer.”While all 5 of these trends are yet policyto peak– social media as a business frameworks that are at best differentiation. Those able to useapplication, the blurring of work and outdated, and at worst hindering new technologies to reshape howhome, new mobile devices, shifting the innovation that the business they work are finding significantbusiness models, and changing is seeking. It is this increasing gap productivity gains.”17employee expectations of IT – they between business strategy and endare already creating significantpressure for change in most IT Moving from... ...toorganizations. Limited connectivity Always on, anywhereFor the CIO, consumerizationrepresents the confluence of Email or IM Freedom to participate communicationsa difficult set of IT challenges(security, technology policy, data IT chooses the PC Devices that reflect “me”protection, end user technology)and business strategy (new business Primary device is fixed Primary device is mobilemodels, talent strategy, corporatebrand and identity). For this reason, Users want agilityGartner has declared that “for CIO’s, IT has control and freedomensure that consumerization of ITis always factored into business One device, one task One device, many tasksstrategy development exercises.”16 Boundary-less security Management and security inside the firewall and manageability6
    • CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight SeriesAs companies embrace and policies to attract and retain owned smartphones, tablets,consumerization, a number of employees? and PCs.changes will need to occur: • How strongly is your company • Consider “containerized” securityThese changes, however, can be moving towards flexible working solutions which deploy securedifficult to execute. For most CIO’s, arrangements?many questions come to mind: Howdo companies maintain security • Are business 77% of very large businesses executivesand protect data as they loosen IT advocating said securing corporate datastandards? How will companiessupport heterogeneous employee for expanded on mobile devices was theirdevices? Does consumerization device usageapply to all employees or only to or trying to most important mobile securitycertain employee segments? What prevent it? objective.18will companies pay for that they • Whatdon’t pay for today? What happens regulations and security containers for applications andto employee IT platforms? Which concerns limit your options? data onto mobile devices whichapplications need to be modernized can be managed by work with a broader set of • In your organization, howemployee devices? important are the Internet and • Consider desktop virtualization social media to driving customer and remote application portalsCIO Roadmap: 9 Key engagement? to provide secure computingRecommendations on environments on a wide variety Recommendation # 2: Recognize of devices.Consumerization & the New that IT security and dataEra of Enterprise Mobility protection policies that restrict • Provide employee email access the use of personal devices and on personal devices using social media applications may technology that secures emailRecommendation # 1: Articulate data.your company’s end user actually increase security andworkplace and technology data loss risk. Begin evolving • Manage data loss risk --- andphilosophy and use that as a security policies to protect device loss risk –- throughbasis for setting consumerization data in a heterogeneous device clearly communicated employeestrategy. environment. policies and by using tools that As the pressure for restrict the flow of sensitiveTechnology philosophy, like information off of the network orbusiness strategy, is unique to consumerization continues to grow, security capabilities will create to unsupported devices.the culture and purpose of everyorganization. When evaluating obstacles for organizations looking • Prioritize applicationtechnology changes, there are to implement progressive end user architectures that store dataseven questions that can help you technology policy. According to a securely in the cloud or onascertain how far and how fast your Dell/TBR study, 77% of very large servers to allow secure accessorganization can move to embrace businesses said securing corporate from employee-ownedthe new era of consumerization: data on mobile devices was their devices, mitigating the need for most important mobile security employees to store data locally.• What are the demographics objective.18 or your user population and • As uncontrolled platforms, what type of work do your user In the post-consumerization era of consumer devices – especially segments do? heterogeneous devices, companies PCs – carry a significantly increased risk of malware• Where are your employees will need to re-architect security. As infection. Companies need to doing their work? part of this evolution, companies develop policies that mitigate should: the risk and potential damages • Develop clear policies for from malware – especially• Does your company take pride business use of employee botnets – that may arise through in offering innovative benefits 7
    • Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing the use of employee-owned computers, smartphones, and allowed, accessing the corporate devices for business purposes. tablets. Employees often skirt many directory. restrictions on technology usage• Extend guest networks to by forwarding email, using guest 3. Smartphones are expensive and employees to allow on- networks, and by leveraging web- most organizations will not pay premise use of personal mobile based file storage and transfer for smartphone voice and data devices without compromising services. According to the Unysis plans for the broad employee corporate networks. / IDC study, employees “report population. Since employees are using an average of four consumer making these investments and• IT should educate the business bringing the devices to work, on the risk of breached policies devices and multiple third-party applications, such as social expanded use can benefit end – reinforcing compliance and user productivity. fiduciary duties – to make the networking sites, in the business aware of the broader course of their day.”20 As companies increase the business issues related to the new Why start with smartphones? There use of smartphones, they will technology era. are three reasons: need to implement solutions that allow them to manage policiesAs more applications move to the 1. No area of personal technology and security on a broader range ofcloud and more devices move off is growing as fast. According devices. In particular, companiesthe network and out of IT’s direct to Ericsson, mobile broadband will need the capability to enforcecontrol, the framework for end subscriptions have skyrocketed: passwords and enable remote datapoint security will also benefit from growing from 200 million mobile deletion for lost or stolen delivery. Increasingly, Internet subscribers in 2008 tothis means using Managed Security 500 million mobile broadband Recommendation # 4: LaunchService Providers to provide cloud- subscribers in mid-2010 and 1 enterprise applications thatbased end-point protection for billion at the end of 2010. By replicate the best aspects ofdistributed devices. According 2015, the company believes consumer communication andto Gartner, “An increasingly that there will be more than social media within your workercommon scenario will be high- 3.8 billion mobile broadband community.value employees accessing critical subscriptions globally.21business and customer information In this era of consumerization,stored in the cloud from employee- it’s important to recognize thatowned PCs or smartphones. Gartner end users want more than justbelieves that delivering security liberalization of technologyas a cloud-based service will be restrictions. The heart of thea key component of how many 4 billion consumerization is a humanenterprises will enable this scenario, desire -- end users want to workwhile achieving a balance of 3 billion in the same way that they now livesecurity and manageability.”19 -- using the Internet to facilitate relationships and communication. 2 billionRecommendation # 3: Liberalizerules that prohibit business use Consumer tools, although powerfulof employee-owned technology 1 billion and rapidly evolving, can’t fully closein your environment, start by this expectation gap. This providesencouraging the business use of an opportunity for organizations 0employee-owned smart phones. to introduce corporate platforms 08 10 10 15 that replicate the best aspects of 20 20 20 20 id ofIn most organizations, start by successful consumer platforms. M d Enallowing employees to do what they In particular, organizations needalready are secretly doing today. Figure 2. to complement email with rapid communication options such asWhile most organizations limit instant messaging and communityemployee use of personal devices 2. Smartphones are important tools social applications such ason the corporate network, for managing contacts, email,’s Chatter. Theyemployees have always found ways calendar, social media, accessing need to build collaborative wiki-to get work done on unsanctioned cloud data, and when8
    • CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Serieslike Intranets and deploy internal “The age where price dictates one options that meet corporateportals that allow end users to computer per person has long past, security, manageability, and lifecycleprovide feedback, rate content, and tablets represent convenience planning needs.and participate in community over necessity. It is also inevitablediscussions. that these units will find their way The stratification of end user into enterprises. IT has shown that it computing into PCs for contentBy harnessing the web’s innate is powerless to stop such incursions, creation and media tablets forability to crowd-source ideas and as adoption is often fueled by upper content consumption parallelsto collaboratively sort information management,through, IT organizations canharness the trends behind and the tools By segmenting users based on provided by theconsumerization while increase tablet vendor are information usage patterns,employee engagement and extremely effectiveproductivity. at circumventing organizations can closely alignRecommendation # 5: Pilot IT security and use match device strategy with policies.”23media tablets with field workersand executives to see if they can unique segments of their user As IT organizationsreplace other devices; look at consider piloting population.allowing other populations to company-paidbring personally owned tablets to and/or employee-owned tablets to the stratification of knowledgework. the workplace, there are important workers. Today, there are three mainThe media tablet market is poised considerations: categories of knowledge workersto grow dramatically: expected to segmented by the way they work • Users love media tablets, user with information:go from 19 million units in 2010 to satisfaction is very high, support208 million units in 2014.22 As a costs appear to be low. • Information Multiplexersbroad selection of new devices hit create, consume, and processthe market, tablet use is expected • Media tablets are great devices information. These users areto skyrocket based on convenience, for the road and for quick most likely to stick with fullhigh levels of customer satisfaction, access to email, the Internet, featured client platforms due toand relatively low device prices. calendaring, social media, rich functionality, demand for mobile business applications processing power, and overallThe new generation of media from companies like Salesforce.tablets will create tough decisions utility. These users often carry com, and for access to corporate 2-3 devices.for IT organizations. While the application portals andmarket for such devices is booming virtualized desktops. • Information Consumersand user satisfaction is very primarily read and reviewhigh, the devices do not replace • Media tablets are not practical content – they do much of theirsmartphones or PC’s for most users. for content creation. processing on mobile devicesSo, while user demand is high, the such as a BlackBerry. For thesebusiness case to add tablets is hard • Media tablets will replace many vertically-owned users, media tablets are highly tablet PC’s and attractive. This is one reason“ 2013, 80% of businesses specialty devices. why many executives are attracted to media tablets.will support a workforce using When this is the case, the units will • Information Processors processtablets.” be provided and information created by others supported by IT. using cloud-based tools andto justify for most organizations and • Media tablet theft rates are very applications typically accessedusers. high. through the browser. These users can work with lessAccording to Gartner, “by 2013, Throughout 2011, device and richly configured clients. This80% of businesses will support a platform choice will dramatically category includes executivesworkforce using tablets.” Further, expand providing enterprises with and white collar workers who 9
    • Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing use their mobile device as the • Companies will increasingly pay For most organizations, the hidden key platform and then view/ for IT-owned laptops instead of costs will come from management consume on client or tablet. Also desktops for knowledge workers. and security changes that will includes call center sales and be required to support users service professionals who use • For workers using vertical and protect the enterprise in a browser-based tools to process PC tablet applications, heterogeneous device environment. customer information. companies will provide media tablets instead of PC tablets / Recommendation # 7: ConsiderBy segmenting users based on application-specific specialty desktop virtualization and otherinformation usage patterns, devices. new technologies to reduceorganizations can closely align security and data loss risks asmatch device strategy with • For companies that provide the demand for consumerizationunique segments of their user company-paid mobile phones, grows.population. Thus, as enterprise- these phones willready media tablets come to market, increasingly be For most organizations, theorganizations should seed them tokey user populations – executives, smartphones hidden costs will come from with company-IT, and select field and sales workers-- to evaluate their future potential. paid voice and management and securityRecommendation # 6: Develop a data. changes that will be required toclear point of view on company vs. • Companies will save money support users and protect theemployee cost sharing. Developa business case for incremental by eliminating enterprise in a heterogeneous desk phonesinvestment by linking end user for employees device strategy with humanresource planning, facilities with company-planning, and business strategy. paid mobile phones. In a heterogeneous device • In general, the third device environment that includesFor CIO’s, one of the biggest employee-owned devices, thechallenges of driving will always be paid for by the employee. primary CIO concern is preventingconsumerization will be the data loss and ensuring securitydevelopment of the business • Some companies with high- across unmanaged to justify incremental value knowledge workersinvestments. While improving in competitive fields will Desktop virtualization will becomeend user technology, enabling differentiate their workplace a primary model for organizationsnew capabilities, and allowing by allowing three paid devices to securely drive consumerization.employees to make better use of per employees (management By storing data and applications ontheir own technology will improve consultants, executives, software the server in controlled standardizedproductivity and help companies developers, etc.) images, desktop virtualizationmove to next generation business combines the benefits of corporatemodels, the immediate benefits are • Increasingly, tablets will become images, centralized storage,“soft’’ and hard to measure. For most standard devices for customer- centralized management and policyorganizations, consumerization facing field roles including enforcement with the freedom towill likely increase IT costs as sales, retail, and hospitality use a wide variety of company andorganizations increase their environments. employee provided in technology andexpand security, management, and • Some organizations will link Virtual desktops, as well as web-support capabilities. technology changes to flexible based application portals, allow working arrangements in users on a wide variety of devicesWho will pay for all of this new order to offset new technology – including smartphones and tabletstechnology in the new post- investments with facility cost – to access corporate resourcesconsumerization era? CIO’s should reductions. efficiently and securely and to moveexpect the following to occur: between devices. With the advent of10
    • CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Seriesclient hosted hypervisors, the same agreements) will need to pay for technology choice creates improvedbenefits can be extended to laptops licensing for the new devices. For user satisfaction. With a better userand other mobile devices that need most organizations, IT will need to experience should come improvedto remain fully functional when consider three licensing scenarios employee morale, productivity, anddisconnected from the network. as part of their consumerization use of technology to meet business efforts: requirements. Unfortunately, realIn addition to virtualization, some world pilots show that stipendmobile applications may be • Rights to access email and other programs often fail to deliver onbetter suited to more traditional server applications from the new these promises for the followingnative or platform applications devices. reasons:– especially those devices withsmaller screen sizes (5” or less). • Rights to run a server-based • Many employees are not ableIn these cases, Mobile Enterprise operating system in a virtual to choose technology on theirApplication Platforms (MEAP) allow desktop environment if used. own: they often pick equipmentIT departments to securely manage • Rights to access applications that is mobile and small butaccess and deployment of corporate running on a server or in a underpowered for enterpriseapplications, as well as enable “write hosted desktop environment (i.e. work.once, deploy many” scenarios Office).which support the variety of devices • It’s impossible for IT to provideand carriers in the enterprise today. All of these scenarios typically great end user support to a require additional licensing fees for population with an infiniteRecommendation # 8: Understand the new devices whether they are combination of devices. As athe software licensing implications employee or company owned. As result, the support experienceof consumerization. organizations connect additional usually receives poor marks from endpoints, especially net new both end users and the IT team.As company-issued smartphonesand tablets are increasingly used endpoints like tablets, they need • It is difficult to tune applicationsto access email, virtual desktops, to look closely at the licensing to work with an infinite variety ofand server-based applications, implications. For organizations that end user configurations causingcompanies will need to look at are broadly adopting new devices, additional device compatibilitysoftware licensing agreements and it may make sense to restructure and user satisfaction issues.practices to ensure compliance. licensing agreements to be user-The introduction of employee- oriented as opposed to device- In the end, pilots have shownowned devices further complicates oriented. poor end user satisfaction with thelicensing as large vendors like stipend experience, negating the Recommendation # 9: Avoid end primary benefit that these programsMicrosoft® make distinctions user stipends.between categories of users in their were designed to achieve.licensing agreements. Many organizations have piloted An alternative to stipends is to user stipend programs where provide employees with a broaderIn particular, organizations that employees are selection of IT-supported PC’s and provided fundsThe introduction of employee- to purchase the work requirements. When combined with policies that enable employeesowned devices further PC or computing to bring employee-owned devices device of theircomplicates licensing as choice. In the vast to work, companies should be able to reap the broad benefits of end majority of pilots,large vendors like Microsoft poor user and IT user consumerization.make distinctions between experiences have led companies tocategories of users in their cancel plans forlicensing agreements. further stipend roll outs.have device-based licenses (the Stipend programs are designeddefault under Microsoft enterprise around the assumption that user 11
    • Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile ComputingConclusions able to attract talent, execute help organizations streamline PC new business models, and evolve management and security. With Dell management capabilities to improve KACE, organizations can manageConsumerization is but one key competitiveness. more devices with greatly reducedelement in an important change labor and capital investment.that is happening today in the CIO Strategies for KACE Appliances make efficientrelationship between employees Consumerization: computer management and serverand employers. New technology How Dell Can Help management a reality by providingand the expanding role of the a low cost alternative to computerInternet are forever changing At Dell, we are uniquely prepared management software using ansocial relationships, management to help our customers embrace appliance-based architecture.philosophies, and business models and manage consumerization and Simply plug the appliance into youraround the world. the challenges and risk that come network, give it an IP address and with consumerization-related you are ready to begin managing changes. WithIT consumerization and nearly 100,000 all your desktops, laptops and servers. Unlike traditional computerthe rethinking of employee employees worldwide, Dell management software, KACE Appliances typically deploy in onetechnology is the foundation can help your day. company developfor the next wave of business, strategies for the Learn More ›, and employee next generation of end user Managed Security Services withchange. computing Dell SecureWorks and implementIn the words of Gary Hamel, a the changes needed to ensure In order to expand networkprominent management professor security and manageability in a access to new device categoriesand author, “while no company heterogeneous device environment. and employee-owned devices,would put up with a 1940s- companies need to review andera phone system, or forgo the In particular, Dell can help modernize security for the network,efficiency-enhancing benefits of companies of all sizes through the end points, and applications. In earlymodern IT, that’s exactly what following services and solutions: 2011, Dell announced its intentioncompanies are doing when they to acquire SecureWorks, one of thefail to exploit the Web’s potential Desktop Virtualization leading managed security serviceto transform the way the work of Solutions & Services is accomplished. Most Whether you need to secure SecureWorks provides managedmanagers still see the Internet as employee data in a heterogeneous services and consulting to helpa productivity tool, or as a way of device environment, you want to companies manage securitydelivering 24/7 customer service. enable employees to use their own threats. SecureWorks managedSome understand its power to devices at work, or you just want to service offerings including Securityupend old business models. But centralize your data and ensure that Information Management, Logfew have faced up to the fact that your workforce benefits from a rich Monitoring, Intrusion Preventionsooner or later, the Web is going to productivity environment, Dell can Systems, Counter Threat Unitturn our smoke-stack management help companies design, pilot and Intelligence, Firewall Management,model on its head.”24 implement desktop virtualization in and Web Application Scanning.For companies with knowledge your organization. Learn More ›workers, IT consumerization and the Learn More › of employee technology Dell Software Inventory and Usageis the foundation for the next wave Distributed PC & Device Managementof business, management, and Management with Dell KACEemployee change. Companies For IT organizations,that adapt quickly and actively As consumerization drives large consumerization of IT createschange the relationship between increases in the number of devices challenges for applicationIT and end users will be better under management, Dell can12
    • CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Seriescompatibility and software Dell Smartphones and Tablets Microsoft Enterprise Agreementlicensing as the number and types Licensingof devices expands. To embrace Dell’s full line of enterprise-readyconsumerization, companies need smartphones and tablets includes Dell’s Microsoft Enterpriseto understand application usage smartphones running Android Agreement and volume softwarepatterns and they need to have and Windows Mobile 7, 5” and 7” licensing expertise can helpclear picture of software licensing Android tablets, as well as tablets you choose the best softwarecompliance. The Dell Software and convertible PC tablets running heterogeneous device environment Windows 7. under the most favorable licensing Learn More › program. And our flexibleTo embrace consumerization, distribution options can help you smartphones- configure and deploy softwarecompanies need to understand tablets quickly and easily, from virtuallyapplication usage patterns Dell Application anywhere you do business. Learn More ›and they need to have clear Services of software licensing Dell Services To learn more about Dell’s solutions providescompliance. consulting, and services, and to schedule a conversation to discuss how Dell application can help enterprises embrace ITInventory & Usage Management development, Integration and consumerization, contact yourservice automates asset discovery, testing services to help companies account representative or completehelps monitor usage and simplifies modernize application architecture the form at compliance to help eliminate and take advantage of newunused applications, track licensing mobile application platforms.compliance, and profile application We help you assess your existingusage across the organization. application portfolio and designLearn More › the appropriate architecture enable IT optimization over the long term. We also help you chooseDell Enterprise-ready Notebooks & the appropriate development toolsTablets and packaged applications to meetDell™ Mobile Computing solutions both current and future goals. Usinglet your employees decide where our deep levels of experience inand when to get their work done diverse development platforms,— and they can use the device we work closely with your team toof their choice. You can also use implement, develop, and deployDell Mobile Computing solutions the best application solutions forto satisfy the demands of the your organization. In the case ofnew tech-savvy generation of enterprise applications, we helpemployees who expect to use you implement and customizetheir personal computing devices these at multiple locations. Wein the workplace. Dell services- help reduce risk prior to deployingbacked Mobile Computing solutions applications in a heterogeneousaccommodate workforce flexibility device environment by testingand protect your mobile devices their conformance to requirementsand data without adding excessive through manual or automatedIT burden. So give your talented testing. We deliver services at aworkforce the freedom to be lower cost while reducing time-to-productive and tap into their full market.potential. Learn More ›Learn More › 13
    • Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile ComputingFootnotes1. Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies (G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.2. Facebook (2011). Press Room Statistics. Retrieved January 18, 2011 from Bureau of Labor Statistics. (2009). American Time Use Survey. Retrieved January 18, 2011 from Nielsonwire. (2010, June 15). Social Networks/Blogs Now Account for One in Every Four and a Half Minutes Online. Retrieved January 18, 2011 from Admin (Tom) (2010, April 30). Releases Study on Trends in Online Dating. Retrieved January 18, 2011 from http://www. Unisys. (2010). Unisys Consumerization of IT Benchmark Study.7. Sloan Center on Aging & Work at Boston College. Barriers to Workplace Flexibility. Retrieved on January 18, 2011 from http:// Forrester Research, Inc. (2009, March 11). Telecommuting Forecast, 2009 To 2016.9. Khosla, V. (2010, November 16). Innovation vs Punditry Presentation 1 [Powerpoint slides]. Retrieved on January 18, 2011 from Morgan Stanley (2010). Internet Trends. Retrieved on January 18, 2011 from trends060710final11. Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies (G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.12. Unisys. (2010). Unisys Consumerization of IT Benchmark Study.13. Morgan Stanley (2010). Internet Trends. Retrieved on January 18, 2011 from trends060710final14. Bughin, J., Doogan, J., & Vetvik, O. J. (2010, April). A new way to measure word-of-mouth marketing. McKinsey Quarterly. Retrieved on January 18, 2011 from Unisys. (2010). Unisys Consumerization of IT Benchmark Study.16. Gartner. (2010, February 10). Findings: In January 2010, the Consumerization of IT Became a Business Strategy Issue (G00174465). Raskino, M.17. Manyika, J., Sprague, K., & Yee, L. (2009, October 27). Using technology to improve workforce collaboration. McKinsey & Company’s What Matters. Retrieved on January 18, 2011 from to-improve-workforce-collaboration18. Dell. (2010, November). Mobile Device Management and Security. Technology Business Research, Inc.19. Gartner. (2010, September 2). Securing and Managing Private and Public Cloud Computing (G00206019). Pescatore, J.20. Unisys. (2010). Unisys Consumerization of IT Benchmark Study.21. Johnson, S. (2011, January 11). Mobile broadband users seen hitting 1 billion in 2011. Reuters. Retrieved on January 18, 2011 from Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies (G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.23. Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies (G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.24. Hamel, G. (2007). The Future of Management. Boston, MA: Harvard Business School Press.Microsoft, Encarta, MSN, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/orother countries. 14