Building an Effective Mobile Device Management Strategy

3,720 views
3,551 views

Published on

Fiberlink and Forrester share the best-practices in developing a mobile device management strategy for the enterprise.

To learn more: http://www.maas360.com/products/mobile-device-management/

Published in: Technology, Business

Building an Effective Mobile Device Management Strategy

  1. 1. Building an Effective Mobile Device Management Strategy Benjamin Gray Forrester Research Jim Szafranski Fiberlink© 2011 Fiberlink Communications © 2011 Fiberlink Communications
  2. 2. The Empowered Consumer Devices Email and Data Apps © 2011 Fiberlink Communications 2
  3. 3. Building An Effective MobileDevice ManagementStrategyBenjamin GrayPrincipal AnalystForrester ResearchApril 26, 2011
  4. 4. Agenda • The state of commercial mobility • Consumerization’s impact on mobile strategy • How firms are rethinking their mobile policies • Mobile device management and security best practices4 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  5. 5. Four empowering technologies converge . . . Cloud computing Smart services mobile devices Pervasive Social video technology5 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  6. 6. . . . on these devices6 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  7. 7. Firms are embracing mobility to meet business challenges • Wireless network use continues to proliferate. • There’s pent-up demand for mobile devices (i.e., smartphones, tablets, etc.). • Applications are being mobilized faster than anticipated. • Personal devices are getting support (regardless of whether IT wants to provide it or not). • Policy, management, and data security are top IT priorities. • Progressive organizations are embracing device-agnostic — and user-centric — mobile device management solutions.7 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  8. 8. A proliferation of mobile platforms exist and there will never be a single winner8 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  9. 9. Half of enterprises already support two or more mobile platforms “How many mobile operating systems does your firms IT department officially support and manage?” Base: Mobile technologies and services decision-makers at North American and European companies Source: Enterprise And SMB Networks And Telecommunications Survey, North America And Europe, Q1 20109 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  10. 10. Mobile platforms are widespread and many remain unmanaged “Which of the following handheld operating systems does your firm’s IT department officially support and manage?” 70% BlackBerry 64% 73% 41% Windows Mobile 44% 38% 29% iOS 27% 30% 13% Android 9% 16% 13% Windows Embedded CE 13% All respondents (N=1,009) 14% 12% Palm OS 4% Europe (N=382) 17% 12% IT doesn’t officially support and manage ANY… 11% 13% North America (N=627) 8% webOS 4% 10% 7% Symbian 14% 4% 7% Linux 9% 5% Base: Mobile technologies and services decision-makers at North American and European companies Source: Enterprise And SMB Networks And Telecommunications Survey, North America And Europe, Q1 201010 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  11. 11. Firms are embracing mobile applications faster than they anticipated “What are your firm’s plans to adopt the following mobile applications?” Base: 1,009 mobile technologies and services decision-makers at North American and European companies Source: Enterprise And SMB Networks And Telecommunications Survey, North America And Europe, Q1 200911 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  12. 12. Agenda • The state of commercial mobility • Consumerization’s impact on mobile strategy • How firms are rethinking their mobile policies • Mobile device management and security best practices12 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  13. 13. More than half of firms support personally owned smartphones “What is your firm’s official IT policy for supporting personally owned mobile phones and smartphones (does NOT include laptops)?” Base: Mobile technologies and services decision-makers at North American and European companies Source: Enterprise And SMB Networks And Telecommunications Survey, North America And Europe, Q1 201013 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  14. 14. In North America, personal-liable is on par with corporate-liable “Who pays for the following mobile services?” [data (email, text, Internet access)] Base: 2,079 information workers in North America and Europe Source: Workforce Forrsights Survey, Q3 201014 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  15. 15. What it means • Workers are becoming increasingly distributed and mobile; work is no longer confined to always-connected devices. • Younger and more tech-savvy employees (Millennials) have loftier mobility expectations of IT than Baby Boomers. • IT is supporting an increasing diversity of devices, OSes, and applications, and new devices often conflict with corporate standards and sourcing practices. • IT is also facing heavy pressure to support personal and consumer devices and applications. • As a result, firms are not keeping pace with a twofold challenge: – Mobile device management. – Mobile security.15 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  16. 16. Agenda • The state of commercial mobility • Consumerization’s impact on mobile strategy • How firms are rethinking their mobile policies • Mobile device management and security best practices16 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  17. 17. Defining a mobile enterprise policy A mobile policy: • Enables new business processes and efficiencies • Manage costs • Reduces risk • Defines a clear technical road map Successful mobile policies have three main elements: 1. A mobility framework 2. A security policy 3. Device management and support17 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  18. 18. Step 1: A mobility framework A mobility framework establishes support guidelines • What types of employees? • What devices? • What operating systems? • What applications? • How much security? • How does IT manage? • Who pays?18 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  19. 19. Step 2: A security policy Security policies minimize mobility threats • Establish a baseline of protection through passwords. • Provide a way to neutralize the device if lost or stolen. • Offer advanced security methods that adapt to shifts in malware.19 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  20. 20. Step 3: Device management and support Management and support makes mobility usable • Set a technical policy based on business input. • Develop a process for introducing new devices and mobile applications. • Define a process for how devices should be managed. • Establish a procurement and servicing procedure.20 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  21. 21. Agenda • The state of commercial mobility • Consumerization’s impact on mobile strategy • How firms are rethinking their mobile policies • Mobile device management and security best practices21 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  22. 22. The top 20 mobile device management and security best practices 1. Segment your workforce. 2. Build in flexibility by enabling device diversity. 3. Invest in a mobile device management solution or managed service. 4. Utilize a single Web-based console for all management and security operations. 5. Outline procedures for requesting and obtaining mobile devices, applications, and services. 6. Spell out appropriate use. 7. Plan to support personal devices (i.e., smartphones and tablets). 8. Clearly define who is responsible for mobile expenses and to what extent. 9. Explain internal and external service desk support availability. 10. Avoid the company logo on mobile devices.22 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  23. 23. The top 20 mobile device management and security best practices (cont.) 11. Enforce a strong password policy. 12. Automate remote device wipe after 10 unsuccessful authentication attempts. 13. Remotely lock or wipe all lost or stolen devices. 14. Encrypt all corporate data. 15. Limit the data stored on the device through document portal usage. 16. Provide multi-channel training and links to additional resources. 17. Embrace Web 2.0 as a means to reinforce best practices training. 18. Display a telephone number on the locked screen to call if a lost device is found. 19. Empower users with self service to lower support costs. 20. Leverage remote control functionality to troubleshoot issues faster.23 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  24. 24. The next 90 days • Embrace the idea of consumerization. • Segment your workforce. • (Re-)Define a mobile policy. • Develop a process for introducing new devices and mobile applications. Longer term • Invest in a mobile device management solution that supports multiple platforms. • Build in flexibility by enabling device diversity. • Plan to support employee-owned devices.24 Entire contents © 2010 Forrester Research, Inc. All rights reserved. 2009
  25. 25. Thank you Benjamin Gray +1 617.613.6143 bgray@forrester.com www.forrester.com25 Entire contents © 2010 Forrester Research, Inc. All rights reserved.
  26. 26. Fiberlink Overview Diverse Range of Customers> Founded in 1991> Enterprise Mobility Management Solutions> MaaS360 Platform> Diverse Customers> Over 1M Users © 2011 Fiberlink Communications 26
  27. 27. MaaS360: A Unique ApproachOn-Demand, Device and Network Management Service Platform > Single Console  Smartphones  Tablets  PCs  Macs > Lifecycle Management  Provision  Integrate  Secure  Manage  Monitor  Support > True SaaS © 2011 Fiberlink Communications
  28. 28. Learn More: MaaSters Center> Online Community for Mobility maasters.maas360.com  Free Tools  Forums  Webinars  30-Day Evaluation © 2011 Fiberlink Communications 28
  29. 29. Q&A © 2011 Fiberlink Communications 29

×