The Cloud-Enabled Social Mobile Enterprise

1,034 views
986 views

Published on

The Aberdeen group joins Fiberlink for this webinar on the convergence of social, mobile and cloud.

Learn more: http://www.maas360.com/products/mobile-device-management/

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,034
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
36
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Greetings everyone and welcome to this session on the cloud enabled social mobile enterprise.In previous sessions we’ve covered mobility issues and how the cloud can be used to enable a more efficient mobile enterprise. The third leg of the stool is social. Businesses today are trying to figure out how to improve collaboration and communication with their organizational communities, whether it’s with employees, customers, and partners. These three technologies are inextricably connected and those companies that can harness that power will be in the best position to compete.Today’s session will cover:State of Enterprise Mobility Management (EMM)The Rise of Bring Your Own Device (BYOD)Cloud-Enabled Social Mobile Enterprise Leveraging the Cloud for Mobility IntelligenceEMM Strategy RecommendationsWe are thrilled to have with us today our guest Andrew Borg,Research Director,Mobility Center of Excellence at Aberdeen Group. Andrew has covered this market for years and has done extensive research in this area. Andrew will provide his insights and specific recommendations and actions companies can be best in class in this area.
  • Enabling the Social Mobile Enterprise from the Cloud Personal iPads, iPhones and Androids have untethered communications from the cubicle. Beyond email, apps like iMessage, LinkedIn, Twitter and Salesforce Chatter give these devices the power to further streamline communications, automate workflows and increase collaboration for unparalleled productivity.  Now, IT needs to learn how to manage and secure this new nirvana of information sharing on the go. Enter the cloud.   Join our webinar featuring Andrew Borg of Aberdeen Research and Fiberlink for insight on the virtues of combining social media for productivity, mobile for delivery, and cloud-platforms for cost-effective control.    You’ll learn the secrets to a truly social mobile enterprise, including: Embracing Bring Your Own Device with confidenceManaging the mobile app lifecycleSecurely sharing content on mobile devicesDeploying from the cloud for efficiencies 
  • Device/OS providers staying the courseApple pushing Consumer and Apps and becoming standard in EnterprisesAndroid fragmentation continues and higher device security concernBlackberry migration underway.Maybe Windows 8 accelerates Windows Phone adoption.Core MDM Best Practices continue to drive customer purchasesEmail access controls for BYODDevice provisioning & OTA configuration of email, Wi-Fi, and security policyLocate, selective wipe, reporting/audit trialApps & Docs are key requirements for evolving mobile strategyEnterprise App Store for public/private apps and app dev assistGrowing interest in App security and Doc containerization.F1000 want scalable solutions after initial pilotsGeographic, network segments, frequent updates are stressing infrastructure operationsApp Mgmt teams want to move fast – mandates for global app distribution
  • What’s next in enterprise mobility management is the idea of social mobile intelligence. Cloud based EMM systems need to create value differently than just the delivery model that provides speed and ease of use.They will be able to leverage the network effect of the tremendous amount of data that is collected across a broad range of customers.Each new device, app, action, policy, and more adds valuable data to the engineThis not only improves the service for all customers but allows customers to benchmark themselves against the community based on that data across the platform.Cloud EMMs won’t just present your data in a cool interface or offer productivity improvements, they harness data across a community to deliver you a actionable intelligence that leads to better mobility outcomes – like greater ROMI, return on mobile investments.
  • EMM platforms will provide community based analytics that deliver best practices and benchmarking. Instead of just capturing how many iPhones or iPads or Android devices are deployed in your environment, it would compare your environment to others in real time. Or instead of seeing just your own passcode quality, wouldn’t it be better if could see how you compare to others in your industry or company size and make recommendations on how to adjust?Or wouldn’t it be good if you could subscribe to a service that provides alerts on new apps not seen previously in the EMM community? Perhaps it could present a security threat.This is the social mobile enterprise that can only be powered by the cloud.
  • Enabling the Social Mobile Enterprise from the Cloud Personal iPads, iPhones and Androids have untethered communications from the cubicle. Beyond email, apps like iMessage, LinkedIn, Twitter and Salesforce Chatter give these devices the power to further streamline communications, automate workflows and increase collaboration for unparalleled productivity.  Now, IT needs to learn how to manage and secure this new nirvana of information sharing on the go. Enter the cloud.   Join our webinar featuring Andrew Borg of Aberdeen Research and Fiberlink for insight on the virtues of combining social media for productivity, mobile for delivery, and cloud-platforms for cost-effective control.    You’ll learn the secrets to a truly social mobile enterprise, including: Embracing Bring Your Own Device with confidenceManaging the mobile app lifecycleSecurely sharing content on mobile devicesDeploying from the cloud for efficiencies 
  • Joe to cover
  • Rarely does the opportunity present itself that a support model can be redefined. In today’s mobile norm, that opportunity is upon us now. It is only possible with the influx of new innovation and technology.We believe that to manage mobility today, you need to view device management across multiple facets. Users – need to support their mobile lifestyle. Personal devices, multiple devices per user Device – lifecycle management for all devices now, not just PC’s. MAC, iOS, Android, devices no longer a one to one ratio. How are you deploying and managing these. Applications – Ability to distribute and manage in-house applications as well as purchased apps. Enterprise – The enterprise crosses all of the other three facets. How about true one window, one system approach. Operational efficiencies, policy settings across users and devices, Auditing and compliance. By considering and implementing an approach which covers all four of these areas, you will be taking a very strategic and complete approach to mobile device management.
  • The Cloud-Enabled Social Mobile Enterprise

    1. 1. The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group1
    2. 2. Today’s Agenda • State of Enterprise Mobility Management (EMM) • The Rise of Bring Your Own Device (BYOD) • Cloud-Enabled Social Mobile Enterprise • Leveraging the Cloud for Mobility Intelligence • EMM Strategy Recommendations 2
    3. 3. Andrew Borg Research Director Mobility Center of Excellence© AberdeenGroup 2011
    4. 4. Research Review Intersection of Two Self-Assessment Research Methods  PACE Model: behavioral assessment Pressures – pain-points and drivers Actions – strategies and tactics Capabilities – processes and skill sets Enablers – technologies and services  Maturity Class: performance metrics: Top 20% - Best-in-Class Middle 50% - Industry Average Trailing 30% - Laggard  Results are Verified: Survey follow-ups, end-user interviews4 • © AberdeenGroup 2012 – Not For Distribution
    5. 5. Mobility Pain Points Executive and employee demands to leverage mobility’s 46% productivity gains to broader organization Need to become more 30% operationally efficient Increasing capabilities and 24% complexities of new devices 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May 20125 • © AberdeenGroup 2012 – Not For Distribution
    6. 6. Mobility Strategies Ensure all mobile devices with enterprise access are compliant 44% with corporate standards Support a heterogeneous (vs. homogeneous) mix of mobile device 29% platforms Control the mobile software applications (apps) that have 19% corporate data access 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May 20126 • © AberdeenGroup 2012 – Not For Distribution
    7. 7. The EMM Lifecycle  Provisioning  Compliance and security  Performance management  Expense management  Operations and support  Decommissioning Device Refresh Cycle Effort 1 2 3 4 5 6 Time7 • © AberdeenGroup 2012 – Not For Distribution
    8. 8. Best-in-Class Defined 94% Employees with Secure Mobile Access to 41% Company Network 10% 7% Lost or Stolen Devices Never Recovered 9% Best-in-Class 13% Industry Average Laggard 10% 1-Year Change in Speed of Decision-Making 4% -4% -20% 0% 20% 40% 60% 80% 100% Percentage, n=431 Source: Aberdeen Group, May 20128 • © AberdeenGroup 2012 – Not For Distribution
    9. 9. Best-in-Class Point the Way  Process  Decommission process for lost, stolen, or outmoded devices  Security policy for full lifecycle of all compliant devices  BYOD policy established for corporate use of Organization  Organization  IT controls all mobile access to company assets  Heteregeneous mobile device support  DLP procedures protect corporate data on employee devices  Corporate profiles on employee devices secure corporate assets9 • © AberdeenGroup 2012 – Not For Distribution
    10. 10. Best-in-Class Point the Way  Knowledge  Internal expertise developed on targeted mobile platforms  Regular assessment of security risks  Mobile collaboration tools utilized  Performance  Track number of lost or stolen devices successfully decomissioned  Track uptime of organization’s Wi-Fi® network  Track level of mobile access to network and data provided to each employee10 • © AberdeenGroup 2012 – Not For Distribution
    11. 11. Key Technologies Remote mobile device lock and wipe 60% 55% (erase all data) 40% Employee-selected mobile applications 52% 40% (apps) 38% In-house developed mobile 45% 42% applications (apps) 29% Self-service web portal for support and 45% 26% procurement 13% Mobile versions of enterprise software 35% Best-in-Class 31% (ERP, CRM, SFA, etc) 22% Industry Average Enterprise mobile application store 31% Laggard 25% (app store) 11% 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May 201211 • © AberdeenGroup 2012 – Not For Distribution
    12. 12. Smartphone Vs. Tablet Security Smartphones Tablets Δ Best- Security Capabilities Best-in- All Best-in- All in-Class Class Others Class Others Tablets Mobile user authentication 75% 65% 59% 52% 25% Policies for user logon password strength enforced 74% 60% 56% 44% 30% Data encryption over wireless connections 65% 56% 44% 39% 38% VPN for mobile devices 64% 51% 48% 43% 31% Mobile device remote lock and wipe 64% 53% 38% 35% 49% Secure and compliant mobile file sharing via cloud 45% 27% 36% 22% 33% Data Loss Prevention (DLP) 41% 29% 28% 25% 45% Application version control (e.g. blacklist / whitelist) 38% 30% 26% 25% 40% N = 431 Source: Aberdeen Group, May 201212 • © AberdeenGroup 2012 – Not For Distribution
    13. 13. Performance Gains Rate their workforce as "extremely 28% productive" 15% 12% 12 mo. change in employee adherence to 10% mobile policies 5% Best-in-Class -2% Industry Average Laggard 8% 12 mo. change in workforce productivity 4% -3% -5% 0% 5% 10% 15% 20% 25% 30% Percent of Respondents, n=237 Source: Aberdeen Group, May 201213 • © AberdeenGroup 2012 – Not For Distribution
    14. 14. BYOD is a Global Phenom 100% 90% 18% 15% 15% 24% 80% 70% 33% 32% 41% 60% 27% No 50% Yes, but from an approved 40% company list only Yes, any device 30% 50% 53% 49% 20% 44% 10% 0% n = 472 GLOBAL USA EMEA APAC Source: Aberdeen Group, May 201214 • © AberdeenGroup 2012 – Not For Distribution
    15. 15. Poll Question Why has your organization chosen to implement a Bring Your Own Device (BYOD) Program? a) To accommodate the demand of employees b) Employees gain additional productivity c) The business reduces costs by not paying for devices 15
    16. 16. Why BYOD? To 56% accommodate 52% the demands of employees 65% Employees gain 62% additional 56% productivity 46% Best-in-Class The business 48% Industry Average reduces costs 46% Laggard by not paying for devices 49% 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May 201216 • © AberdeenGroup 2012 – Not For Distribution
    17. 17. Industry Point of View • Device/OS platform diversity • Core MDM best practices continue to drive adoption • Apps & Docs are key requirements for evolving mobile strategy • Large enterprises need scalable solutions after initial pilots 17
    18. 18. Tweet Break @MobileAberdeen @MaaS360 Hashtags: #SoMoClo #MaaS360Webinar18 • © AberdeenGroup 2012 – Not For Distribution
    19. 19. Social Mobile Cloud Have Initiatives or Intend to Adopt 82% Social business 65% 80% Mobility 77% 69% Cloud 64% Best-in-Class None of the 3% above 11% All Others 0% 20% 40% 60% 80% Percent of Respondents, n=431 Source: Aberdeen Group, May 201219 • © AberdeenGroup 2012 – Not For Distribution
    20. 20. Mobile is Social Use Social Networks 5% 1% 54% Yes, frequently Yes, occasionally Not yet, but planning to 41% No Percent of Respondents, n=431 Source: Aberdeen Group, May 201220 • © AberdeenGroup 2012 – Not For Distribution
    21. 21. Social Business Strategy 100% 90% 21% 26% Percent of respondents, n=431 80% An ad hoc approach - at 43% each employees discretion 7% 70% 60% 21% Part of a planned social 50% media strategy, not 15% necessarily compliant with 40% company IT policy 72% 30% 52% Part of a planned social 20% 43% media strategy, secure and 10% compliant with company IT 0% policy Best-in-Class Industry Laggard Average Source: Aberdeen Group, May 201221 • © AberdeenGroup 2012 – Not For Distribution
    22. 22. Poll Question EMM Hosting Plans for Next 12 Months: a) A solution provider hosts our EMM in the cloud b) A solution provider hosts our EMM on their premises c) A solution provider hosts our EMM on their premises and manages it for us d) We host our EMM on our premises, and a solution provider manages it for us e) We host and manage our EMM on our premises 22
    23. 23. © AberdeenGroup 2011
    24. 24. Device-Centric Post-Device APPS USER ACCESS MANAGEMENT DEVICE DATA STORAGE FIREWALL DATA TRANSMISSION MOBILE ECOSYSTEM MANAGEMENT DATA CONTEXT DATA CENTER DATA STORAGE APPS24 • © AberdeenGroup 2012 – Not For Distribution
    25. 25. Instant Enterprise Mobility Management Agility of the cloud for the pace of change in mobility• Fast deployment – Simple provisioning processes – Intuitive user interface• Effortless scalability – Instantly turn up devices, users, apps – Start small and easily expand up• Automatic upgrades – Continuous updates available instantly – No ongoing maintenance Enterprise Mobility Management• Unmatched affordability Platform – Zero infrastructure needed – Pay as you go subscription model 25
    26. 26. Social Mobile Intelligence • Moving beyond the delivery model – Create value differently than just speed and ease of use • Leveraging the network effect Devices of data collection – Each new user adds data to the “engine” Actions Apps – Improves the service for all Mobile customers Cloud – Benchmark against peers based on data across the platform Policy Docs Big Data Analytics for Enterprise Mobility 26
    27. 27. EMM Community AnalyticsBest practices and benchmarking 27
    28. 28. Key Takeaways: Dive into EMM  Start with MDM  If your organization cant recover the contents, or lock or wipe the data from a lost, stolen, or compromised device, then it better be entirely certain that theres no confidential or protected data on it first.  Track them before you lose them  Lost or stolen mobile devices that cannot be recovered are your organizations single largest mobile security and compliance vulnerability. Use MDM to take control of all rogue devices.  Mobile Application Management (MAM)  A MAM solution enables the organization to deploy, monitor, and enforce policy for both corporate-developed and publicly available apps.  Tablets have an insecurity complex  Apply to tablets the same rigor and IT service management principles that are used to support netbooks and smartphones.28 • © AberdeenGroup 2012 – Not For Distribution
    29. 29. Twitter: @MobileAberdeen© AberdeenGroup 2011
    30. 30. Questions or follow-up?Wrap Up nflorio@fiberlink.com andrew.borg@aberdeen.com• Upcoming Webinars (Registration Link in Chat Window) – Embracing BYOD with MDM and NAC • Thursday, June 7th @ 2:00 PM Eastern• Past Webinars (http://links.maas360.com/webinars) – Android in the Enterprise: Piecing Together Fragmentation – BYOD: Striking a Balance—Employee Privacy and IT Governance – Best Practices for Implementing a BYOD Program• Plus lots of How-To content on our website – Mobile Device Management Best Practices • http://links.maas360.com/mdm – Mobile Device Management Glossary • http://links.maas360.com/mdm_glossary 30
    31. 31. MaaS360: Comprehensive EMM from the Cloud Get Started Now! Visualize the entire mobile computing environment Manage users, devices, apps, and expenses across the enterprise Secure corporate data and enforce compliance Free 30-day Trial: www.maas360.com/trial/ 31

    ×