• Save
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Upcoming SlideShare
Loading in...5
×
 

Key Trends and Opportunities in Business Mobility and Enterprise Communications

on

  • 2,349 views

 

Statistics

Views

Total Views
2,349
Views on SlideShare
1,742
Embed Views
607

Actions

Likes
1
Downloads
53
Comments
0

8 Embeds 607

http://newchannelbuzz.com 395
http://latamtelecom.net 171
http://www.doyoubuzz.com 22
http://jca1983.tumblr.com 13
http://www.tumblr.com 2
https://www.linkedin.com 2
http://translate.googleusercontent.com 1
http://www.linkedin.com 1
More...

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • The smartphone revolution of the last three years has changed how mobile workers operate.
  • Consumers are adopting smartphones faster than just about tech product in history.Smartphones will exceed 420 million devices in 2011, nearly 28% of the global handset market.(IMS Research, http://imsresearch.com/press-release/Global_Smartphones_Sales_Will_Top_420_Million_Devices_in_2011_Taking_28_Percent_of_all_Handsets_According_to_IMS_Research)More than likely, these devices are already being brought into the workplace.New information technology is emerging first in the consumer market and then spreading into business organizations
  • A recent IDC survey found that 95% of respondents have used technology they purchased themselves for work. (“Consumerization of IT: 95% of Information Workers Use Self-Purchased Technology for Work”http://www.readwriteweb.com/enterprise/2011/03/consumerization-of-it-95-of-in.phpAccording to Aberdeen data (from late 2010 and 2011 surveys), almost 75% of companies allow employee-owned smartphones and/or tablets to be used at work. 25% give employees a whitelist of allowed devices and almost half let employees bring in and use any device.(“75% of Enterprises Have 'Bring Your Own Device' Policies. What That Means” http://www.zdnet.com/blog/sybase/75-of-enterprises-have-bring-your-own-device-policies-what-that-means-charts/1025), via Simply Security Report: ‘BYOD’ is changing workplaces http://www.simplysecurity.com/2011/06/09/report-byod-consumerization-is-changing-workplaces/A report from Strategy Analytics shows that 61% of U.S. corporation have found that their employees are already using tablets for work purposes(“Ready or not, iPad, other tablets are in the enterprise”, http://www.pcworldme.net/2011/04/15/ready-or-not-ipad-other-tablets-are-in-the-enterprise/)
  • It is clear that there is a disconnect between employees and employers about how consumer technologies are used in the enterprise.95% of employees use self-purchased technologies for work, 70% employers want to buy standardized technologies for them.
  • A consumer-oriented IT focus is more than just aiming to please the end user but rather, leveraging new technologies to improve employee productivity and reduce IT costs. Mobile professionals spend time away from their desk and require tools that will let them do their job: field sales, field service, production, consultants, managers. The question is how can IT create the right environment for them?Increased IT costs - One of the reasons IT might be unwilling to allow personal devices are the added support and maintenance costs due to increased complexity caused by more heterogeneous computing environments. In addition, there is the possibility to go overboard and try to compete with consumer products through the development of “consumer-oriented” services and applications.
  • End users and technology are pulling the organization one way and security needs, compliance are pulling the other way.
  • SecuritySensitive data – depends on the industry, for example retail, health care, finance may demand privacy and a higher level of security requirements than other industriesIndustry compliance – a complex legal and compliance environment require a higher level of security
  • Possible scenarios:Traditional approach (seal off corporate IT) = Low IT Security Risks, Low User Freedom / Consumerization, essentially banning the use of consumer-oriented IT and personal devices at work.Open environment = High IT Security Risks, High User Freedom / ConsumerizationThe opposite scenario would be opening the organization with a computing environment that is easily accessed and user-determined.Take no action = Ignore IT consumerization altogether. This has the potential to shift to High IT Security Risks as the end user will tend to move towards “BYOD” and eventually to “self configuration”Ideally, the organization should move toward high consumerization / low security risks, either through company owned or BYOD, providing high mobility to employees that can benefit from itAdditional scenarios:BYOD + corporate apps, BYOD + corporate desktop = Low IT Security Risks, High User Freedom
  • MagicQuadrant reference interviews revealed that consumerization is the No. 2 challenge they faced in2010; consumerizationwasn't in the top five last year. The advent of the iPad is the catalyzing factor, surveysshow that somewhere between 50% and 75% of desktop groups have received requests foriPad support.The iPad in the enterprise phenomenon has also driven users to request support for new handheld devices, such as the iPhone or the Android phone, leading enterprises to support a greater variety of devices. The primary mobile device management (MDM) concern is dataprotection. IT organizations want to ensure that user data is secure if the device is lost or stolen.Organizations are starting to treat smartphones (and now tablets) the same way they treat PCs.Systems Infrastructure SoftwareChange and Configuration Management Software (CCM)Secure Content and Threat Management (SCTM)Security and Vulnerability Management Software (SVM)Problem Management Software (PM)Application and User Session Virtualization (AV)Security Products and ServicesSecurity information and event management (SIEM)Proactive endpoint risk management (PERM )Forensics and incident investigation (FII)Policy and complianceSecurity systems and configuration management (SSCM)Device vulnerability assessment (VA), Application vulnerability assessment (VA )
  • The smartphone revolution of the last three years has changed how mobile workers operate.
  • The Evolution of Enterprise Mobility, Pyxis Mobile 2011Enterprises are leveraging mobility to improve operations and how they interact with customers, employees and suppliers

Key Trends and Opportunities in Business Mobility and Enterprise Communications Key Trends and Opportunities in Business Mobility and Enterprise Communications Presentation Transcript

  • Key Trends and Opportunities in Business Mobility and Enterprise Communications
  • 1
    Key Trends in 2011
    Rise of Handheld Computers
    BYOD “Bring Your Own Device”
    The Consumerization of Enterprise IT
    Key Challenges for IT
    Meeting User Expectations
    Increased Support and Maintenance Costs
    New Security and Compliance Risks
    The Options for IT
    Factors to Consider
    Approaches To Consumerization
    Enterprise Mobilization Strategy
    Conclusions and Final Remarks
    2
    3
    4
    Agenda
  • 1
    Key Trends in 2011
  • Three Key Trends In 2011
    1
    Smartphones and tablets are the new PC
    Consumers are adopting smartphones faster than just about any other tech product in history.
    2
    Bring Your Own Device is changing how we work
    Employees now expect to be able to use the smartphones and tablets they bought for personal use.
    3
    Consumer Technology is influencing the enterprise
    Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.
  • 75%
    61%
    95%
    US corporations where employees use tablets for work purposes.
    Strategy Analytics
    via PCWorld
    April 2011
    Information Workers Using Self-purchased Technology For Work
    IDC survey of IT Consumerization Trends
    March 2011
    Enterprises with 'Bring Your Own Device' policies
    Aberdeen data
    via ZDNet
    March 2011

  • Employers don’t know
    how many or what consumer technologies are in use.
    Workers report using consumer devices attwice the rateemployers reported.
    Survey of IT Consumerization Trends
    IDC, March 2011
  • 2
    Key Challenges for IT
  • Key Challenges For IT
    1
    Shift to a more consumer-oriented IT focus
    IT needs to bridge the growing gap between employee and IT interests.
    2
    Consumerization can increase IT costs dramatically.
    An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly.
    3
    New security and compliance risks
    Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.

  • IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.
  • 3
    The Options for IT
  • Factors To Consider
    Security Requirements
    Does the company work with sensitive data?
    Is the company risk-averse?
    Industry compliance and regulation
    Mobility
    Desktop Computer VS Mobile Devices
    Can mobile applications help the company ’s employees, customers, and value and supply chain partners?
    What functionalities does each user group need mobilized?
    What device types, capabilities and hardware need to be enabled?
    Company Culture
    Tech-savy VS Tech-challenged
    Flexible working culture that allows home office work
  • Approaches To Consumerization
    Companyowned
    High
    BYOD
    Consumerization
    Security Risks
    High
    Low
    Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)

  • The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service.
    Magic Quadrant for PC Configuration Life Cycle Management Tools
    Gartner, January 2011
  • 4
    Conclusions and Final Remarks
  • Enterprise Mobility Initiatives
    Support more smartphones, tablets, and other devices
    Deploymobile applications
    Establishmobility policies
    Securedata from criminals, malware and other threats
    Offerthe sort of technology experience users have come to expect from consumer technologies

  • CIOs must get ahead of the curve by coming to
    terms with what is valuable about consumerization.
    Handled properly, it can
    increase productivity and even lower IT costs.
    Friendly Takeover: The Consumerization of Corporate IT
    Booz & Company, 2010
  • Thank You
    Raul Castanon-Martinez
    http://www.linkedin.com/in/rcastanon
    http://newchannelbuzz.com/
    http://twitter.com/newchannelbuzz

  • Companies that make
    the shift to consumer-oriented
    IT will see real benefits in the form of lower costs and happier, more productive employees.
    Companies that don’tface a future in which employees will do it stealthily, leading to technological chaos and security issues.
    Friendly Takeover: The Consumerization of Corporate IT
    Booz & Company, 2010