Your SlideShare is downloading. ×
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Key Trends and Opportunities in Business Mobility and Enterprise Communications


Published on

Published in: Technology, Business

1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide
  • The smartphone revolution of the last three years has changed how mobile workers operate.
  • Consumers are adopting smartphones faster than just about tech product in history.Smartphones will exceed 420 million devices in 2011, nearly 28% of the global handset market.(IMS Research, than likely, these devices are already being brought into the workplace.New information technology is emerging first in the consumer market and then spreading into business organizations
  • A recent IDC survey found that 95% of respondents have used technology they purchased themselves for work. (“Consumerization of IT: 95% of Information Workers Use Self-Purchased Technology for Work” to Aberdeen data (from late 2010 and 2011 surveys), almost 75% of companies allow employee-owned smartphones and/or tablets to be used at work. 25% give employees a whitelist of allowed devices and almost half let employees bring in and use any device.(“75% of Enterprises Have 'Bring Your Own Device' Policies. What That Means”, via Simply Security Report: ‘BYOD’ is changing workplaces report from Strategy Analytics shows that 61% of U.S. corporation have found that their employees are already using tablets for work purposes(“Ready or not, iPad, other tablets are in the enterprise”,
  • It is clear that there is a disconnect between employees and employers about how consumer technologies are used in the enterprise.95% of employees use self-purchased technologies for work, 70% employers want to buy standardized technologies for them.
  • A consumer-oriented IT focus is more than just aiming to please the end user but rather, leveraging new technologies to improve employee productivity and reduce IT costs. Mobile professionals spend time away from their desk and require tools that will let them do their job: field sales, field service, production, consultants, managers. The question is how can IT create the right environment for them?Increased IT costs - One of the reasons IT might be unwilling to allow personal devices are the added support and maintenance costs due to increased complexity caused by more heterogeneous computing environments. In addition, there is the possibility to go overboard and try to compete with consumer products through the development of “consumer-oriented” services and applications.
  • End users and technology are pulling the organization one way and security needs, compliance are pulling the other way.
  • SecuritySensitive data – depends on the industry, for example retail, health care, finance may demand privacy and a higher level of security requirements than other industriesIndustry compliance – a complex legal and compliance environment require a higher level of security
  • Possible scenarios:Traditional approach (seal off corporate IT) = Low IT Security Risks, Low User Freedom / Consumerization, essentially banning the use of consumer-oriented IT and personal devices at work.Open environment = High IT Security Risks, High User Freedom / ConsumerizationThe opposite scenario would be opening the organization with a computing environment that is easily accessed and user-determined.Take no action = Ignore IT consumerization altogether. This has the potential to shift to High IT Security Risks as the end user will tend to move towards “BYOD” and eventually to “self configuration”Ideally, the organization should move toward high consumerization / low security risks, either through company owned or BYOD, providing high mobility to employees that can benefit from itAdditional scenarios:BYOD + corporate apps, BYOD + corporate desktop = Low IT Security Risks, High User Freedom
  • MagicQuadrant reference interviews revealed that consumerization is the No. 2 challenge they faced in2010; consumerizationwasn't in the top five last year. The advent of the iPad is the catalyzing factor, surveysshow that somewhere between 50% and 75% of desktop groups have received requests foriPad support.The iPad in the enterprise phenomenon has also driven users to request support for new handheld devices, such as the iPhone or the Android phone, leading enterprises to support a greater variety of devices. The primary mobile device management (MDM) concern is dataprotection. IT organizations want to ensure that user data is secure if the device is lost or stolen.Organizations are starting to treat smartphones (and now tablets) the same way they treat PCs.Systems Infrastructure SoftwareChange and Configuration Management Software (CCM)Secure Content and Threat Management (SCTM)Security and Vulnerability Management Software (SVM)Problem Management Software (PM)Application and User Session Virtualization (AV)Security Products and ServicesSecurity information and event management (SIEM)Proactive endpoint risk management (PERM )Forensics and incident investigation (FII)Policy and complianceSecurity systems and configuration management (SSCM)Device vulnerability assessment (VA), Application vulnerability assessment (VA )
  • The smartphone revolution of the last three years has changed how mobile workers operate.
  • The Evolution of Enterprise Mobility, Pyxis Mobile 2011Enterprises are leveraging mobility to improve operations and how they interact with customers, employees and suppliers
  • Transcript

    • 1. Key Trends and Opportunities in Business Mobility and Enterprise Communications
    • 2. 1
      Key Trends in 2011
      Rise of Handheld Computers
      BYOD “Bring Your Own Device”
      The Consumerization of Enterprise IT
      Key Challenges for IT
      Meeting User Expectations
      Increased Support and Maintenance Costs
      New Security and Compliance Risks
      The Options for IT
      Factors to Consider
      Approaches To Consumerization
      Enterprise Mobilization Strategy
      Conclusions and Final Remarks
    • 3. 1
      Key Trends in 2011
    • 4.
    • 5. Three Key Trends In 2011
      Smartphones and tablets are the new PC
      Consumers are adopting smartphones faster than just about any other tech product in history.
      Bring Your Own Device is changing how we work
      Employees now expect to be able to use the smartphones and tablets they bought for personal use.
      Consumer Technology is influencing the enterprise
      Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.
    • 6. 75%
      US corporations where employees use tablets for work purposes.
      Strategy Analytics
      via PCWorld
      April 2011
      Information Workers Using Self-purchased Technology For Work
      IDC survey of IT Consumerization Trends
      March 2011
      Enterprises with 'Bring Your Own Device' policies
      Aberdeen data
      via ZDNet
      March 2011
    • 7.
      Employers don’t know
      how many or what consumer technologies are in use.
      Workers report using consumer devices attwice the rateemployers reported.
      Survey of IT Consumerization Trends
      IDC, March 2011
    • 8. 2
      Key Challenges for IT
    • 9. Key Challenges For IT
      Shift to a more consumer-oriented IT focus
      IT needs to bridge the growing gap between employee and IT interests.
      Consumerization can increase IT costs dramatically.
      An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly.
      New security and compliance risks
      Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.
    • 10.
      IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.
    • 11. 3
      The Options for IT
    • 12. Factors To Consider
      Security Requirements
      Does the company work with sensitive data?
      Is the company risk-averse?
      Industry compliance and regulation
      Desktop Computer VS Mobile Devices
      Can mobile applications help the company ’s employees, customers, and value and supply chain partners?
      What functionalities does each user group need mobilized?
      What device types, capabilities and hardware need to be enabled?
      Company Culture
      Tech-savy VS Tech-challenged
      Flexible working culture that allows home office work
    • 13. Approaches To Consumerization
      Security Risks
      Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)
    • 14.
      The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service.
      Magic Quadrant for PC Configuration Life Cycle Management Tools
      Gartner, January 2011
    • 15. 4
      Conclusions and Final Remarks
    • 16. Enterprise Mobility Initiatives
      Support more smartphones, tablets, and other devices
      Deploymobile applications
      Establishmobility policies
      Securedata from criminals, malware and other threats
      Offerthe sort of technology experience users have come to expect from consumer technologies
    • 17.
      CIOs must get ahead of the curve by coming to
      terms with what is valuable about consumerization.
      Handled properly, it can
      increase productivity and even lower IT costs.
      Friendly Takeover: The Consumerization of Corporate IT
      Booz & Company, 2010
    • 18. Thank You
      Raul Castanon-Martinez
    • 19.
      Companies that make
      the shift to consumer-oriented
      IT will see real benefits in the form of lower costs and happier, more productive employees.
      Companies that don’tface a future in which employees will do it stealthily, leading to technological chaos and security issues.
      Friendly Takeover: The Consumerization of Corporate IT
      Booz & Company, 2010