• Save
Endpoints  stki summit 2012-shahar geiger maor
Upcoming SlideShare
Loading in...5
×
 

Endpoints stki summit 2012-shahar geiger maor

on

  • 2,652 views

 

Statistics

Views

Total Views
2,652
Views on SlideShare
1,095
Embed Views
1,557

Actions

Likes
0
Downloads
0
Comments
0

26 Embeds 1,557

http://shaharmaor.blogspot.co.il 864
http://shaharmaor.blogspot.com 560
http://sigalrussin.blogspot.co.il 83
http://www.shaharmaor.blogspot.com 7
http://shaharmaor.blogspot.de 6
http://shaharmaor.blogspot.ca 6
http://translate.googleusercontent.com 4
http://shaharmaor.blogspot.in 4
http://shaharmaor.blogspot.co.uk 3
http://shaharmaor.blogspot.com.au 3
http://www.shaharmaor.blogspot.com.es 2
http://sigalrussin.blogspot.co.uk 1
http://sigalrussin.blogspot.com 1
http://sigalrussin.blogspot.co.at 1
http://sigalrussin.blogspot.hu 1
http://sigalrussin.blogspot.fr 1
http://sigalrussin.blogspot.ro 1
http://sigalrussin.blogspot.de 1
http://www.shaharmaor.blogspot.tw 1
http://shaharmaor.blogspot.be 1
http://shaharmaor.blogspot.hk 1
http://shaharmaor.blogspot.it 1
http://www.shaharmaor.blogspot.in 1
http://shaharmaor.blogspot.com.br 1
http://www.linkedin.com 1
http://sigalrussin.blogspot.ru 1
More...

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Endpoints  stki summit 2012-shahar geiger maor Endpoints stki summit 2012-shahar geiger maor Presentation Transcript

  • Endpoint Trends Tell me and I’ll forget STKI Summit 2012Show me and I may remember Shahar Geiger Maor,Involve me and I’ll understand VP & Senior Analyst
  • AgendaEndpoints Networking Security DC Cloud Post Voice MDM PC Video Cyber 2 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Presentation Visualization MDMNetworking Security ollaboration 3 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Endpointshttp://www.wired.com/wired/archive/14.07/images/found.jpg graphic Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of 4
  • Presentation Visualization MDMNetworking Security ollaboration 5 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Desktop-PCs are getting old…Say Hello to the Post-PC Era• No platform, form factor or technology will dominate.• BYOD will remain the norm.• Component prices continue downward trend.• Off-Desktop devices consume more of the digital experience• Employees will use many devices, syncing data between them via the cloud. 6 Source: Bent Objects Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 2012 game changers : • Consumerization of IT • Bring your own Device (BYOD) • Changing Client Architectures Tablet computers, smartphones, 4G, social media, gaming, desktop virtualization, and other technology innovations are bringing possibilities and challenges to IT and the workplace like never before 7Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Experience Economy > Age of the Customer• From 1900 to 1960, Age of Manufacturing , if you owned a factory, you owned the market.• From 1960 to 2000, Age of Distribution, if you owned the distribution channels, you owned the market.• From 2000 to 2011, Age of Information, if you owned the information, you owned the market.• From 2011, Age of the Customer, if you engage the customer, you own the market 8 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Why Mobile? Communication Telecom: fire, Mobile Phone Telephone –A basic need letters… Device• Population is spreading all • Starting to close the gap. • Large distances, real-time. • Always with me, cost over the world. Closer to the end-user effective, muti- purpose device, carrier-• Distance is becoming a • Short distances, no real- • Static side infrastructure, communication issue time Anywhere-to-anywhere connection and more… 9 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Mobile Outsourcing Social Trade Fun Tools Pics Gesture TouchCalendarMail Location Ⅱ Δ Voice Video Content Access Search 10 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Using Mobile Apps more then 10 times a day 11Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Using Mobile App to Make a Purchase/ for Client Service 12 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Decision Making in the Digital World Seeking Intelligence, Not Content - Real time60% of purchase decisions being made before theconsumer stepped into the store!!! 13 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Many clients are asking about how to: Set a solid Digital Customer Experience MDM craft mobile policies how to develop manage the devices mobile custom apps? Secure their select mobile devices mobile content 14Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Answers are right here Who is IT or Business? Digital Customer Experience IT higher involvement Owner in enterprisehow to developmobile custom apps? Native or Hybrid Apps select mobile devices People wants: Enterprises wants: 15 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • What Do People Want ? 16Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Three OSs, Three Ecosystems? Source: IDC 17Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Internet vs. Mobile Data Traffic Global Internet Traffic Growth (Fixed)300%200%100% 0% 1997 1998 1999 2000 2001 2002 Global Mobile Data Traffic Growth200%150%100%50% 0% 2009 2010 2011 2012 2013 2014 (estimate) Source: Cisco VNI 2012 18 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Mobile Statistics – The number of active mobile broadband subscriptions worldwide in 2011. –The estimated number of mobile subscriptions worldwide in 2011. –Percentage of handsets shipped globally in 2011 that included a web browser. – Apple iPad’s share of global tablet web traffic in December.Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ 19Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Different Devices, Different Purpose Work Creation Change Flow Consumption Experience 20Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • List of Tablet Use Cases How do you useplan to use your tablet? (Please select all that apply) Surfing the webWriting or reading mail Watching video listening to music social media sites Gaming 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Source: Yankee Group 21 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Bring Your Own Device Tablets occupy a middle ground where consumption and creation • Easier and more supportable of data has a wide range. • More flexible device capability BYOD needs to be a Virtualization consideration once interest enters this zone.BYOD Full Data Consumption and Creation ContinuumLight BYOC There are two potential paths that can be followed at this point. Integration • Full network- Light data consumption • Harder to support (e.g. local - Heavy data consumption- Minimal data creation rather than centralized apps) - Local data creation • Limited by device capabilities Final steps: - Full BYOD policy created by Past this line, infrastructure, all business groups. security, and operations - TCO calculation in pillars must be considered in conjunction with Finance. order to support advanced data creation. Source: Info-Tech Research Group 22 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • BYOD Recommendations1 Measure success against overall objectives of a multi-device strategy. Having a multi-device IT service access strategy should contribute to lowering costs while increasing service regardless of who owns the devices. Given that, how does BYOD further those objectives?2 Consider impact on overall objectives when deciding between passive or aggressive approach. Bring Your Own policies can range from passive (we allow connection from personally-owned devices) to aggressive (we encourage and even subsidize bring your devices).3 Communicate policy requirements and roles and responsibilities for system support. Failure to meet success measures can be a result of communication failures as much as a failure of technical and operational capability.4 Maintain company-owned device options for flexibility and end-user service. Info-Tech sees that even in the case of an aggressive BYODprogram, allowing use of a company-owned device can mitigate a number of the potential pitfalls of BYOD.5 Document your policy position and rationale for the business. In dealing with your internal business customers’ demand for service, there is only one question (with two corollaries) that matters. Can you deliver this service? If yes, how? If no, why? Source: Info-Tech Research Group 23 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • The Evolution of Trade Credit Lydian coinsMobile BarterPayment 24 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Mobile Payment That’s like almost Every Cow on the planet getting a smartphone 25Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 4 Types of Mobile Payment• The Mobile Wallet -Paying for things at a store with a mobile device using NFC or "tap and go“.• Every Smartphone is a cash register - Merchants using a mobile device to process credit cards payments.• The “Everything Else” mobile Payment -Consumers send money to merchants, or even each other (sometimes called p2p), using mobile devices (on-saleon-line).• ‘Put it on my bill’ -Consumers buying ringtones or games or digital content by putting the charges on their cellphone account. 26 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • What’s In a Mobile Wallet?Secure Element (SE), which holds:One or more payment, mass transit, Mobile Phoneand/or offer applications RF ModemEach application emulates aparticular “card” in the wallet SIM Chip BasebandNear Field Communications (NFC) Processor Secure Elementchip • Payment Applications NFCTwo-way communication with the Controller • Transit Applicationpoint of sale • Offer ApplicationCompatible with existing contactless Proximity Antennapayment standardsThree options for hosting the SE:On the SIM chip (shown here)Elsewhere in the handset Point of SaleOn a MicroSD card Source: GSMA Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • How Does It Work?– Encrypted credentials are supplied by the card issuing bank to a TSM Card Issuing– The TSM distributes the Bank Trusted credentials to the phone via Payment Service Network Manager the MNO (TSM)– Phones use NFC to present the credentials at the POS Mobile– Transaction proceeds as a Acquiring Bank Network Operator regular card payment (MNO) Point of Mobile Sale Phone Source: IDC Financial Insights 28 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Okay, So What’s the Catch?Lots of unresolved questions:– Who controls the secure element?– How much does it cost to rent space in the wallet?– Who gets to provide the offer application(s)?– What if the merchant doesn’t support contactless cards? 29 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • The Digital Customer Expectation People’s opinions matter more than providers opinions Economy and more than in the past Brand Butlers Personalization & attitudes to privacy, ownership, piracy, color & language. Shift from transaction to interaction AlwaysOn Working Practices & Attitudes: Blurring of work and leisure, conflict between new and old attitudes GameOn Many-to-Many Communication -turning the mundane into “fun” Intelligent Knowledge for many regions, languages, currencies & Infosystems attitudes visualized in different waysDynamic Pricing Money, but no time –45 seconds/4 clicks is too long to wait. 30 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • What Are The Expectations From a Mobilized World? 31 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Devices that end users prefer (new ?)Ultrabooks (NetNotebooks) will reach just over 15% of total consumer notebooks (IDC)1. Mainstream price must be very attractive2. Lower cost conventional notebooks slowing ultrabook adoption http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011 32 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Apple is Gaining Market Share in the Enterprise Source: Forrester 33 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 1/5 Of Global Info Workers Use Apple Products For Work http://blogs.forrester.com/frank_gillett 34 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • “The endpoint not taken” 35Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Israeli Smartphone Market-share in 2011 Motorola Alcatel HTC RIM 5% 4% 1% 5% SamsungSony Ericsson 27% 7% LG 8% Nokia Apple 20% 23% Source: IDC 36 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Israeli Smartphone Market-share in 2011 Operating System Market Share Android 39.39% iOS 36.62% BlackBerry OS 9.48% Symbian 9.00% Other 5.52% Source: IDC 37Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Israel (expected end 2012):Wintel: Q42011 compared to Q42010Desktop PCs: -25% Notebooks: -35% 38 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • What is the Current Endpoint-Devices Mix within your enterprise?under IT responsibility 1%8% more endpoints Tablets 7% Smartphones 13% Laptops Desktops 77% Source: STKI Feb. 2012 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  • What will be the Mix 12 Months from now? 6% Tablets 1.6% Notebooks Netbooks 20.5% Laptops Desktops 75% Source: STKI Sep. 2011Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  • Endpoint Contemplations1. DesktopsNotebooks are losing market share2. Desktops = price sensitive3. LaptopsTablets are gaining power4. A tablet (still) can’t replace a laptop5. “By 2015…?” No one really knows what’s going to happen… 41 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Market Data http://xkcd.com/688/ 42Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Israeli Endpoint Statistics1.08 • Number of endpoints per 1 employee 24 • Number of endpoints per 1 IT staff564 • Number of endpoints per 1 service desk staff748 • Number of endpoints per 1 PC staff (field technicians)3231 • Number of endpoints per 1 PC staff (image) 43 Source: STKIShahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Endpoint-Devices Mix (Abroad) Source: InformationWeek 44Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Who Will Be Using Tablets? (Israel) 3% Some of theall Employees 15% Mid-level directors 21% Pilot in one of the units 41% Specific functions (e.g. salesmarketing)44% CXOs Source: STKI, Sep. 2011 45 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Who Will Be Using Tablets? (Abroad) Source: Corporate Executive Board 46Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • End-Point Operating Costs Source: InformationWeek 47Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • End User Device Replacement Cycle Source: InformationWeek 48Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Desktop PCs- Israeli Market Positioning 1Q12 HP Lenovo Local Support Dell Player Ivory Worldwide Leader Acer Apple Market Presence 49Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Laptops- Israeli Market Positioning 1Q12 Lenovo Local Support Player Acer HP ASUS Dell Worldwide LG Leader Samsung Toshiba Fujitsu Apple Market Presence 50Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Tablets- Israeli Market Positioning 1Q12 Local Support Player Worldwide Leader Others… Apple Samsung Market Presence 51Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • Thank You! Scan Me to Your Contacts… 52Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic