SlideShare a Scribd company logo
1 of 31
Emerging Strategies forEmerging Strategies for
Managing MobilityManaging Mobility
September 24, 2013September 24, 2013
2
SpeakersSpeakers
Bryan Salek, End User Computing Systems Engineering
Specialist, VMware
James McLeod-Warrick, Managing Partner,
Beacon Technology Partners
3
 Web survey
• 107 usable responses (confidence interval +/- 9.3%)
• Fieldwork dates: August 5th
to August 20th
, 2013
• Research team: Beacon Technology Partners (www.beacontech.com)
 Respondent Characteristics
• Respondents screened for:
– Involvement in developing or implementing mobile strategy
– Balance across Federal DOD, civilian and state/local government agencies
• Job responsibilities
– Technical decision-makers – 79%
– Business decision-makers – 21%
• Agency decision-making approach
– Centralized (87%) vs. decentralized (13%)
– Progressive (58%) vs. conservative (42%)
MethodologyMethodology
4
Infrastructure consolidation, user accessibility andInfrastructure consolidation, user accessibility and
simplified IT management are key IT aimssimplified IT management are key IT aims
1. How important are each of the following IT objectives for your department or agency?
Federal agencies place greater
importance on teleworking
support than state and local
Importance of IT objectives
Average =
100
How to Read this Chart: The chart shows the relative importance placed on each IT objective – indexed to 100 (average). The
purpose is to show which attribute has more relative importance.
State & Local
Federal Defense
Federal Civilian
5
Simplified management of user desktop applications andSimplified management of user desktop applications and
data is a deeply desired goaldata is a deeply desired goal
14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at
your department or agency?
We strive to modernize the desktop to make it more cost effective to manage
Base = Total
Respondents
6
Wide agreement on the desire for automatedWide agreement on the desire for automated
provisioning and deprovisioning of mobile devicesprovisioning and deprovisioning of mobile devices
14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at
your department or agency?
Easy, centralized provisioning or deprovisioning of devices for workers/citizens is
important
Base = Total
Respondents
DOD agencies place
greater importance on
this than others
7
Growing public sector workforce expectations for accessibility to desktopGrowing public sector workforce expectations for accessibility to desktop
and enterprise applications and data fromand enterprise applications and data from anyany end point deviceend point device
2a. Currently, which of the following applications or resources are your agency employees able to access via their mobile
devices when out of the office?
2b. In two years, which of the following applications or resources will your agency employees able to access via their mobile
devices when out of the office?
Resource accessibility via mobile devices
Indicates significant difference at
95% confidence interval
Base = Total
Respondents
Federal agencies more
apt to allow accessibility
to nearly all apps on
employee desktops
via mobile devices
8
3. Which of the following best describes the official policy of your department or agency regarding employee use of mobile
devices when out of the office as part of their job responsibilities?
Although most agencies continue to issue mobile devices toAlthough most agencies continue to issue mobile devices to
employees that require them, BYOD continues to make inroadsemployees that require them, BYOD continues to make inroads
Official policy regarding mobile device use
Base = Total
Respondents
9
5b. Do your agency employees occasionally still use their own personal devices to access work e-mail and other work-related
applications, regardless of departmental policies prohibiting such access?
6. Are agency employees permitted to use agency-issued mobile devices for personal data and applications, such as e-mail?
Blurring boundaries between work and home/personalBlurring boundaries between work and home/personal
use of mobile devices is ongoinguse of mobile devices is ongoing
Base = Total
Respondents
Use of personal mobile device(s) for
work purpose
Use agency-issued mobile device(s) for
personal purpose
10
The proportion of those in the public sector who are issued mobileThe proportion of those in the public sector who are issued mobile
devices by their agencies continues to risedevices by their agencies continues to rise
4. Please estimate what proportion of your department’s or agency’s employees receives an agency-issued smartphone,
tablet, or other mobile device as part of their job responsibilities.
Mean Scores
Growth of 13%
Base = Those with
agency-issued
mobile devices
Proportion of employees with agency-issued mobile devices
DOD agencies issue
mobile devices to their
employees more than
other agencies now and
in the next two years
11
Little growth is expected for BYOD in the near futureLittle growth is expected for BYOD in the near future
7. Please estimate what proportion of your department’s or agency’s employees use their own mobile device as part of
their job responsibilities?
Mean Scores
Growth of 3%
Proportion of employees using personal mobile devices (BYOD)
Base = Those with
agency-issued
mobile devices
12
5. Does your agency or department have a policy that expressly prohibits agency employees from using their own mobile
devices for agency work-related activities?
5a. How critical are the following policies and procedures which, if implemented, would allow your agency employees to
“bring” or use their own mobile devices for work-related tasks?
More robust user authentication and auto-lock procedures, and directMore robust user authentication and auto-lock procedures, and direct
IT access to user devices, are critical to enabling more BYOD growthIT access to user devices, are critical to enabling more BYOD growth
Criticality level of procedures to allow BYOD
Base = Those
prohibited to use
mobile device
46%46%
prohibitprohibit
use of personaluse of personal
mobile device formobile device for
work activitieswork activities
Critical / VitalCritical / Vital
SummarySummary
Civilian agencies place
greater importance on
separation of personal
and work environments
and IT permission to
wipe agency apps/data
from personal devices
13
Broad interest in enabling more employee mobility andBroad interest in enabling more employee mobility and
greater accessibilitygreater accessibility
14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at
your department or agency?
Agree Neutral
Base = Total
Respondents
Disagree
14
Base = Total
Respondents
8. How concerned is your department or agency with each of the following mobile security issues?
Government IT executives manage myriad mobile security threatsGovernment IT executives manage myriad mobile security threats
Very concerned Somewhat concerned
Level of concern about mobile security issues
DOD has greater
concern regarding
compliance risks for
mobile data access
15
Broad agreement on securing access to and disallowingBroad agreement on securing access to and disallowing
storage of sensitive data via mobile devicesstorage of sensitive data via mobile devices
14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at
your department or agency?
Agree Neutral
Data security
Base = Total
Respondents
Disagree
16
Government decision-makers agree - there must be aGovernment decision-makers agree - there must be a
balanced focus between securing agency IT infrastructurebalanced focus between securing agency IT infrastructure
as well as on users’ mobile devicesas well as on users’ mobile devices
9a. Currently, does your department or agency focus more on securing the data and infrastructure that mobile devices
would access, or on securing the mobile devices themselves?
9b. In your view, should your department or agency focus more on securing the data and infrastructure that mobile
devices would access, or focus more on securing the mobile devices themselves?
Focus on security
What this chart shows:What this chart shows:
This chart shows the focus that departments currently place on mobile devices vs. the focus on security of agency data and
infrastructure, and what the ideal focus should be. In the chart, departments currently put more focus on securing data and
infrastructure, but also feel that, ideally, slightly more importance should be placed on mobile device security than is the case now.
What this chart shows:What this chart shows:
This chart shows the focus that departments currently place on mobile devices vs. the focus on security of agency data and
infrastructure, and what the ideal focus should be. In the chart, departments currently put more focus on securing data and
infrastructure, but also feel that, ideally, slightly more importance should be placed on mobile device security than is the case now.
More focus on
mobile device
security
More focus on
security of data and
infrastructure
Equal focus
Current
department
focus
Ideal
department
focus
BDMs “ideally” and State & Local
“currently” place far greater focus
on data and infrastructure security
17
It is well known that public sector employees will do what it takes,It is well known that public sector employees will do what it takes,
including circumventing onerous security procedures, to do their jobsincluding circumventing onerous security procedures, to do their jobs
14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at
your department or agency?
Agree Neutral
Mobile device access and security
Base = Total
Respondents
Disagree
18
Base = Total
Respondents
Fully Implemented
Deploying
Investigating
No Interest
VDI adoption status
Although fewer than one agency in five has adopted VDI technologies,Although fewer than one agency in five has adopted VDI technologies,
interest is growinginterest is growing
10. Which of the following best describes your department or agency use of virtual desktop infrastructure (VDI)
solutions?
 Federal agencies
more apt to have
already implemented
 State & Local more
apt to be investigating
 DOD are more in the
deployment phase
than others
19
Lack of familiarity, funding, and legacy applicationLack of familiarity, funding, and legacy application
support are the widely cited reasons for not adopting VDIsupport are the widely cited reasons for not adopting VDI
10a. Which of the following describes the reasons why your department or agency is not interested in a VDI solution?
Why VDI is not of interest
Base = Those not
interested in VDI
20
VDI drivers – flexibility, compliance with securityVDI drivers – flexibility, compliance with security
manages, and user productivitymanages, and user productivity
12. How important are each of the following benefits of VDI to your department of agency?
Importance of VDI benefits
Base = Those
investigating or
adopted VDI
 Civilian agencies
place greater
importance on lower
total cost of ownership
 Federal agencies
please greater
importance on support
Very ImportantVery Important
SummarySummary
What this shows:
This depicts the level of influence of
attributes that are most strongly
associated with driving VDI adoption.
Coefficients are obtained from best-fit
linear discriminant models built to
determine VDI benefits.
21
But many are concerned about proving the worth of VDI-inducedBut many are concerned about proving the worth of VDI-induced
productivity gains as well as management complexityproductivity gains as well as management complexity
13. How concerned is your department or agency with each of the following obstacles or challenges related to VDI?
VDI Concerns
Base = Those
investigating or
adopted VDI
 Civilian agencies
have greater concern
for in-house skills to
deploy/manage VDI
 Federal agencies
place more concern on
performance
Very ConcernedVery Concerned
SummarySummary
What this shows:
This depicts the level of influence of
attributes that are most strongly
associated with driving VDI adoption.
Coefficients are obtained from best-fit
linear discriminant models built to
determine VDI concerns.
22
In two years more than half of agency employees are expected to beIn two years more than half of agency employees are expected to be
using VDI to access their desktop applications and data via endusing VDI to access their desktop applications and data via end
point devicespoint devices
11. Please estimate how many of your department or agency employees use VDI to support their use of end point
devices, including mobile devices?
Mean Scores
Growth of 19%
Base = Those
investigating or
adopted VDI
Proportion employees using VDI
Federal agencies further
along with VDI use than State
& Local currently and in the
next few years
23
ObservationsObservations
 Chief public sector IT objectives – simplified management and
consolidated infrastructure, alongside greater user accessibility of IT
assets
 Most wish to make managing user desktops and mobile devices easier
 Users are increasingly apt to demand “anytime, anywhere” access to their desktop and
enterprise applications
 Although BYOD continues to grow, most agencies still prefer to control
dispensation of mobile devices because of security and DLP concerns
 Blurred boundaries between work and home/person use of end point devices
 Device-centric security strategies such as user authentication, VPN accessibility, and
direct IT access to user devices would ease concerns and potentially permit more BYOD
adoption
 Agency decision makers want more balance in their IT security strategies toward greater
protection of agency infrastructure and away from focusing primarily on user devices
 Adoption of and interest in virtual desktop infrastructure (VDI) grows
 Chief VDI benefits – more flexibility and agility, extra security, better user experience
 But hurdles remain, such as fear of management complexity, lack of demonstrable ROI,
unproven compliance
© 2012 VMware Inc. All rights reserved
Confidential
Mobility Solutions for Government Agencies
Bryan Salek
EUC Systems Engineer
25 Confidential
New Device Platforms New Apps New User Expectations
Key market trends are driving change
New Device
Platforms
 Multiple Devices and Platforms
New User
Expectations
 Mobile and Remote Access
New
Apps
 SaaS and Mobile Applications
New Apps New User ExpectationsNew Device Platforms
26 Confidential
You are under pressure to make sense of the new
Personal DevicesCorporate Devices
Diverse Apps
Diverse
Platform
Data
Everywhere
Diverse
Devices
Mobile
27 Confidential
Common responses only mask problem
Buy a Point Solution
Does not scale, increases cost
Creates a management mess
Lock It Down
Unhappy workforce
IT is viewed the “bad guy”
Ignore It
Poor IT Control
Security and compliance risk
28 Confidential
Transform
Assets Into Central Services
Broker
Services Centrally by Policy
Deliver
Multi-device Access
What you need is a new approach
29 Confidential
Transform: Simplify
desktops, diverse apps
and data into
centralized services
Deliver: Empower your
workforce with flexible
access across devices,
locations and connectivity
VMware Horizon Delivers the Virtual Workspace
Broker: Manage & Secure
centrally and broker services
to your workforce by policy
30 Confidential
The Horizon Suite: Accelerates Your User-Centric Era Journey
VMware Horizon SuiteVMware Horizon Suite
Horizon WorkspaceHorizon WorkspaceHorizon MirageHorizon Mirage Horizon ViewHorizon View
Physical
Desktops/Laptops
Virtual
Desktops
Mobile,
Multi-Device Workspace
NEW
v5.2
NEW
v5.2
NEW
V4.2
NEW
V4.2 NEW
V1.5
NEW
V1.5
31
For more information:
Visit: www.vmware.com/go/GovernmentMobility
Resource Download – white paper
“Emerging Strategies for Managing Mobility”
Contact: Bryan Salek
bsalek@vmware.com
Research Sponsored
By:

More Related Content

What's hot

SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)SolarWinds
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public SectorSolarWinds
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSolarWinds
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
New IT Survey: Australia
New IT Survey: AustraliaNew IT Survey: Australia
New IT Survey: AustraliaSolarWinds
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sectorSolarWinds
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudySoftchoice Corporation
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSIJMIT JOURNAL
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articlesIJMIT JOURNAL
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take offTom Mellish
 

What's hot (20)

SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and Intelligence
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
New IT Survey: Australia
New IT Survey: AustraliaNew IT Survey: Australia
New IT Survey: Australia
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sector
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Bridge the Gap Between IT and Staff
Bridge the Gap Between IT and StaffBridge the Gap Between IT and Staff
Bridge the Gap Between IT and Staff
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off
 

Viewers also liked

Vyom Labs Bmc Remedy Bsm Itil Service For Linkedin
Vyom Labs Bmc Remedy Bsm Itil Service  For LinkedinVyom Labs Bmc Remedy Bsm Itil Service  For Linkedin
Vyom Labs Bmc Remedy Bsm Itil Service For LinkedinVyom Labs
 
Own Your Career - an ITSM Academy Webinar
Own Your Career - an ITSM Academy WebinarOwn Your Career - an ITSM Academy Webinar
Own Your Career - an ITSM Academy WebinarITSM Academy, Inc.
 
Adopt Adapt and Apply IT Best Practices - David Ratcliffe
Adopt Adapt and Apply IT Best Practices - David RatcliffeAdopt Adapt and Apply IT Best Practices - David Ratcliffe
Adopt Adapt and Apply IT Best Practices - David RatcliffePink Elephant
 
BMC Case Study: How to Take a Content-First Approach and Measure the Success ...
BMC Case Study: How to Take a Content-First Approach and Measure the Success ...BMC Case Study: How to Take a Content-First Approach and Measure the Success ...
BMC Case Study: How to Take a Content-First Approach and Measure the Success ...ISITE Design is now Connective DX
 
Creating your virtual data center - Toronto
Creating your virtual data center - TorontoCreating your virtual data center - Toronto
Creating your virtual data center - TorontoAmazon Web Services
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 RecapKevin Groat
 
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDMFundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDMSandeep Bhatia
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8Karthik Arumugham
 
ADD: New itil implementation approach
ADD: New itil implementation approachADD: New itil implementation approach
ADD: New itil implementation approachMohamed Zohair
 
V3 Continual Service Improvement - ITSM Academy Webinar
V3 Continual Service Improvement - ITSM Academy WebinarV3 Continual Service Improvement - ITSM Academy Webinar
V3 Continual Service Improvement - ITSM Academy WebinarITSM Academy, Inc.
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08gueste9924aa
 
The Service Catalog: Cornerstone of Service Management
The Service Catalog: Cornerstone of Service Management The Service Catalog: Cornerstone of Service Management
The Service Catalog: Cornerstone of Service Management BMC Software
 
Cut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy Webinar
Cut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy WebinarCut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy Webinar
Cut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy WebinarITSM Academy, Inc.
 
How to-build-a-service-catalog
How to-build-a-service-catalogHow to-build-a-service-catalog
How to-build-a-service-catalogspeak2kd11
 
ITIL Foundation Training - A guide to beginners
ITIL Foundation Training - A guide to beginners ITIL Foundation Training - A guide to beginners
ITIL Foundation Training - A guide to beginners Celtem Learning
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGoutama Bachtiar
 
Guide to the ITIL v3 Framework
Guide to the ITIL v3 FrameworkGuide to the ITIL v3 Framework
Guide to the ITIL v3 FrameworkCherwell Software
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 

Viewers also liked (20)

Vyom Labs Bmc Remedy Bsm Itil Service For Linkedin
Vyom Labs Bmc Remedy Bsm Itil Service  For LinkedinVyom Labs Bmc Remedy Bsm Itil Service  For Linkedin
Vyom Labs Bmc Remedy Bsm Itil Service For Linkedin
 
Own Your Career - an ITSM Academy Webinar
Own Your Career - an ITSM Academy WebinarOwn Your Career - an ITSM Academy Webinar
Own Your Career - an ITSM Academy Webinar
 
Adopt Adapt and Apply IT Best Practices - David Ratcliffe
Adopt Adapt and Apply IT Best Practices - David RatcliffeAdopt Adapt and Apply IT Best Practices - David Ratcliffe
Adopt Adapt and Apply IT Best Practices - David Ratcliffe
 
It smf pack v1 0
It smf pack v1 0It smf pack v1 0
It smf pack v1 0
 
BMC Case Study: How to Take a Content-First Approach and Measure the Success ...
BMC Case Study: How to Take a Content-First Approach and Measure the Success ...BMC Case Study: How to Take a Content-First Approach and Measure the Success ...
BMC Case Study: How to Take a Content-First Approach and Measure the Success ...
 
Creating your virtual data center - Toronto
Creating your virtual data center - TorontoCreating your virtual data center - Toronto
Creating your virtual data center - Toronto
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 Recap
 
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDMFundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
 
ADD: New itil implementation approach
ADD: New itil implementation approachADD: New itil implementation approach
ADD: New itil implementation approach
 
VCE VBLOCK SYSTEMS
VCE VBLOCK SYSTEMSVCE VBLOCK SYSTEMS
VCE VBLOCK SYSTEMS
 
V3 Continual Service Improvement - ITSM Academy Webinar
V3 Continual Service Improvement - ITSM Academy WebinarV3 Continual Service Improvement - ITSM Academy Webinar
V3 Continual Service Improvement - ITSM Academy Webinar
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08
 
The Service Catalog: Cornerstone of Service Management
The Service Catalog: Cornerstone of Service Management The Service Catalog: Cornerstone of Service Management
The Service Catalog: Cornerstone of Service Management
 
Cut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy Webinar
Cut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy WebinarCut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy Webinar
Cut the ITIL Anchor, Raise the ITIL Sail, an ITSM Academy Webinar
 
How to-build-a-service-catalog
How to-build-a-service-catalogHow to-build-a-service-catalog
How to-build-a-service-catalog
 
ITIL Foundation Training - A guide to beginners
ITIL Foundation Training - A guide to beginners ITIL Foundation Training - A guide to beginners
ITIL Foundation Training - A guide to beginners
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
Guide to the ITIL v3 Framework
Guide to the ITIL v3 FrameworkGuide to the ITIL v3 Framework
Guide to the ITIL v3 Framework
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 

Similar to VMware Emerging Strategies for Managing Mobility

Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
There's an App for That, and That, and That: Managing Mobile in the Workforce
There's an App for That, and That, and That: Managing Mobile in the WorkforceThere's an App for That, and That, and That: Managing Mobile in the Workforce
There's an App for That, and That, and That: Managing Mobile in the WorkforceHuman Capital Media
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware
 
Mobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public SectorMobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public SectorVMware
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessKloudData Inc
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...
Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...
Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...Energy Digital Summit
 
Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)Ian Gertler
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechUBM (Technology)
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationAVI-SPL
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?VMware
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesJan Vermeesch
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 

Similar to VMware Emerging Strategies for Managing Mobility (20)

Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
There's an App for That, and That, and That: Managing Mobile in the Workforce
There's an App for That, and That, and That: Managing Mobile in the WorkforceThere's an App for That, and That, and That: Managing Mobile in the Workforce
There's an App for That, and That, and That: Managing Mobile in the Workforce
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
 
Mobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public SectorMobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public Sector
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...
Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...
Wearables and Technology: A Mobile Panel Moderated by Deven Nongbri - Energy ...
 
Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companies
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 

More from VMware

vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9VMware
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware
 
What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3VMware
 
How Secure Is Your Business?
How Secure Is Your Business?How Secure Is Your Business?
How Secure Is Your Business?VMware
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3VMware
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMware
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudVMware
 
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent OperationsvRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent OperationsVMware
 
Running and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierRunning and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierVMware
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data CenterVMware
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationVMware
 
Infographic: Supercharge your Networking Career
Infographic: Supercharge your Networking CareerInfographic: Supercharge your Networking Career
Infographic: Supercharge your Networking CareerVMware
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)VMware
 
4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation4 Ways IT Can Drive Innovation
4 Ways IT Can Drive InnovationVMware
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceVMware
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderVMware
 
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...VMware
 
Virtualization Journey
Virtualization JourneyVirtualization Journey
Virtualization JourneyVMware
 

More from VMware (20)

vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3
 
How Secure Is Your Business?
How Secure Is Your Business?How Secure Is Your Business?
How Secure Is Your Business?
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent OperationsvRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
 
Running and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierRunning and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got Easier
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
Infographic: Supercharge your Networking Career
Infographic: Supercharge your Networking CareerInfographic: Supercharge your Networking Career
Infographic: Supercharge your Networking Career
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service Provider
 
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
 
Virtualization Journey
Virtualization JourneyVirtualization Journey
Virtualization Journey
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

VMware Emerging Strategies for Managing Mobility

  • 1. Emerging Strategies forEmerging Strategies for Managing MobilityManaging Mobility September 24, 2013September 24, 2013
  • 2. 2 SpeakersSpeakers Bryan Salek, End User Computing Systems Engineering Specialist, VMware James McLeod-Warrick, Managing Partner, Beacon Technology Partners
  • 3. 3  Web survey • 107 usable responses (confidence interval +/- 9.3%) • Fieldwork dates: August 5th to August 20th , 2013 • Research team: Beacon Technology Partners (www.beacontech.com)  Respondent Characteristics • Respondents screened for: – Involvement in developing or implementing mobile strategy – Balance across Federal DOD, civilian and state/local government agencies • Job responsibilities – Technical decision-makers – 79% – Business decision-makers – 21% • Agency decision-making approach – Centralized (87%) vs. decentralized (13%) – Progressive (58%) vs. conservative (42%) MethodologyMethodology
  • 4. 4 Infrastructure consolidation, user accessibility andInfrastructure consolidation, user accessibility and simplified IT management are key IT aimssimplified IT management are key IT aims 1. How important are each of the following IT objectives for your department or agency? Federal agencies place greater importance on teleworking support than state and local Importance of IT objectives Average = 100 How to Read this Chart: The chart shows the relative importance placed on each IT objective – indexed to 100 (average). The purpose is to show which attribute has more relative importance. State & Local Federal Defense Federal Civilian
  • 5. 5 Simplified management of user desktop applications andSimplified management of user desktop applications and data is a deeply desired goaldata is a deeply desired goal 14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at your department or agency? We strive to modernize the desktop to make it more cost effective to manage Base = Total Respondents
  • 6. 6 Wide agreement on the desire for automatedWide agreement on the desire for automated provisioning and deprovisioning of mobile devicesprovisioning and deprovisioning of mobile devices 14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at your department or agency? Easy, centralized provisioning or deprovisioning of devices for workers/citizens is important Base = Total Respondents DOD agencies place greater importance on this than others
  • 7. 7 Growing public sector workforce expectations for accessibility to desktopGrowing public sector workforce expectations for accessibility to desktop and enterprise applications and data fromand enterprise applications and data from anyany end point deviceend point device 2a. Currently, which of the following applications or resources are your agency employees able to access via their mobile devices when out of the office? 2b. In two years, which of the following applications or resources will your agency employees able to access via their mobile devices when out of the office? Resource accessibility via mobile devices Indicates significant difference at 95% confidence interval Base = Total Respondents Federal agencies more apt to allow accessibility to nearly all apps on employee desktops via mobile devices
  • 8. 8 3. Which of the following best describes the official policy of your department or agency regarding employee use of mobile devices when out of the office as part of their job responsibilities? Although most agencies continue to issue mobile devices toAlthough most agencies continue to issue mobile devices to employees that require them, BYOD continues to make inroadsemployees that require them, BYOD continues to make inroads Official policy regarding mobile device use Base = Total Respondents
  • 9. 9 5b. Do your agency employees occasionally still use their own personal devices to access work e-mail and other work-related applications, regardless of departmental policies prohibiting such access? 6. Are agency employees permitted to use agency-issued mobile devices for personal data and applications, such as e-mail? Blurring boundaries between work and home/personalBlurring boundaries between work and home/personal use of mobile devices is ongoinguse of mobile devices is ongoing Base = Total Respondents Use of personal mobile device(s) for work purpose Use agency-issued mobile device(s) for personal purpose
  • 10. 10 The proportion of those in the public sector who are issued mobileThe proportion of those in the public sector who are issued mobile devices by their agencies continues to risedevices by their agencies continues to rise 4. Please estimate what proportion of your department’s or agency’s employees receives an agency-issued smartphone, tablet, or other mobile device as part of their job responsibilities. Mean Scores Growth of 13% Base = Those with agency-issued mobile devices Proportion of employees with agency-issued mobile devices DOD agencies issue mobile devices to their employees more than other agencies now and in the next two years
  • 11. 11 Little growth is expected for BYOD in the near futureLittle growth is expected for BYOD in the near future 7. Please estimate what proportion of your department’s or agency’s employees use their own mobile device as part of their job responsibilities? Mean Scores Growth of 3% Proportion of employees using personal mobile devices (BYOD) Base = Those with agency-issued mobile devices
  • 12. 12 5. Does your agency or department have a policy that expressly prohibits agency employees from using their own mobile devices for agency work-related activities? 5a. How critical are the following policies and procedures which, if implemented, would allow your agency employees to “bring” or use their own mobile devices for work-related tasks? More robust user authentication and auto-lock procedures, and directMore robust user authentication and auto-lock procedures, and direct IT access to user devices, are critical to enabling more BYOD growthIT access to user devices, are critical to enabling more BYOD growth Criticality level of procedures to allow BYOD Base = Those prohibited to use mobile device 46%46% prohibitprohibit use of personaluse of personal mobile device formobile device for work activitieswork activities Critical / VitalCritical / Vital SummarySummary Civilian agencies place greater importance on separation of personal and work environments and IT permission to wipe agency apps/data from personal devices
  • 13. 13 Broad interest in enabling more employee mobility andBroad interest in enabling more employee mobility and greater accessibilitygreater accessibility 14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at your department or agency? Agree Neutral Base = Total Respondents Disagree
  • 14. 14 Base = Total Respondents 8. How concerned is your department or agency with each of the following mobile security issues? Government IT executives manage myriad mobile security threatsGovernment IT executives manage myriad mobile security threats Very concerned Somewhat concerned Level of concern about mobile security issues DOD has greater concern regarding compliance risks for mobile data access
  • 15. 15 Broad agreement on securing access to and disallowingBroad agreement on securing access to and disallowing storage of sensitive data via mobile devicesstorage of sensitive data via mobile devices 14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at your department or agency? Agree Neutral Data security Base = Total Respondents Disagree
  • 16. 16 Government decision-makers agree - there must be aGovernment decision-makers agree - there must be a balanced focus between securing agency IT infrastructurebalanced focus between securing agency IT infrastructure as well as on users’ mobile devicesas well as on users’ mobile devices 9a. Currently, does your department or agency focus more on securing the data and infrastructure that mobile devices would access, or on securing the mobile devices themselves? 9b. In your view, should your department or agency focus more on securing the data and infrastructure that mobile devices would access, or focus more on securing the mobile devices themselves? Focus on security What this chart shows:What this chart shows: This chart shows the focus that departments currently place on mobile devices vs. the focus on security of agency data and infrastructure, and what the ideal focus should be. In the chart, departments currently put more focus on securing data and infrastructure, but also feel that, ideally, slightly more importance should be placed on mobile device security than is the case now. What this chart shows:What this chart shows: This chart shows the focus that departments currently place on mobile devices vs. the focus on security of agency data and infrastructure, and what the ideal focus should be. In the chart, departments currently put more focus on securing data and infrastructure, but also feel that, ideally, slightly more importance should be placed on mobile device security than is the case now. More focus on mobile device security More focus on security of data and infrastructure Equal focus Current department focus Ideal department focus BDMs “ideally” and State & Local “currently” place far greater focus on data and infrastructure security
  • 17. 17 It is well known that public sector employees will do what it takes,It is well known that public sector employees will do what it takes, including circumventing onerous security procedures, to do their jobsincluding circumventing onerous security procedures, to do their jobs 14. Please tell us whether you agree or disagree with each of the following statements with regard to mobile strategies at your department or agency? Agree Neutral Mobile device access and security Base = Total Respondents Disagree
  • 18. 18 Base = Total Respondents Fully Implemented Deploying Investigating No Interest VDI adoption status Although fewer than one agency in five has adopted VDI technologies,Although fewer than one agency in five has adopted VDI technologies, interest is growinginterest is growing 10. Which of the following best describes your department or agency use of virtual desktop infrastructure (VDI) solutions?  Federal agencies more apt to have already implemented  State & Local more apt to be investigating  DOD are more in the deployment phase than others
  • 19. 19 Lack of familiarity, funding, and legacy applicationLack of familiarity, funding, and legacy application support are the widely cited reasons for not adopting VDIsupport are the widely cited reasons for not adopting VDI 10a. Which of the following describes the reasons why your department or agency is not interested in a VDI solution? Why VDI is not of interest Base = Those not interested in VDI
  • 20. 20 VDI drivers – flexibility, compliance with securityVDI drivers – flexibility, compliance with security manages, and user productivitymanages, and user productivity 12. How important are each of the following benefits of VDI to your department of agency? Importance of VDI benefits Base = Those investigating or adopted VDI  Civilian agencies place greater importance on lower total cost of ownership  Federal agencies please greater importance on support Very ImportantVery Important SummarySummary What this shows: This depicts the level of influence of attributes that are most strongly associated with driving VDI adoption. Coefficients are obtained from best-fit linear discriminant models built to determine VDI benefits.
  • 21. 21 But many are concerned about proving the worth of VDI-inducedBut many are concerned about proving the worth of VDI-induced productivity gains as well as management complexityproductivity gains as well as management complexity 13. How concerned is your department or agency with each of the following obstacles or challenges related to VDI? VDI Concerns Base = Those investigating or adopted VDI  Civilian agencies have greater concern for in-house skills to deploy/manage VDI  Federal agencies place more concern on performance Very ConcernedVery Concerned SummarySummary What this shows: This depicts the level of influence of attributes that are most strongly associated with driving VDI adoption. Coefficients are obtained from best-fit linear discriminant models built to determine VDI concerns.
  • 22. 22 In two years more than half of agency employees are expected to beIn two years more than half of agency employees are expected to be using VDI to access their desktop applications and data via endusing VDI to access their desktop applications and data via end point devicespoint devices 11. Please estimate how many of your department or agency employees use VDI to support their use of end point devices, including mobile devices? Mean Scores Growth of 19% Base = Those investigating or adopted VDI Proportion employees using VDI Federal agencies further along with VDI use than State & Local currently and in the next few years
  • 23. 23 ObservationsObservations  Chief public sector IT objectives – simplified management and consolidated infrastructure, alongside greater user accessibility of IT assets  Most wish to make managing user desktops and mobile devices easier  Users are increasingly apt to demand “anytime, anywhere” access to their desktop and enterprise applications  Although BYOD continues to grow, most agencies still prefer to control dispensation of mobile devices because of security and DLP concerns  Blurred boundaries between work and home/person use of end point devices  Device-centric security strategies such as user authentication, VPN accessibility, and direct IT access to user devices would ease concerns and potentially permit more BYOD adoption  Agency decision makers want more balance in their IT security strategies toward greater protection of agency infrastructure and away from focusing primarily on user devices  Adoption of and interest in virtual desktop infrastructure (VDI) grows  Chief VDI benefits – more flexibility and agility, extra security, better user experience  But hurdles remain, such as fear of management complexity, lack of demonstrable ROI, unproven compliance
  • 24. © 2012 VMware Inc. All rights reserved Confidential Mobility Solutions for Government Agencies Bryan Salek EUC Systems Engineer
  • 25. 25 Confidential New Device Platforms New Apps New User Expectations Key market trends are driving change New Device Platforms  Multiple Devices and Platforms New User Expectations  Mobile and Remote Access New Apps  SaaS and Mobile Applications New Apps New User ExpectationsNew Device Platforms
  • 26. 26 Confidential You are under pressure to make sense of the new Personal DevicesCorporate Devices Diverse Apps Diverse Platform Data Everywhere Diverse Devices Mobile
  • 27. 27 Confidential Common responses only mask problem Buy a Point Solution Does not scale, increases cost Creates a management mess Lock It Down Unhappy workforce IT is viewed the “bad guy” Ignore It Poor IT Control Security and compliance risk
  • 28. 28 Confidential Transform Assets Into Central Services Broker Services Centrally by Policy Deliver Multi-device Access What you need is a new approach
  • 29. 29 Confidential Transform: Simplify desktops, diverse apps and data into centralized services Deliver: Empower your workforce with flexible access across devices, locations and connectivity VMware Horizon Delivers the Virtual Workspace Broker: Manage & Secure centrally and broker services to your workforce by policy
  • 30. 30 Confidential The Horizon Suite: Accelerates Your User-Centric Era Journey VMware Horizon SuiteVMware Horizon Suite Horizon WorkspaceHorizon WorkspaceHorizon MirageHorizon Mirage Horizon ViewHorizon View Physical Desktops/Laptops Virtual Desktops Mobile, Multi-Device Workspace NEW v5.2 NEW v5.2 NEW V4.2 NEW V4.2 NEW V1.5 NEW V1.5
  • 31. 31 For more information: Visit: www.vmware.com/go/GovernmentMobility Resource Download – white paper “Emerging Strategies for Managing Mobility” Contact: Bryan Salek bsalek@vmware.com Research Sponsored By:

Editor's Notes

  1. Customer and analyst research has show three major trends are forcing IT to evolve.   First, many of our business processes and IT organizations were built up to support a Windows-based world. Today, as you well know, people are working differently because of the flood of mobile devices in the Enterprise.   Second, it’s not just about new devices. We’ve seen an avalanche in new applications – particularly SaaS-based and mobile apps -- over the last few years. Users have a myriad of choices today that they didn’t have 5 or 10 years ago.   Lastly, what we experience as consumers is largely driving our expectation of Enterprise IT. For instance, we expect higher degrees of collaboration -- not just internally, but with customers, partners and contractors beyond the firewall.  
  2. IT needs to rationalize all the NEW technology diversity making it’s way into the organization from the cloud or from the employee’s personal life. This causes quite a conundrum Applications live in your datacenter, on the desktop, in the cloud or on mobile devices Data is in a “my Documents” folder and stored in the cloud for easy collaboration but lacking security and control What was once a Windows dominated world is now a multi platform world and each employee may have three devices each with a different platform but the need to get access to the same apps across all of them
  3. In looking to solve the issues associated with technology diversity, we have seen IT organization have one of three common responses to the problem.