SlideShare a Scribd company logo
1 of 3
Download to read offline
WHITEPAPER 
WITH THE EVOLUTION OF TECHNOLOGY, A 
COMPREHENSIVE MOBILITY STRATEGY IS IMPERATIVE 
By Kim Greyling, Business Analyst & PA to Managing Director, EES Africa (Pty) Ltd 
With the constant evolution of technology and ever increasing business demands, it 
is imperative to have the necessary mobility strategy in place to enable a company to 
perform at maximum capacity irrespective of device.
CONTENTS 
Page 2 Introduction 
Page 2 Defi ning the Mobility Strategy 
Page 2 Implementing the Mobility Strategy 
Page 2 Conclusion 
ABOUT EES: 
Established in 2001, EES Africa (Pty) Ltd specialises in the integration of multiple 
system infrastructure including ICT, Data Centres, Audio Visual, Life Safety, Security 
and Building Automation Systems. As an ISO 9001:2008 certifi ed company, our 
vision is to be Africa’s management, engineering and auditing professional service 
provider of choice. The EES Value Proposition focuses on translating technology into 
tangible deliverables for clients through the experience of a talented team of Engi-neering 
and ICT Consultants and Project Managers. With offi ces in Cape Town, Jo-hannesburg 
and Stellenbosch, EES operates predominantly in the Financial Services, 
Hospitality, Infrastructure, Mining, Oil & Gas, Renewable Energy, Retail, Telecoms 
and Utilities sectors. 
EES Cape Town offi ce: 
G11 Silverberg Terrace 
3 Silverwood Close 
Steenberg Offi ce Park 
Cape Town 7945 
PO Box 31322, Tokai 7966 
Western Cape, South Africa 
Email: info@eeslive.com 
Tel: +27 (0)21 702 8340 
Fax: +27 (0) 86 532 3532 
EES Johannesburg offi ce: 
Unit 8, West Block Loft Offi ces, 
First Floor, The Zone Phase II, 
26 Cradock Avenue, Rosebank, 2186 
PO Box 31322, Tokai 7966 
Western Cape, South Africa 
Email: info@eeslive.com 
Tel: +27 (0)10 590 6270 
Fax: +27 (0) 86 532 3532 
EES Stellenbosch offi ce: 
18 Tegno Road 
Techno Park 
Stellenbosch 7599 
PO Box 31322, Tokai 7966 
Western Cape, South Africa 
Email: info@eeslive.com 
Tel: +27 (0)21 200 5939 
Fax: +27 (0) 86 532 3532 
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 1
WITH THE EVOLUTION OF TECHNOLOGY, A 
COMPREHENSIVE MOBILITY STRATEGY IS IMPERATIVE 
Introduction 
Several years ago, if a business laptop crashed, was sto-len 
or damaged, this would have resulted in the end of 
one’s working world, fi guratively speaking of course. 
Days would be spent trying to reconnect, resulting in loss 
of productivity and income for the organisation. Realisti-cally, 
without a formal mobility strategy in place, this un-fortunate 
scenario is every company’s worst nightmare. 
However, with the correct technology and mobility strat-egy, 
this scenario never has to become a reality for an or-ganisation. 
Downtime inconveniences can be drastically 
reduced to the point where if one device is stolen, one 
could simply carry on working from a different device. 
This paper’s focus is based on a real-life incident in which 
a laptop was stolen. The employee, as with most employ-ees 
in an organisation, fulfi lls multiple roles, those of be-ing 
a member of the company’s technology team, part of 
the administration team and a business analyst assigned 
to various projects. These roles rely heavily on the use of 
a laptop and connected devices. Because of EES’ tech-nology 
strategy, downtime was limited to just one hour! 
Defi ning the Mobility Strategy 
Technology refers to the collection of tools, including 
machinery, modifi cations, arrangements and procedures 
used by people. 
Mobility represents the movement of a technology user 
and how his or her location, requirements and behav-iour 
patterns change over time. Mobility management 
for mobile communication systems makes use of mobility 
models for predicting future user requirements. 
Technology is and always will be in a constant state of 
evolution. Simply put, if an organisation does not con-tinuously 
review and adapt its mobility strategy, it will 
be left behind which is not a position any company can 
afford to be in. Since more and more mobile devices are 
being introduced into an enterprise as part of Bring Your 
Own Device (BYOD) and being used to access business 
critical data, there are three key aspects to consider: 
1. In today’s mobile world, enabling enterprise mobility 
has become mission critical. Start with a mobility assess-ment 
and a mobility strategy for the organisation. While 
the use of mobile devices can offer many benefi ts for 
employees in terms of productivity and effi ciency, it also 
puts a signifi cant burden on the management of IT. 
2. To get the most from mobile technology, one has to 
know exactly how it will impact the workplace environ-ment. 
Defi ne a policy for your organisation’s mobility 
strategy. Currently, the average employee uses three de-vices 
a day to connect. Personal devices are often used 
for work purposes, and therefore need to be covered by 
the same policy. 
3. Understanding usage patterns is crucial to enabling the 
correct data in the right format per device. Thus, defi ning 
intended purposes for each device will assist greatly. 
Implementing the Mobility Strategy 
The willingness to embrace technology creates an op-portunity 
for businesses to prepare themselves for the 
changing ways in which employees will be using tech- 
September 2014 
nology in the future. In order to implement a strategy to remove the risk 
of data loss and keep staff working, consider the following practical tips: 
1. Budget accordingly for the increased costs. A study conducted and pub-lished 
by the online technology forum, Mashable, indicates that most busi-nesses 
do not budget accordingly when implementing an organisational 
mobility strategy. Allowing employees to bring their personal devices to 
work does assist in decreasing costs. 
2. Providing staff with virtual desktop access from any zero (or thin) client 
enables them to work in ways that previously may have not been practical. 
3. Tablets (or even a phablet for those individuals who prefer to streamline) 
are often better suited for meetings and conferences. Make these devices 
available for such cases. Microsoft has rolled out Offi ce for tablet and the 
experience is just as good as the traditional desktop. 
4. Enable a technology platform that is hardware agnostic. This allows vari-ous 
computing components to work with various systems without special 
adaptations and enables connectivity across devices. 
5. Establish back-up schedules and make a back-up of the back-ups. Typical 
data includes project data, personal data and application settings. 
6. Plan for an infl ux of devices and the impact they will have on capacity 
and bandwidth. Organisations should ask themselves what changes they 
need to make to the existing infrastructure or what infrastructure do they 
need to put into place to accommodate this infl ux? 
7. Make sure that the organisation’s applications are protected (this goes 
back to having the endpoint requirements in order) no matter what de-vices 
are connecting to the network. Protecting data at the application 
level should keep businesses in good stead. When dealing with data of a 
sensitive nature, two phase authentication becomes highly useful ie. the 
users enters their password on the relevant site that they wish to access and 
a message is sent to their cell phone authenticating that they, the correct 
users, are trying to access the site. Organisations also need to offer security 
and support for BYOD when they are being used for business purposes. 
8. Training, communication and simulations are critical to being ready. 
Conclusion 
Today, it is essential to have access to the internet, cloud and company 
data, as well as be able to communicate with co-workers, associates and 
clients no matter one’s location. Ever increasing advances in technology 
make this possible. It is vital for an organisation to have a cutting edge 
mobility strategy in place to optimise effi ciency and ensure that should a 
device be lost, stolen or damaged, communication continues. Fundamental 
to this, is connectivity across devices as well as backup. All staff members 
need to have training in and knowledge of technology and devices needed 
for connectivity. This ensures maximum performance of a company and its 
people at all times. 
Written by Kim Greyling 
Business Analyst and Executive PA to MD 
Tel +27 (0)10 200 5939, 
Email info@eeslive.com 
Kim studied a Business Management 
Diploma and is currently the Personal 
Assistant to the Managing Director of 
EES as well as performing the role of 
Business Analyst. Her responsibilities also 
include technology administration and 
coordination for the business. 
II MMAANNAAGGEEMMEENNTT II EENNGGIINNEEEERRIINNGG II AAUUDDIITTIINNGG II www.eeslive.com 2

More Related Content

What's hot

Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceVishal Sharma
 
Final presentation
Final presentationFinal presentation
Final presentationAshish Saini
 
IT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsIT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsSolarWinds
 
Cloud Managed Mobility
Cloud Managed MobilityCloud Managed Mobility
Cloud Managed MobilityCoranet Corp
 
Webinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementWebinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementCoreDigitalWorks
 
Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization Sarfraz Soomro
 
Technology Solutions for Manufacturing
Technology Solutions for ManufacturingTechnology Solutions for Manufacturing
Technology Solutions for ManufacturingInsight
 
Microsoft Core Infrastructure Overview
Microsoft Core Infrastructure OverviewMicrosoft Core Infrastructure Overview
Microsoft Core Infrastructure Overviewjessiethe3rd
 
Using the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis CanvasUsing the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis CanvasMarc-Andre Leger
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt Babasab Patil
 
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud MigrationFramework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migrationijccsa
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Assespro Nacional
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFarrokh Poorooshasb
 
IT in the modern world
IT in the modern worldIT in the modern world
IT in the modern worldroshni8
 

What's hot (17)

Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governance
 
Final presentation
Final presentationFinal presentation
Final presentation
 
IT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsIT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEs
 
Cloud Managed Mobility
Cloud Managed MobilityCloud Managed Mobility
Cloud Managed Mobility
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
 
Webinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementWebinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee Engagement
 
Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization Impact Of IT(Information Technology) on Organization
Impact Of IT(Information Technology) on Organization
 
50320130403008
5032013040300850320130403008
50320130403008
 
Technology Solutions for Manufacturing
Technology Solutions for ManufacturingTechnology Solutions for Manufacturing
Technology Solutions for Manufacturing
 
Microsoft Core Infrastructure Overview
Microsoft Core Infrastructure OverviewMicrosoft Core Infrastructure Overview
Microsoft Core Infrastructure Overview
 
Using the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis CanvasUsing the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis Canvas
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
 
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud MigrationFramework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
 
Enterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and BeyondEnterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and Beyond
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing Company
 
IT in the modern world
IT in the modern worldIT in the modern world
IT in the modern world
 

Viewers also liked

Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...EES Africa (Pty) Ltd
 
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesAfrica's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesEES Africa (Pty) Ltd
 
Biomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyBiomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyEES Africa (Pty) Ltd
 
Give Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditGive Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditEES Africa (Pty) Ltd
 
Carrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeCarrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeEES Africa (Pty) Ltd
 
Technological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesTechnological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesEES Africa (Pty) Ltd
 
Ageing and public health importance
Ageing and public health importanceAgeing and public health importance
Ageing and public health importanceKantinath Ainapure
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityEES Africa (Pty) Ltd
 
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingSustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingEES Africa (Pty) Ltd
 

Viewers also liked (9)

Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
 
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesAfrica's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
 
Biomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyBiomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated Correctly
 
Give Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditGive Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT Audit
 
Carrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeCarrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next Decade
 
Technological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesTechnological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African Cities
 
Ageing and public health importance
Ageing and public health importanceAgeing and public health importance
Ageing and public health importance
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port Security
 
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingSustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
 

Similar to With the evolution of technology, a comprehensive mobility strategy is imperative ees whitepaper

Hu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHitachi Vantara
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Jim Mason
 
AuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPTAuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPTAuroIN
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructureAccenture
 
Toshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2ppToshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2ppJesse Westgate
 
AuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDFAuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDFAuroIN
 
A Rational approach to application migration and modernization
A Rational approach to application migration and modernizationA Rational approach to application migration and modernization
A Rational approach to application migration and modernizationIBM Rational software
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Evolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdfEvolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdfMindfire LLC
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4National Management Olympiad
 
The Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital TransformationThe Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital TransformationIan Thomas
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure ElasticityNTT Innovation Institute Inc.
 
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdfTechnology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdfSmartinfologiks
 

Similar to With the evolution of technology, a comprehensive mobility strategy is imperative ees whitepaper (20)

Hu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On World
 
MTW03011USEN.PDF
MTW03011USEN.PDFMTW03011USEN.PDF
MTW03011USEN.PDF
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
 
AuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPTAuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPT
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructure
 
Toshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2ppToshiba Opinion Piece A4 2pp
Toshiba Opinion Piece A4 2pp
 
AuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDFAuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDF
 
EFMA & HP: Evolution of the Workplace in Financial Services
EFMA & HP: Evolution of the Workplace in Financial ServicesEFMA & HP: Evolution of the Workplace in Financial Services
EFMA & HP: Evolution of the Workplace in Financial Services
 
A Rational approach to application migration and modernization
A Rational approach to application migration and modernizationA Rational approach to application migration and modernization
A Rational approach to application migration and modernization
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Evolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdfEvolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdf
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Excusive managing director
Excusive managing directorExcusive managing director
Excusive managing director
 
IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4
 
The Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital TransformationThe Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital Transformation
 
01 ondrej felix [režim kompatibility]
01   ondrej felix [režim kompatibility]01   ondrej felix [režim kompatibility]
01 ondrej felix [režim kompatibility]
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
 
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdfTechnology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdf
 
CSC Conversations
CSC ConversationsCSC Conversations
CSC Conversations
 

Recently uploaded

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 

Recently uploaded (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 

With the evolution of technology, a comprehensive mobility strategy is imperative ees whitepaper

  • 1. WHITEPAPER WITH THE EVOLUTION OF TECHNOLOGY, A COMPREHENSIVE MOBILITY STRATEGY IS IMPERATIVE By Kim Greyling, Business Analyst & PA to Managing Director, EES Africa (Pty) Ltd With the constant evolution of technology and ever increasing business demands, it is imperative to have the necessary mobility strategy in place to enable a company to perform at maximum capacity irrespective of device.
  • 2. CONTENTS Page 2 Introduction Page 2 Defi ning the Mobility Strategy Page 2 Implementing the Mobility Strategy Page 2 Conclusion ABOUT EES: Established in 2001, EES Africa (Pty) Ltd specialises in the integration of multiple system infrastructure including ICT, Data Centres, Audio Visual, Life Safety, Security and Building Automation Systems. As an ISO 9001:2008 certifi ed company, our vision is to be Africa’s management, engineering and auditing professional service provider of choice. The EES Value Proposition focuses on translating technology into tangible deliverables for clients through the experience of a talented team of Engi-neering and ICT Consultants and Project Managers. With offi ces in Cape Town, Jo-hannesburg and Stellenbosch, EES operates predominantly in the Financial Services, Hospitality, Infrastructure, Mining, Oil & Gas, Renewable Energy, Retail, Telecoms and Utilities sectors. EES Cape Town offi ce: G11 Silverberg Terrace 3 Silverwood Close Steenberg Offi ce Park Cape Town 7945 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)21 702 8340 Fax: +27 (0) 86 532 3532 EES Johannesburg offi ce: Unit 8, West Block Loft Offi ces, First Floor, The Zone Phase II, 26 Cradock Avenue, Rosebank, 2186 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)10 590 6270 Fax: +27 (0) 86 532 3532 EES Stellenbosch offi ce: 18 Tegno Road Techno Park Stellenbosch 7599 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)21 200 5939 Fax: +27 (0) 86 532 3532 I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 1
  • 3. WITH THE EVOLUTION OF TECHNOLOGY, A COMPREHENSIVE MOBILITY STRATEGY IS IMPERATIVE Introduction Several years ago, if a business laptop crashed, was sto-len or damaged, this would have resulted in the end of one’s working world, fi guratively speaking of course. Days would be spent trying to reconnect, resulting in loss of productivity and income for the organisation. Realisti-cally, without a formal mobility strategy in place, this un-fortunate scenario is every company’s worst nightmare. However, with the correct technology and mobility strat-egy, this scenario never has to become a reality for an or-ganisation. Downtime inconveniences can be drastically reduced to the point where if one device is stolen, one could simply carry on working from a different device. This paper’s focus is based on a real-life incident in which a laptop was stolen. The employee, as with most employ-ees in an organisation, fulfi lls multiple roles, those of be-ing a member of the company’s technology team, part of the administration team and a business analyst assigned to various projects. These roles rely heavily on the use of a laptop and connected devices. Because of EES’ tech-nology strategy, downtime was limited to just one hour! Defi ning the Mobility Strategy Technology refers to the collection of tools, including machinery, modifi cations, arrangements and procedures used by people. Mobility represents the movement of a technology user and how his or her location, requirements and behav-iour patterns change over time. Mobility management for mobile communication systems makes use of mobility models for predicting future user requirements. Technology is and always will be in a constant state of evolution. Simply put, if an organisation does not con-tinuously review and adapt its mobility strategy, it will be left behind which is not a position any company can afford to be in. Since more and more mobile devices are being introduced into an enterprise as part of Bring Your Own Device (BYOD) and being used to access business critical data, there are three key aspects to consider: 1. In today’s mobile world, enabling enterprise mobility has become mission critical. Start with a mobility assess-ment and a mobility strategy for the organisation. While the use of mobile devices can offer many benefi ts for employees in terms of productivity and effi ciency, it also puts a signifi cant burden on the management of IT. 2. To get the most from mobile technology, one has to know exactly how it will impact the workplace environ-ment. Defi ne a policy for your organisation’s mobility strategy. Currently, the average employee uses three de-vices a day to connect. Personal devices are often used for work purposes, and therefore need to be covered by the same policy. 3. Understanding usage patterns is crucial to enabling the correct data in the right format per device. Thus, defi ning intended purposes for each device will assist greatly. Implementing the Mobility Strategy The willingness to embrace technology creates an op-portunity for businesses to prepare themselves for the changing ways in which employees will be using tech- September 2014 nology in the future. In order to implement a strategy to remove the risk of data loss and keep staff working, consider the following practical tips: 1. Budget accordingly for the increased costs. A study conducted and pub-lished by the online technology forum, Mashable, indicates that most busi-nesses do not budget accordingly when implementing an organisational mobility strategy. Allowing employees to bring their personal devices to work does assist in decreasing costs. 2. Providing staff with virtual desktop access from any zero (or thin) client enables them to work in ways that previously may have not been practical. 3. Tablets (or even a phablet for those individuals who prefer to streamline) are often better suited for meetings and conferences. Make these devices available for such cases. Microsoft has rolled out Offi ce for tablet and the experience is just as good as the traditional desktop. 4. Enable a technology platform that is hardware agnostic. This allows vari-ous computing components to work with various systems without special adaptations and enables connectivity across devices. 5. Establish back-up schedules and make a back-up of the back-ups. Typical data includes project data, personal data and application settings. 6. Plan for an infl ux of devices and the impact they will have on capacity and bandwidth. Organisations should ask themselves what changes they need to make to the existing infrastructure or what infrastructure do they need to put into place to accommodate this infl ux? 7. Make sure that the organisation’s applications are protected (this goes back to having the endpoint requirements in order) no matter what de-vices are connecting to the network. Protecting data at the application level should keep businesses in good stead. When dealing with data of a sensitive nature, two phase authentication becomes highly useful ie. the users enters their password on the relevant site that they wish to access and a message is sent to their cell phone authenticating that they, the correct users, are trying to access the site. Organisations also need to offer security and support for BYOD when they are being used for business purposes. 8. Training, communication and simulations are critical to being ready. Conclusion Today, it is essential to have access to the internet, cloud and company data, as well as be able to communicate with co-workers, associates and clients no matter one’s location. Ever increasing advances in technology make this possible. It is vital for an organisation to have a cutting edge mobility strategy in place to optimise effi ciency and ensure that should a device be lost, stolen or damaged, communication continues. Fundamental to this, is connectivity across devices as well as backup. All staff members need to have training in and knowledge of technology and devices needed for connectivity. This ensures maximum performance of a company and its people at all times. Written by Kim Greyling Business Analyst and Executive PA to MD Tel +27 (0)10 200 5939, Email info@eeslive.com Kim studied a Business Management Diploma and is currently the Personal Assistant to the Managing Director of EES as well as performing the role of Business Analyst. Her responsibilities also include technology administration and coordination for the business. II MMAANNAAGGEEMMEENNTT II EENNGGIINNEEEERRIINNGG II AAUUDDIITTIINNGG II www.eeslive.com 2