NetMotion Wireless The Dozen Challenges to Successful Mobile Deployments
Share this eBookTHE DOZEN CHALLENGESto successful mobile deploymentseBook
THE DOZEN CHALLENGESto successful mobile deploymentseBookIT SERVICE DELIVERYAutomate Patch Managementand UpgradesKeep Trouble Tickets in CheckAchieve Reliable Operation WithoutBurdening ITORGANIZATIONAL SECURITYEnforce Security WithoutHampering WorkersProtect Against Stolen Devices orUnauthorized AccessGain Control over Workers, Devicesand Networks#1#2#3#4#5#6USER EXPERIENCEFoster User Acceptance andManage ChangeMake Wireless NetworkUse SeamlessDeliver Seamless Access toMore ApplicationsBUSINESS OPERATIONSGain Visibility Into CorporateAsset UseKeep Wireless Access Chargesin CheckBe Ready to Scale#7#8#9#10#11#12
Share this eBookINTRODUCTIONAs wireless network capacity expands and mobiledevices become more powerful, enterprises are ableto bring full application access directly to mobileThose workers roam across multiple networks, usemultiple connection types and encounter coveragegaps, all while EXPECTING THE SAME RELIABLE,CONTINUOUSLY AVAILABLE ACCESS TO NETWORKRESOURCES THAT THEY EXPERIENCE IN THEOFFICEIT DEPARTMENTS AS THEY PLAN THEIR MOBILEDEPLOYMENTSWhat follows are the top 12challenges that organizationsmay face as they expand theirmobile workforce and systems tosupport them, and the solutionsto help overcome them.
Share this eBookCHALLENGE#1AUTOMATE PATCH MANAGEMENT AND UPGRADESManaging a large mobile deployment on a device-by-devicesystems management suites used on the internal wired networkcan be extended to the mobile environment, allowing thosePatches and upgrades can be applied after-hours, or at othertimes when users aren’t actively using or logged onto theirTHAT SYSTEMS MANAGEMENT PROCEEDS NOTJUST AT AN APPROPRIATE TIME, BUT OVER ACONNECTION WITH APPROPRIATE SPEED.Depending on use patterns and the various connectionsavailable, that optimal connection might be over a cellularnetwork after-hours; while a device is in range of a corporateWi-Fi connection in a parking garage; connected via home Wi-Fi;IT SERVICE DELIVERY
CHALLENGEKEEP TROUBLE TICKETS IN CHECKA mobile environment adds new variables to the application-delivery equation including intermittent connectivity, access overthird-party networks, and a need for more complex security andA solution that manages the complexities of connections on the worker’sTHISNOT ONLY LOWERS SUPPORT COSTS BUT ELIMINATES THE LOSTPRODUCTIVITY THAT THOSE SUPPORT CALLS REPRESENT#2
CHALLENGE#3ACHIEVE RELIABLEOPERATION WITHOUTBURDENING ITJust as the wireless infrastructure should be “hands-Active load-balancing and automated failover built intoA proactive alerting capability allows the IT departmentto manage by-exception and receive automaticOFTENTIMES, THEY CAN INTERVENE BEFOREISSUES IMPACT WORKERS AND TRIGGERTROUBLE TICKETS
CHALLENGE#4ENFORCE SECURITYWITHOUT HAMPERINGWORKERSProtecting data and devices from unauthorizedAuthentication needs to be straightforward and alost connection shouldn’t require workers to have toare active to avoid introducing malware that wouldplace the enterprise and its user community atcorporate information and, in some cases, to meetORGANIZATIONAL SECURITYAn ideal solution accounts for all of thesesecurity concerns, in a way that doesn’tburden the user into having to take extrasteps, and protects assets in a way that is
Share this eBookCHALLENGE#5PROTECT AGAINST STOLEN DEVICES ORUNAUTHORIZED ACCESSthat a device is being used by an unauthorized person (through too many wrong password attempts)DIGITAL CERTIFICATES MAY ALSO BE USED TOVERIFY THAT ONLY DEVICES THAT HAVE BEENPREAPPROVED MAY CONNECT TO CORPORATERESOURCES; this prevents a user from usingcorporate credentials to connect via an unsecureA common practice is to automatically place any newlyconnection, so the administrator can verify the device’s
CHALLENGE#6GAIN CONTROL OVERWORKERS, DEVICES ANDNETWORKSMobile assets are constantly on the go and thisThe ideal solution incorporates FLEXIBLE POLICYCONTROLdegree of freedom to access the Internet and useaccess, with enforcement via controls that cannot beADMINISTRATORS NEED CONTROL OVERWHO is using a device, through authenticationthat integrates with corporate directories foreasier management.WHAT devices may connect, and the users whoare authorized to use them.HOW AND WHEREbeing accessed and over which networks.
CHALLENGE#7FOSTER USER ACCEPTANCE AND MANAGE CHANGEoptions in their hands might allow them to accidentally cripple their devices, open security holes, or bogTHE BEST SOLUTION IS ONE THAT REQUIRESMINIMAL USER INTERVENTION AND MAKES THEUNDERLYING TECHNOLOGY AS TRANSPARENTAS POSSIBLEUSER EXPERIENCE
Share this eBookCHALLENGE#8MAKE WIRELESS NETWORK USE SEAMLESSMost mobile deployments require multiple cellular networks, often augmented with Wi-Fi access points,Furnishes a single sign-onAllows the worker to access multiple networks as though it were a single networkDoes it all within a single persistent session so workers only have to log in once
CHALLENGE#9DELIVER SEAMLESS ACCESSTO MORE APPLICATIONSThe number of applications and types used bymobile workers is growing, beyond scheduling andapplications are being deployed that are an integralThese applications are rarely if ever designed withmobile access in mind, where connections break withoutwarning (for instance, when a user goes out of range)APPLICATIONS CAN INCLUDE:CRM, work-order management, GIS andmapping, parts inventory databases andmany more. Voice-Over-IP, camera softwareand video software enable new capabilitiesThe easiest way to manage the problem is with ASOLUTION THAT ALLOWS ANY SOFTWARE USEDIN A LAN ENVIRONMENT TO BE USED IN A MOBILEENVIRONMENT It is also useful to prioritize application
CHALLENGE#10GAIN VISIBILITY INTO CORPORATE ASSET USEInvestments in wireless technology including devices, networks and the supporting infrastructure arelike any other business investment and it is important to know they are performing and deliveringAN IDEAL SOLUTION WILL DELIVER VISIBILITY ON THREE LEVELS:Real-time Visibility: Real-time visibility lets administrator immediately see which devices are causingProactive Alerting:that devices or users are in need of attention, so that ITpersonnel don’t have to spend time watching for problems, butReporting and Analytics: This capability allows administratorsand managers to see the big picture of service delivery, knowBUSINESS OPERATIONS
CHALLENGE#11KEEP WIRELESS ACCESSCHARGES IN CHECKAs cellular carriers replace unlimited-use data planswith usage-based rates, enterprises face a new cost-ANALYTICS CAPABILITY, which monitors networkuse for appropriateness, helps administrators keepsswitches automatically to free or lower-cost Wi-FiCOMPRESSION AND LINK OPTIMIZATION can
Share this eBookCHALLENGE#12BE READY TO SCALEFor organizations that have overcome the preceding eleven challenges of a mobile environment, theSUCCESSFUL ORGANIZATIONS HAVE OFTEN EXTENDED THEIR ORIGINAL MOBILEDEPLOYMENTS TO NEW USERS, including additional classes of mobile workers and evenWhile some of these users might be servedby an SSL-VPN or IPsec VPN, they can behandles THE SPECIFIC DEMANDS OF AFULLY MOBILE WORKFORCE
CONCLUSIONThe more the wireless environment can operate andbe managed like a wired environment, THE MORELIKELY IT IS THAT AN ENTERPRISE MOBILITYINITIATIVE WILL BE SUCCESSFUL.