SlideShare a Scribd company logo
1 of 2
Download to read offline
Mobile IT – choosing a vendor in a crowded market

In a follow up to his recent look at the options available to organisations seeking to manage the data security
risks associated with BYOD, James Tay, CEO at Logicalis Asia, sets out the considerations that should guide
organisations’ choice of MDM/MAM vendor.


Forrester Research points out that there are more than 40 serious players in the MDM/MAM market, so there are
lots of options out there. But, in making the right choice, there are a number of issues to take into account, based
on the needs of the organisation both now, and in the future.


First of all, there are three over-arching considerations to bear in mind when selecting a Mobile IT vendor. A
credible solution must deliver:


1.   Complete visibility of what devices are on the network and what these devices are doing
2.   ‘On-boarding’ that allows access by personal devices without inundating IT staff with
     extra workloads
3.   Enforcement and maintenance of security and control of the network.


Beyond those fundamentals, a range of more granular issues will guide the final vendor
selection. Ask yourself:


Is there a local support framework for both Pre and Post-Sales?


Allowing enterprise access to personal devices has direct implications for an organisation’s IT resources; time
and effort must be spent managing and configuring user devices for secure corporate use.


In my view automatic ‘on-boarding’ and intuitive MDM portals are essential to relieving pressure on IT
departments. Sponsors can provide guest users with access rather than relying on the IT team to validate and
provide credentials, thus saving time and resources.


Any proposed vendor should certainly be proposing a ‘self-service’ approach and show evidence of solid support
during and after integration.


What is the size of the customer database and are there customer references?


It is quite obvious really, but the number of successful deployments and the degree to which existing customers
will provide references should be an indication that a vendor is in a strong position to provide a solid, reliable
solution.


In particular, look for clients in the government or financial sectors. These organisations tend to take a wait-and-
see stance given their uncompromising security requirements – and few vendors can currently boast significant
adoption in these markets.


Specifically, the sectors are likely to look for security features that allows non-compliant devices to be placed in a
quarantined VLAN, with access permitted and policies enforced only after the successful fulfilment of the
necessary anti-virus updates and patches.


Visit Logicalis’ blog www.cxounplugged.com                                                                    1
So I would look for vendors with clients in these sectors, as they would have been tested on the security limits.


Are there clear advantages to integrating MAM and MDM and to what extent should ease and cost of
deployment considerations should be part of the selection criteria?


Most vendors provide point solutions that address just parts of the challenge but IT departments need a
comprehensive solution and, at the same time, organisations require a simple framework for deploying BYOD.


Although MDM solutions require an agent to reside in the mobile devices, they also do away with the requirement
to upgrade networks.


We have already mentioned the need to ease pressure on IT departments, but there is also quicker return on
investment when a holistic solution, like hybrid MDM/MAM, is in place.


Should I go for an on-premise or cloud-based offering?


Cloud offerings and SaaS solutions with managed services tend to have a comparatively lower initial cost and
call on the IT Department resources. They also provide greater resilience, and typically offer multiple points of
presence.


Costs could escalate, however, if the number of devices per employee is not restricted, since licences are not
typically open-ended.


On-premise is generally favoured where an organisation wishes to maintain a high level of control over the
solution – but on-premise can have higher capital expenditure implications.


Does the vendor support multiple OS environments?


Without a doubt, your vendor should be able to handle multiple operating systems and have a game plan for
dealing with future players. On a related note, it is just as important to partner with a mature and established
vendor with strong and clear workflows, processes and roadmaps.


Does the solution have strong reporting and dashboard capabilities?


Centralised reporting will be useful in monitoring for the exhaustion of licenses and providing clear visibility of the
number of devices per employee.


In the past, we might have seen the same user on the network multiple times, but did not know which devices
they were using on the network. In a BYOD environment, that is simply not detailed enough, so look for a vendor
which can deliver the insight required to monitor and manage access on a much more detailed level.




Visit Logicalis’ blog www.cxounplugged.com                                                                    2

More Related Content

More from Logicalis

Fenmarc case study
Fenmarc case studyFenmarc case study
Fenmarc case studyLogicalis
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
The BYOD Divide
The BYOD DivideThe BYOD Divide
The BYOD DivideLogicalis
 
Logicalis Case Study - Verna Group Ltd.
Logicalis Case Study - Verna Group Ltd.Logicalis Case Study - Verna Group Ltd.
Logicalis Case Study - Verna Group Ltd.Logicalis
 
Logicalis Case Study - Gamesys
Logicalis Case Study - GamesysLogicalis Case Study - Gamesys
Logicalis Case Study - GamesysLogicalis
 
Business Collaboration Conducting the Virtual Choir
Business Collaboration Conducting the Virtual ChoirBusiness Collaboration Conducting the Virtual Choir
Business Collaboration Conducting the Virtual ChoirLogicalis
 
Logicalis Annual Review2012
Logicalis Annual Review2012Logicalis Annual Review2012
Logicalis Annual Review2012Logicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation OverviewLogicalis
 
Unified Communications Overview
Unified Communications OverviewUnified Communications Overview
Unified Communications OverviewLogicalis
 
Case Study Regal Entertainment Group
Case Study Regal Entertainment GroupCase Study Regal Entertainment Group
Case Study Regal Entertainment GroupLogicalis
 
Case Study Mercury Marine
Case Study Mercury MarineCase Study Mercury Marine
Case Study Mercury MarineLogicalis
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis
 
Logicalis Case Study American Foods Group
Logicalis Case Study American Foods GroupLogicalis Case Study American Foods Group
Logicalis Case Study American Foods GroupLogicalis
 
Logicalis Case Study AMEC
Logicalis Case Study AMECLogicalis Case Study AMEC
Logicalis Case Study AMECLogicalis
 
Data Centre Overview
Data Centre OverviewData Centre Overview
Data Centre OverviewLogicalis
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing OverviewLogicalis
 
Case Study Cathay Bank
Case Study Cathay BankCase Study Cathay Bank
Case Study Cathay BankLogicalis
 
Case study Crown
Case study CrownCase study Crown
Case study CrownLogicalis
 
Case Study GPT Group
Case Study GPT GroupCase Study GPT Group
Case Study GPT GroupLogicalis
 
Case Study Enspire
Case Study EnspireCase Study Enspire
Case Study EnspireLogicalis
 

More from Logicalis (20)

Fenmarc case study
Fenmarc case studyFenmarc case study
Fenmarc case study
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
The BYOD Divide
The BYOD DivideThe BYOD Divide
The BYOD Divide
 
Logicalis Case Study - Verna Group Ltd.
Logicalis Case Study - Verna Group Ltd.Logicalis Case Study - Verna Group Ltd.
Logicalis Case Study - Verna Group Ltd.
 
Logicalis Case Study - Gamesys
Logicalis Case Study - GamesysLogicalis Case Study - Gamesys
Logicalis Case Study - Gamesys
 
Business Collaboration Conducting the Virtual Choir
Business Collaboration Conducting the Virtual ChoirBusiness Collaboration Conducting the Virtual Choir
Business Collaboration Conducting the Virtual Choir
 
Logicalis Annual Review2012
Logicalis Annual Review2012Logicalis Annual Review2012
Logicalis Annual Review2012
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
Unified Communications Overview
Unified Communications OverviewUnified Communications Overview
Unified Communications Overview
 
Case Study Regal Entertainment Group
Case Study Regal Entertainment GroupCase Study Regal Entertainment Group
Case Study Regal Entertainment Group
 
Case Study Mercury Marine
Case Study Mercury MarineCase Study Mercury Marine
Case Study Mercury Marine
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services Capabilities
 
Logicalis Case Study American Foods Group
Logicalis Case Study American Foods GroupLogicalis Case Study American Foods Group
Logicalis Case Study American Foods Group
 
Logicalis Case Study AMEC
Logicalis Case Study AMECLogicalis Case Study AMEC
Logicalis Case Study AMEC
 
Data Centre Overview
Data Centre OverviewData Centre Overview
Data Centre Overview
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Case Study Cathay Bank
Case Study Cathay BankCase Study Cathay Bank
Case Study Cathay Bank
 
Case study Crown
Case study CrownCase study Crown
Case study Crown
 
Case Study GPT Group
Case Study GPT GroupCase Study GPT Group
Case Study GPT Group
 
Case Study Enspire
Case Study EnspireCase Study Enspire
Case Study Enspire
 

Recently uploaded

Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 

Recently uploaded (20)

Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 

Mobile IT: Choosing a Vendor in a Crowded Market

  • 1. Mobile IT – choosing a vendor in a crowded market In a follow up to his recent look at the options available to organisations seeking to manage the data security risks associated with BYOD, James Tay, CEO at Logicalis Asia, sets out the considerations that should guide organisations’ choice of MDM/MAM vendor. Forrester Research points out that there are more than 40 serious players in the MDM/MAM market, so there are lots of options out there. But, in making the right choice, there are a number of issues to take into account, based on the needs of the organisation both now, and in the future. First of all, there are three over-arching considerations to bear in mind when selecting a Mobile IT vendor. A credible solution must deliver: 1. Complete visibility of what devices are on the network and what these devices are doing 2. ‘On-boarding’ that allows access by personal devices without inundating IT staff with extra workloads 3. Enforcement and maintenance of security and control of the network. Beyond those fundamentals, a range of more granular issues will guide the final vendor selection. Ask yourself: Is there a local support framework for both Pre and Post-Sales? Allowing enterprise access to personal devices has direct implications for an organisation’s IT resources; time and effort must be spent managing and configuring user devices for secure corporate use. In my view automatic ‘on-boarding’ and intuitive MDM portals are essential to relieving pressure on IT departments. Sponsors can provide guest users with access rather than relying on the IT team to validate and provide credentials, thus saving time and resources. Any proposed vendor should certainly be proposing a ‘self-service’ approach and show evidence of solid support during and after integration. What is the size of the customer database and are there customer references? It is quite obvious really, but the number of successful deployments and the degree to which existing customers will provide references should be an indication that a vendor is in a strong position to provide a solid, reliable solution. In particular, look for clients in the government or financial sectors. These organisations tend to take a wait-and- see stance given their uncompromising security requirements – and few vendors can currently boast significant adoption in these markets. Specifically, the sectors are likely to look for security features that allows non-compliant devices to be placed in a quarantined VLAN, with access permitted and policies enforced only after the successful fulfilment of the necessary anti-virus updates and patches. Visit Logicalis’ blog www.cxounplugged.com 1
  • 2. So I would look for vendors with clients in these sectors, as they would have been tested on the security limits. Are there clear advantages to integrating MAM and MDM and to what extent should ease and cost of deployment considerations should be part of the selection criteria? Most vendors provide point solutions that address just parts of the challenge but IT departments need a comprehensive solution and, at the same time, organisations require a simple framework for deploying BYOD. Although MDM solutions require an agent to reside in the mobile devices, they also do away with the requirement to upgrade networks. We have already mentioned the need to ease pressure on IT departments, but there is also quicker return on investment when a holistic solution, like hybrid MDM/MAM, is in place. Should I go for an on-premise or cloud-based offering? Cloud offerings and SaaS solutions with managed services tend to have a comparatively lower initial cost and call on the IT Department resources. They also provide greater resilience, and typically offer multiple points of presence. Costs could escalate, however, if the number of devices per employee is not restricted, since licences are not typically open-ended. On-premise is generally favoured where an organisation wishes to maintain a high level of control over the solution – but on-premise can have higher capital expenditure implications. Does the vendor support multiple OS environments? Without a doubt, your vendor should be able to handle multiple operating systems and have a game plan for dealing with future players. On a related note, it is just as important to partner with a mature and established vendor with strong and clear workflows, processes and roadmaps. Does the solution have strong reporting and dashboard capabilities? Centralised reporting will be useful in monitoring for the exhaustion of licenses and providing clear visibility of the number of devices per employee. In the past, we might have seen the same user on the network multiple times, but did not know which devices they were using on the network. In a BYOD environment, that is simply not detailed enough, so look for a vendor which can deliver the insight required to monitor and manage access on a much more detailed level. Visit Logicalis’ blog www.cxounplugged.com 2