Research - Enterprise Mobility

660 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
660
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Research - Enterprise Mobility

  1. 1. Enterprise mobility strategy <br />RahulSethi - Principal<br />Mobiangle.com<br />sales@mobiangle.com<br />408-459-0657<br />
  2. 2. Why do enterprises need a mobile strategy?<br />Mobility is an integral and growing part of the majority of businesses<br />An integrated mobile strategy brings obvious benefits<br />Cost/resourcing<br />Greater business control<br />An empowered, more efficient, effective workforce<br />
  3. 3. Four grades of enterprise mobile strategy<br />Most companies sit here today<br />
  4. 4. The enterprise challenge <br />CEO/CFO<br />User<br />IT department<br />
  5. 5. The emergence of wireless islands<br />Teleworker<br />Small /remote office<br />Piecemeal approach results in wireless islands and leads to security, quality and cost issues<br />Road warrior<br />Central office<br />
  6. 6. User profiles need to move between islands<br />Static role<br />Mobile centric<br />Desk<br />Desk<br />Mobile<br />Floor<br />Office<br />Home<br />Home<br />Desk<br />Desk<br />Mobile<br />Mobile<br />Office<br />Home<br />Office<br />Semi-mobile roles<br />Semi-static role<br />
  7. 7. An enterprise mobility strategy is more than mobile<br />
  8. 8. Some key steps in implementing a mobile strategy<br />Future proofing<br />Security<br />Billing<br />Cost minimisation<br />Access away from the core<br />User mobility profiling<br />User data access requirements<br />Assessment of what is in place - networks, devices<br />
  9. 9. Security<br />Security is a major issue for IT departments<br />Wireless network security should offer same level of protection as wired<br />Multi-layered defence strategy<br />Not just perimeter based<br />Range of security measures<br />Access controls<br />VPNs<br />Rogue detection tools<br />Chain only as strong as the weakest link<br />
  10. 10. Future proofing<br />New technologies<br />- LTE<br />- WiMax<br />Integrated vs siloed<br />Complementary vs competing<br />How are partners riding the wave of<br />development?<br />- strategic<br />- tactical<br />
  11. 11. Summary<br />Mobility strategy needs to be holistic<br />Proactive rather than reactive approach<br />Complementary not competing technologies – horses for courses<br />Knowledge and consideration of future wireless technologies essential – mapped onto current and evolving future needs<br />
  12. 12. Next Steps – Lets connect in person!!!<br />

×