Key Trends and Opportunities in Business Mobility and Enterprise Communications


Published on

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The smartphone revolution of the last three years has changed how mobile workers operate.
  • Consumers are adopting smartphones faster than just about tech product in history.Smartphones will exceed 420 million devices in 2011, nearly 28% of the global handset market.(IMS Research, than likely, these devices are already being brought into the workplace.New information technology is emerging first in the consumer market and then spreading into business organizations
  • A recent IDC survey found that 95% of respondents have used technology they purchased themselves for work. (“Consumerization of IT: 95% of Information Workers Use Self-Purchased Technology for Work” to Aberdeen data (from late 2010 and 2011 surveys), almost 75% of companies allow employee-owned smartphones and/or tablets to be used at work. 25% give employees a whitelist of allowed devices and almost half let employees bring in and use any device.(“75% of Enterprises Have 'Bring Your Own Device' Policies. What That Means”, via Simply Security Report: ‘BYOD’ is changing workplaces report from Strategy Analytics shows that 61% of U.S. corporation have found that their employees are already using tablets for work purposes(“Ready or not, iPad, other tablets are in the enterprise”,
  • It is clear that there is a disconnect between employees and employers about how consumer technologies are used in the enterprise.95% of employees use self-purchased technologies for work, 70% employers want to buy standardized technologies for them.
  • A consumer-oriented IT focus is more than just aiming to please the end user but rather, leveraging new technologies to improve employee productivity and reduce IT costs. Mobile professionals spend time away from their desk and require tools that will let them do their job: field sales, field service, production, consultants, managers. The question is how can IT create the right environment for them?Increased IT costs - One of the reasons IT might be unwilling to allow personal devices are the added support and maintenance costs due to increased complexity caused by more heterogeneous computing environments. In addition, there is the possibility to go overboard and try to compete with consumer products through the development of “consumer-oriented” services and applications.
  • End users and technology are pulling the organization one way and security needs, compliance are pulling the other way.
  • SecuritySensitive data – depends on the industry, for example retail, health care, finance may demand privacy and a higher level of security requirements than other industriesIndustry compliance – a complex legal and compliance environment require a higher level of security
  • Possible scenarios:Traditional approach (seal off corporate IT) = Low IT Security Risks, Low User Freedom / Consumerization, essentially banning the use of consumer-oriented IT and personal devices at work.Open environment = High IT Security Risks, High User Freedom / ConsumerizationThe opposite scenario would be opening the organization with a computing environment that is easily accessed and user-determined.Take no action = Ignore IT consumerization altogether. This has the potential to shift to High IT Security Risks as the end user will tend to move towards “BYOD” and eventually to “self configuration”Ideally, the organization should move toward high consumerization / low security risks, either through company owned or BYOD, providing high mobility to employees that can benefit from itAdditional scenarios:BYOD + corporate apps, BYOD + corporate desktop = Low IT Security Risks, High User Freedom
  • MagicQuadrant reference interviews revealed that consumerization is the No. 2 challenge they faced in2010; consumerizationwasn't in the top five last year. The advent of the iPad is the catalyzing factor, surveysshow that somewhere between 50% and 75% of desktop groups have received requests foriPad support.The iPad in the enterprise phenomenon has also driven users to request support for new handheld devices, such as the iPhone or the Android phone, leading enterprises to support a greater variety of devices. The primary mobile device management (MDM) concern is dataprotection. IT organizations want to ensure that user data is secure if the device is lost or stolen.Organizations are starting to treat smartphones (and now tablets) the same way they treat PCs.Systems Infrastructure SoftwareChange and Configuration Management Software (CCM)Secure Content and Threat Management (SCTM)Security and Vulnerability Management Software (SVM)Problem Management Software (PM)Application and User Session Virtualization (AV)Security Products and ServicesSecurity information and event management (SIEM)Proactive endpoint risk management (PERM )Forensics and incident investigation (FII)Policy and complianceSecurity systems and configuration management (SSCM)Device vulnerability assessment (VA), Application vulnerability assessment (VA )
  • The smartphone revolution of the last three years has changed how mobile workers operate.
  • The Evolution of Enterprise Mobility, Pyxis Mobile 2011Enterprises are leveraging mobility to improve operations and how they interact with customers, employees and suppliers
  • Key Trends and Opportunities in Business Mobility and Enterprise Communications

    1. 1. Key Trends and Opportunities in Business Mobility and Enterprise Communications<br />
    2. 2. 1<br /> Key Trends in 2011<br />Rise of Handheld Computers<br />BYOD “Bring Your Own Device”<br />The Consumerization of Enterprise IT<br /> Key Challenges for IT<br />Meeting User Expectations<br />Increased Support and Maintenance Costs<br />New Security and Compliance Risks<br /> The Options for IT<br />Factors to Consider<br />Approaches To Consumerization<br />Enterprise Mobilization Strategy<br /> Conclusions and Final Remarks<br />2<br />3<br />4<br />Agenda<br />
    3. 3. 1<br /> Key Trends in 2011<br />
    4. 4.
    5. 5. Three Key Trends In 2011<br />1<br />Smartphones and tablets are the new PC<br />Consumers are adopting smartphones faster than just about any other tech product in history.<br />2<br />Bring Your Own Device is changing how we work<br />Employees now expect to be able to use the smartphones and tablets they bought for personal use.<br />3<br />Consumer Technology is influencing the enterprise<br />Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.<br />
    6. 6. 75%<br />61%<br />95%<br />US corporations where employees use tablets for work purposes.<br />Strategy Analytics<br />via PCWorld<br />April 2011<br />Information Workers Using Self-purchased Technology For Work<br />IDC survey of IT Consumerization Trends<br />March 2011<br />Enterprises with 'Bring Your Own Device' policies<br />Aberdeen data<br />via ZDNet<br />March 2011<br />
    7. 7. “<br />Employers don’t know <br />how many or what consumer technologies are in use. <br />Workers report using consumer devices attwice the rateemployers reported.<br />Survey of IT Consumerization Trends<br />IDC, March 2011<br />
    8. 8. 2<br /> Key Challenges for IT<br />
    9. 9. Key Challenges For IT<br />1<br />Shift to a more consumer-oriented IT focus<br />IT needs to bridge the growing gap between employee and IT interests.<br />2<br />Consumerization can increase IT costs dramatically.<br />An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly.<br />3<br />New security and compliance risks<br />Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.<br />
    10. 10. “<br />IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.<br />
    11. 11. 3<br /> The Options for IT<br />
    12. 12. Factors To Consider<br />Security Requirements<br />Does the company work with sensitive data?<br />Is the company risk-averse?<br />Industry compliance and regulation<br />Mobility<br />Desktop Computer VS Mobile Devices<br />Can mobile applications help the company ’s employees, customers, and value and supply chain partners?<br />What functionalities does each user group need mobilized?<br />What device types, capabilities and hardware need to be enabled?<br />Company Culture<br />Tech-savy VS Tech-challenged<br />Flexible working culture that allows home office work<br />
    13. 13. Approaches To Consumerization<br />Companyowned<br />High<br />BYOD<br />Consumerization<br />Security Risks<br />High<br />Low<br />Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)<br />
    14. 14. “<br />The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service.<br />Magic Quadrant for PC Configuration Life Cycle Management Tools<br />Gartner, January 2011<br />
    15. 15. 4<br />Conclusions and Final Remarks<br />
    16. 16. Enterprise Mobility Initiatives<br />Support more smartphones, tablets, and other devices<br />Deploymobile applications<br />Establishmobility policies<br />Securedata from criminals, malware and other threats<br />Offerthe sort of technology experience users have come to expect from consumer technologies<br />
    17. 17. “<br />CIOs must get ahead of the curve by coming to <br />terms with what is valuable about consumerization.<br />Handled properly, it can<br />increase productivity and even lower IT costs.<br />Friendly Takeover: The Consumerization of Corporate IT<br />Booz & Company, 2010<br />
    18. 18. Thank You<br />Raul Castanon-Martinez<br /><br /><br /><br />
    19. 19. “<br />Companies that make<br />the shift to consumer-oriented<br />IT will see real benefits in the form of lower costs and happier, more productive employees. <br />Companies that don’tface a future in which employees will do it stealthily, leading to technological chaos and security issues.<br />Friendly Takeover: The Consumerization of Corporate IT<br />Booz & Company, 2010<br />