Endpoints stki summit 2012-shahar geiger maor

2,822 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,822
On SlideShare
0
From Embeds
0
Number of Embeds
1,566
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Endpoints stki summit 2012-shahar geiger maor

  1. 1. Endpoint Trends Tell me and I’ll forget STKI Summit 2012Show me and I may remember Shahar Geiger Maor,Involve me and I’ll understand VP & Senior Analyst
  2. 2. AgendaEndpoints Networking Security DC Cloud Post Voice MDM PC Video Cyber 2 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  3. 3. Presentation Visualization MDMNetworking Security ollaboration 3 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  4. 4. Endpointshttp://www.wired.com/wired/archive/14.07/images/found.jpg graphic Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of 4
  5. 5. Presentation Visualization MDMNetworking Security ollaboration 5 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  6. 6. Desktop-PCs are getting old…Say Hello to the Post-PC Era• No platform, form factor or technology will dominate.• BYOD will remain the norm.• Component prices continue downward trend.• Off-Desktop devices consume more of the digital experience• Employees will use many devices, syncing data between them via the cloud. 6 Source: Bent Objects Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  7. 7. 2012 game changers : • Consumerization of IT • Bring your own Device (BYOD) • Changing Client Architectures Tablet computers, smartphones, 4G, social media, gaming, desktop virtualization, and other technology innovations are bringing possibilities and challenges to IT and the workplace like never before 7Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  8. 8. Experience Economy > Age of the Customer• From 1900 to 1960, Age of Manufacturing , if you owned a factory, you owned the market.• From 1960 to 2000, Age of Distribution, if you owned the distribution channels, you owned the market.• From 2000 to 2011, Age of Information, if you owned the information, you owned the market.• From 2011, Age of the Customer, if you engage the customer, you own the market 8 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  9. 9. Why Mobile? Communication Telecom: fire, Mobile Phone Telephone –A basic need letters… Device• Population is spreading all • Starting to close the gap. • Large distances, real-time. • Always with me, cost over the world. Closer to the end-user effective, muti- purpose device, carrier-• Distance is becoming a • Short distances, no real- • Static side infrastructure, communication issue time Anywhere-to-anywhere connection and more… 9 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  10. 10. Mobile Outsourcing Social Trade Fun Tools Pics Gesture TouchCalendarMail Location Ⅱ Δ Voice Video Content Access Search 10 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  11. 11. Using Mobile Apps more then 10 times a day 11Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  12. 12. Using Mobile App to Make a Purchase/ for Client Service 12 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  13. 13. Decision Making in the Digital World Seeking Intelligence, Not Content - Real time60% of purchase decisions being made before theconsumer stepped into the store!!! 13 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  14. 14. Many clients are asking about how to: Set a solid Digital Customer Experience MDM craft mobile policies how to develop manage the devices mobile custom apps? Secure their select mobile devices mobile content 14Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  15. 15. Answers are right here Who is IT or Business? Digital Customer Experience IT higher involvement Owner in enterprisehow to developmobile custom apps? Native or Hybrid Apps select mobile devices People wants: Enterprises wants: 15 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  16. 16. What Do People Want ? 16Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  17. 17. Three OSs, Three Ecosystems? Source: IDC 17Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  18. 18. Internet vs. Mobile Data Traffic Global Internet Traffic Growth (Fixed)300%200%100% 0% 1997 1998 1999 2000 2001 2002 Global Mobile Data Traffic Growth200%150%100%50% 0% 2009 2010 2011 2012 2013 2014 (estimate) Source: Cisco VNI 2012 18 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  19. 19. Mobile Statistics – The number of active mobile broadband subscriptions worldwide in 2011. –The estimated number of mobile subscriptions worldwide in 2011. –Percentage of handsets shipped globally in 2011 that included a web browser. – Apple iPad’s share of global tablet web traffic in December.Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ 19Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  20. 20. Different Devices, Different Purpose Work Creation Change Flow Consumption Experience 20Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  21. 21. List of Tablet Use Cases How do you useplan to use your tablet? (Please select all that apply) Surfing the webWriting or reading mail Watching video listening to music social media sites Gaming 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Source: Yankee Group 21 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  22. 22. Bring Your Own Device Tablets occupy a middle ground where consumption and creation • Easier and more supportable of data has a wide range. • More flexible device capability BYOD needs to be a Virtualization consideration once interest enters this zone.BYOD Full Data Consumption and Creation ContinuumLight BYOC There are two potential paths that can be followed at this point. Integration • Full network- Light data consumption • Harder to support (e.g. local - Heavy data consumption- Minimal data creation rather than centralized apps) - Local data creation • Limited by device capabilities Final steps: - Full BYOD policy created by Past this line, infrastructure, all business groups. security, and operations - TCO calculation in pillars must be considered in conjunction with Finance. order to support advanced data creation. Source: Info-Tech Research Group 22 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  23. 23. BYOD Recommendations1 Measure success against overall objectives of a multi-device strategy. Having a multi-device IT service access strategy should contribute to lowering costs while increasing service regardless of who owns the devices. Given that, how does BYOD further those objectives?2 Consider impact on overall objectives when deciding between passive or aggressive approach. Bring Your Own policies can range from passive (we allow connection from personally-owned devices) to aggressive (we encourage and even subsidize bring your devices).3 Communicate policy requirements and roles and responsibilities for system support. Failure to meet success measures can be a result of communication failures as much as a failure of technical and operational capability.4 Maintain company-owned device options for flexibility and end-user service. Info-Tech sees that even in the case of an aggressive BYODprogram, allowing use of a company-owned device can mitigate a number of the potential pitfalls of BYOD.5 Document your policy position and rationale for the business. In dealing with your internal business customers’ demand for service, there is only one question (with two corollaries) that matters. Can you deliver this service? If yes, how? If no, why? Source: Info-Tech Research Group 23 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  24. 24. The Evolution of Trade Credit Lydian coinsMobile BarterPayment 24 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  25. 25. Mobile Payment That’s like almost Every Cow on the planet getting a smartphone 25Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  26. 26. 4 Types of Mobile Payment• The Mobile Wallet -Paying for things at a store with a mobile device using NFC or "tap and go“.• Every Smartphone is a cash register - Merchants using a mobile device to process credit cards payments.• The “Everything Else” mobile Payment -Consumers send money to merchants, or even each other (sometimes called p2p), using mobile devices (on-saleon-line).• ‘Put it on my bill’ -Consumers buying ringtones or games or digital content by putting the charges on their cellphone account. 26 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  27. 27. What’s In a Mobile Wallet?Secure Element (SE), which holds:One or more payment, mass transit, Mobile Phoneand/or offer applications RF ModemEach application emulates aparticular “card” in the wallet SIM Chip BasebandNear Field Communications (NFC) Processor Secure Elementchip • Payment Applications NFCTwo-way communication with the Controller • Transit Applicationpoint of sale • Offer ApplicationCompatible with existing contactless Proximity Antennapayment standardsThree options for hosting the SE:On the SIM chip (shown here)Elsewhere in the handset Point of SaleOn a MicroSD card Source: GSMA Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  28. 28. How Does It Work?– Encrypted credentials are supplied by the card issuing bank to a TSM Card Issuing– The TSM distributes the Bank Trusted credentials to the phone via Payment Service Network Manager the MNO (TSM)– Phones use NFC to present the credentials at the POS Mobile– Transaction proceeds as a Acquiring Bank Network Operator regular card payment (MNO) Point of Mobile Sale Phone Source: IDC Financial Insights 28 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  29. 29. Okay, So What’s the Catch?Lots of unresolved questions:– Who controls the secure element?– How much does it cost to rent space in the wallet?– Who gets to provide the offer application(s)?– What if the merchant doesn’t support contactless cards? 29 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  30. 30. The Digital Customer Expectation People’s opinions matter more than providers opinions Economy and more than in the past Brand Butlers Personalization & attitudes to privacy, ownership, piracy, color & language. Shift from transaction to interaction AlwaysOn Working Practices & Attitudes: Blurring of work and leisure, conflict between new and old attitudes GameOn Many-to-Many Communication -turning the mundane into “fun” Intelligent Knowledge for many regions, languages, currencies & Infosystems attitudes visualized in different waysDynamic Pricing Money, but no time –45 seconds/4 clicks is too long to wait. 30 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  31. 31. What Are The Expectations From a Mobilized World? 31 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  32. 32. Devices that end users prefer (new ?)Ultrabooks (NetNotebooks) will reach just over 15% of total consumer notebooks (IDC)1. Mainstream price must be very attractive2. Lower cost conventional notebooks slowing ultrabook adoption http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011 32 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  33. 33. Apple is Gaining Market Share in the Enterprise Source: Forrester 33 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  34. 34. 1/5 Of Global Info Workers Use Apple Products For Work http://blogs.forrester.com/frank_gillett 34 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  35. 35. “The endpoint not taken” 35Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  36. 36. Israeli Smartphone Market-share in 2011 Motorola Alcatel HTC RIM 5% 4% 1% 5% SamsungSony Ericsson 27% 7% LG 8% Nokia Apple 20% 23% Source: IDC 36 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  37. 37. Israeli Smartphone Market-share in 2011 Operating System Market Share Android 39.39% iOS 36.62% BlackBerry OS 9.48% Symbian 9.00% Other 5.52% Source: IDC 37Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  38. 38. Israel (expected end 2012):Wintel: Q42011 compared to Q42010Desktop PCs: -25% Notebooks: -35% 38 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  39. 39. What is the Current Endpoint-Devices Mix within your enterprise?under IT responsibility 1%8% more endpoints Tablets 7% Smartphones 13% Laptops Desktops 77% Source: STKI Feb. 2012 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  40. 40. What will be the Mix 12 Months from now? 6% Tablets 1.6% Notebooks Netbooks 20.5% Laptops Desktops 75% Source: STKI Sep. 2011Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  41. 41. Endpoint Contemplations1. DesktopsNotebooks are losing market share2. Desktops = price sensitive3. LaptopsTablets are gaining power4. A tablet (still) can’t replace a laptop5. “By 2015…?” No one really knows what’s going to happen… 41 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  42. 42. Market Data http://xkcd.com/688/ 42Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  43. 43. Israeli Endpoint Statistics1.08 • Number of endpoints per 1 employee 24 • Number of endpoints per 1 IT staff564 • Number of endpoints per 1 service desk staff748 • Number of endpoints per 1 PC staff (field technicians)3231 • Number of endpoints per 1 PC staff (image) 43 Source: STKIShahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  44. 44. Endpoint-Devices Mix (Abroad) Source: InformationWeek 44Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  45. 45. Who Will Be Using Tablets? (Israel) 3% Some of theall Employees 15% Mid-level directors 21% Pilot in one of the units 41% Specific functions (e.g. salesmarketing)44% CXOs Source: STKI, Sep. 2011 45 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  46. 46. Who Will Be Using Tablets? (Abroad) Source: Corporate Executive Board 46Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  47. 47. End-Point Operating Costs Source: InformationWeek 47Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  48. 48. End User Device Replacement Cycle Source: InformationWeek 48Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  49. 49. Desktop PCs- Israeli Market Positioning 1Q12 HP Lenovo Local Support Dell Player Ivory Worldwide Leader Acer Apple Market Presence 49Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  50. 50. Laptops- Israeli Market Positioning 1Q12 Lenovo Local Support Player Acer HP ASUS Dell Worldwide LG Leader Samsung Toshiba Fujitsu Apple Market Presence 50Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  51. 51. Tablets- Israeli Market Positioning 1Q12 Local Support Player Worldwide Leader Others… Apple Samsung Market Presence 51Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  52. 52. Thank You! Scan Me to Your Contacts… 52Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic

×