This new report on enterprise mobility applications highlights the alarming gap between Central IT and line-of-business IT environments. Millennials in particular are showing signs of growing frustration with the devices and software tools available to support them in the workplace. Many are making their own mobility arrangements, through ‘shadow IT’, despite growing regulatory risk. The advent of the ‘Internet of Things’ will further exacerbate the situation as mobile staff seek access to real time data from their phones and tablets.
Our recent survey of over 100 financial service organizations, conducted by Forbes Insights in the UK and North America, indicates that despite current business and employee demand, enterprise mobile applications remain at a very early stage of maturity, with less than a quarter of employees eligible to access such facilities. The implications here are profound, given the need to support mobile working with appropriate tools in every sphere of corporate activity today.
Many employees complain that the only advance over the last ten years has been to ‘mobilize the laptop’. This merely emulates the traditional desktop environment outside the office. Set against this stark background of underperformance in the mobility area, Central IT appears to be preoccupied with legacy issues such as costly infrastructures and aging systems. Our survey reveals that despite having developed policies and tools to address enterprise mobility, Central IT has little visibility of what is actually going on within the lines of business or at the end user level.
Nor does it have the necessary resources currently to respond rapidly to the growing pressures for workplace mobility. External agencies appear to be stepping in to fill this gap, frequently circumventing Central IT. Mobility remains low on the Central IT agenda.
The Future of Security in Australia: a Think Tank Report by BlackBerry. This white paper from BlackBerry, the mobile-native software and services company dedicated to securing the Enterprise of Things, features the analysis and thoughts from a 10-expert roundtable late last year looking at trends in cyber and mobile security.
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
The Internet of Things promises to provide a wide range of futuristic benefits, but what is often overlooked is how deeply IoT sensors and data analytics already impact how we live and how we conduct business. This is especially true of crisis communications. Here, IoT has far-reaching implications, both in the present and in the future.
This whitepaper explores how IoT sensors powerfully expand the capabilities of networked crisis communication solutions. It also discusses typical scenarios for incorporating IoT sensor data within emergency preparedness scenarios. Finally, it demonstrates why AtHoc is particularly well suited for using IoT data to deliver faster, more accurate situational awareness in an intuitive manner, without inundating employees with excess data or forcing emergency management staff to become data scientists.
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
BlackBerry secures, connects, and mobilizes the enterprise by connecting people, devices, processes, and systems to fully realize a secure “Enterprise of Things.” BlackBerry is no longer about the smartphone, but the smart in the phone and in cars and containers, medical devices and wearables, consumer appliances and industrial machinery, and ultimately the entire enterprise. BlackBerry software secures the Enterprise of Things.
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
451 Research report evaluates BlackBerry's turnaround from a device manufacturer into an enterprise software and security business under John Chen's leadership.
451 Research's conclusions include:
-- "Under CEO John Chen, BlackBerry has significantly improved its financial position and product focus."
-- "Almost every product in BlackBerry's bag of tricks directly or by extension is addressing the challenges of managing a diverse set of IoT devices."
-- "BlackBerry is very competitive in security, has a formidable leadership team, improving financials and some strong assets thoughtfully acquired, which in turn opens up new white space for it to attack."
-- "QNX is perhaps BlackBerry's most exciting IoT play because of its deployed footprint in embedded-computing markets and automotive. BlackBerry's strategy in connected cars is to aggressively expand beyond its deployed footprint in in-vehicle infotainment into adjacent areas like telematics, advanced driver assistance systems,
gateways and cockpit domain controllers."
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
The Future of Security in Australia: a Think Tank Report by BlackBerry. This white paper from BlackBerry, the mobile-native software and services company dedicated to securing the Enterprise of Things, features the analysis and thoughts from a 10-expert roundtable late last year looking at trends in cyber and mobile security.
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
The Internet of Things promises to provide a wide range of futuristic benefits, but what is often overlooked is how deeply IoT sensors and data analytics already impact how we live and how we conduct business. This is especially true of crisis communications. Here, IoT has far-reaching implications, both in the present and in the future.
This whitepaper explores how IoT sensors powerfully expand the capabilities of networked crisis communication solutions. It also discusses typical scenarios for incorporating IoT sensor data within emergency preparedness scenarios. Finally, it demonstrates why AtHoc is particularly well suited for using IoT data to deliver faster, more accurate situational awareness in an intuitive manner, without inundating employees with excess data or forcing emergency management staff to become data scientists.
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
BlackBerry secures, connects, and mobilizes the enterprise by connecting people, devices, processes, and systems to fully realize a secure “Enterprise of Things.” BlackBerry is no longer about the smartphone, but the smart in the phone and in cars and containers, medical devices and wearables, consumer appliances and industrial machinery, and ultimately the entire enterprise. BlackBerry software secures the Enterprise of Things.
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
451 Research report evaluates BlackBerry's turnaround from a device manufacturer into an enterprise software and security business under John Chen's leadership.
451 Research's conclusions include:
-- "Under CEO John Chen, BlackBerry has significantly improved its financial position and product focus."
-- "Almost every product in BlackBerry's bag of tricks directly or by extension is addressing the challenges of managing a diverse set of IoT devices."
-- "BlackBerry is very competitive in security, has a formidable leadership team, improving financials and some strong assets thoughtfully acquired, which in turn opens up new white space for it to attack."
-- "QNX is perhaps BlackBerry's most exciting IoT play because of its deployed footprint in embedded-computing markets and automotive. BlackBerry's strategy in connected cars is to aggressively expand beyond its deployed footprint in in-vehicle infotainment into adjacent areas like telematics, advanced driver assistance systems,
gateways and cockpit domain controllers."
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
Ten Technology Trends that Will Shape the Next-Generation InternetCisco Services
The 10 technology trends discussed in this paper (http://www.cisco.com/web/about/ac79/docs/sp/Next-Generation-of-the-Internet.pdf) will significantly alter the next generation of the Internet. Characterized as the New Digital Explosion, the future Internet will be considerably faster, smarter, more connected and pervasive, and more mobile. This new world will ignite life- and society-changing applications and services that may be unimaginable today. In the not-so-distant future, our children will be viewed as the “Internet dinosaurs.”
Don't forget to follow us on SlideShare!
If you are a service provider and would like to be contacted about how we can help your business, please fill out the form at the end of this presentation.
Building the Anytime, Anywhere Network -
Mobile technologies are opening enormous new
business opportunities. Capitalizing on them takes
a new approach to networking. To learn more, visit Juniper Networks at: http://juni.pr/CMlpCMPss
As we all know, 2020 has been a particularly unique year due to COVID. Some people are quarantined at home with loved ones. Others are alone. Some are even starting to go back to work depending on where they are in the world.
Technology has become more important than ever this year because it’s keeping people connected. Particularly during the holiday season, it’s important to find ways to see loved ones even if you can in person.
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
BlackBerry UEM delivers unified endpoint management and policy control for your diverse and growing fleet of devices and apps. With its single management console and trusted end-to-end security model, it provides the flexibility and security you need to keep your employees connected and protected.
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
An excerpt from magazine where Peplink, Citrix, Vodafone and Cisco voice their thoughts on BYOD, mobile and remote workers, and the devices that make it possible.
Download this BYOD economic analysis and more at http://cs.co/BYOD-Economics
Request a custom BYOD assessment: http://cs.co/BYOD-contactme
"Bring your own Device" (BYOD) sparks productivity and saves costs by connecting employee devices to corporate networks--an example of how the Internet of Everything is creating value around the world. But the current value is dwarfed by the potential gains from implementing BYOD more strategically.
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
BlackBerry and Google have worked together to enhance and simplify secure mobile productivity. The collaboration brings the leader in mobile security together with the world’s most popular mobility platform.
With enterprises rapidly embracing the Android platform to transform their workflows and processes through mobile innovation, Google has made a number of significant improvements in Android-specific security. These enhancements add to Google-provided security services, which are continuously updated to address both new and ongoing threats.
While security at the application and operating system level is critical, enterprises can go further by choosing the right mobility management platform. Building on Google’s security enhancements, BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to meet all enterprise use cases.
The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring compliance with corporate security guidelines. This paper describes how these developments work together to keep enterprise Android users productive and protected.
Identity - building trust in a digital worldConor Bronsdon
A Microsoft Services Whitepaper which I contributed to where we examine the topic of Identity in today's evolving digital threat landscape.
You can download the Whitepaper from Microsoft Services' here: http://download.microsoft.com/download/E/7/C/E7CECE45-1749-4C2F-AA91-0586DAEAF464/Identity_Building_Trust_in_a_Digital_World_eBook.pdf
Threats to industrial control systems are on the rise. This briefing explores potential threats and vulnerabilities as well as what organizations can do to guard against them.
Digitalization is the new buzzword, and digital solutions have become the platform for a new generation of Information Technology use cases, architectures and systems. Digital strategies and emerging digital technologies are the basis for disruptive IT innovations that will influence and guide enterprise planners and designers for many years to come. This white paper identifies and introduces the key framework technologies that will push us into the new digital era.
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...eraser Juan José Calderón
Covid-19 and IoT: Some Perspectives on the Use of
IoT Technologies in Preventing and Monitoring
COVID-19 Like Infectious Diseases & Lessons
Learned and Impact of Pandemic on IoT
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
11 things IT leaders need to know about the internet of things WGroup
The Internet of Things (IoT) is the next phase in the evolution of the Internet. More than 100 devices connect to the Internet every second. By 2020, Cisco estimates that number to be more than 250 per second. Morgan Stanley projects the Internet will be loaded with 75 billion devices by the end of the decade. This document discusses WGroup's perspective on what 11 things IT leaders need to know about IoT.
In this study I have tried to conduct a technology forecast for the mobile industry. In order to do this we have developed and followed a ten steps methodology as follows;
First we started by defining the industry and determining the exact sub industry definition. Second we studied the history of mobile phones with special focus on the important milestones to determine the important inflection technology events which took the technology to the second level, or helped in diffusing the technology, or created a new trend or resulted in a technology disruption. Third we gone through an industry analysis phases in which we studied the market growth rate, market share of different players, identifying leaders, followers. Followed by studying the market dynamics and main trends from both producers and consumers. Producers revenue pyramid, current and future strategies have been included. Fourth we composed the industry PEST analysis followed by industry overall analysis using porter five forces model. Fifth, a study for the major technological trends have been conducted, resulted in identifying main important industry trends. For each of the identified industry trend, we have identified the main technological challenges based on the consumer pull demand and the technology implication of each. Sixth, we constructed our technology future wheel based on all the previously mentioned types of analysis, resulted in identifying the main technology subcomponents. Seventh, we gone through a structural analysis followed by cross impact analysis for those subcomponents. Eights, a relevance tree for all those subcomponents including different technological alternative for each have been constructed. Followed by an analysis based on experts opinion about existing diffusion rate for each of those technology alternatives. Ninth, a road map for the forecasted technologies have been compiled, followed a wild card listing for alternative technologies which may exist in the near or far future, even technologies which in research and we believe that it is extremely wild have been included. Tenth, a conclusion of our forecasted short and terms technologies landscape have been composed and presented.
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
You might have heard plenty of jargons related to the internet, but the one that has become a buzzword recently and is broken into the mainstream as potentially the most significant term for the way we communicate, work and live in the near future is: The Internet of Things (IoT). Today, everyone is talking about the Internet of Things (IoT) from the newspaper to tech blogs. But what, exactly, is the IoT for beginners? Let’s find out. For more details visit: https://goo.gl/qT4LYA
The Internet of Things (IoT) is an umbrella term which covers a broad repertoire of sensors, applications, technologies, and use cases as they are enabled by the network of objects and devices with an IP address (Internet Protocol). Smart locks, smart cars, smart security system, smart thermostats, and smart health monitor are some of the examples of The Internet of Things (IoT) you’ve probably heard recently, and you’re going to hear more as the year progresses.
IBM Institute for Business Value - The Upwardly Mobile EnterpriseIBM Software India
Senior managers from hundreds of enterprises around the globe, in multiple industries, with a range of titles, were asked about their mobile strategies and current level of success. From this survey, only the top 14% were ranked as leaders. The complete IBM Institute for Business Value study will share with you the use of mobile by industry and highlight what the leaders have done to rise to the top.
Digital transformation-of-business-harvard-business-reviewJerry Chen
Business value of Strategy for enterprise organizations
A Harvard Business Review report - The Digital Transformation of Business – demonstrates how leading organizations are getting creative with cloud, mobile, social and big data. Understand how 537 enterprise executives are using megatrend technologies to drive transformational impact for their business, their customers and their employees.
Ten Technology Trends that Will Shape the Next-Generation InternetCisco Services
The 10 technology trends discussed in this paper (http://www.cisco.com/web/about/ac79/docs/sp/Next-Generation-of-the-Internet.pdf) will significantly alter the next generation of the Internet. Characterized as the New Digital Explosion, the future Internet will be considerably faster, smarter, more connected and pervasive, and more mobile. This new world will ignite life- and society-changing applications and services that may be unimaginable today. In the not-so-distant future, our children will be viewed as the “Internet dinosaurs.”
Don't forget to follow us on SlideShare!
If you are a service provider and would like to be contacted about how we can help your business, please fill out the form at the end of this presentation.
Building the Anytime, Anywhere Network -
Mobile technologies are opening enormous new
business opportunities. Capitalizing on them takes
a new approach to networking. To learn more, visit Juniper Networks at: http://juni.pr/CMlpCMPss
As we all know, 2020 has been a particularly unique year due to COVID. Some people are quarantined at home with loved ones. Others are alone. Some are even starting to go back to work depending on where they are in the world.
Technology has become more important than ever this year because it’s keeping people connected. Particularly during the holiday season, it’s important to find ways to see loved ones even if you can in person.
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
BlackBerry UEM delivers unified endpoint management and policy control for your diverse and growing fleet of devices and apps. With its single management console and trusted end-to-end security model, it provides the flexibility and security you need to keep your employees connected and protected.
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
An excerpt from magazine where Peplink, Citrix, Vodafone and Cisco voice their thoughts on BYOD, mobile and remote workers, and the devices that make it possible.
Download this BYOD economic analysis and more at http://cs.co/BYOD-Economics
Request a custom BYOD assessment: http://cs.co/BYOD-contactme
"Bring your own Device" (BYOD) sparks productivity and saves costs by connecting employee devices to corporate networks--an example of how the Internet of Everything is creating value around the world. But the current value is dwarfed by the potential gains from implementing BYOD more strategically.
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
BlackBerry and Google have worked together to enhance and simplify secure mobile productivity. The collaboration brings the leader in mobile security together with the world’s most popular mobility platform.
With enterprises rapidly embracing the Android platform to transform their workflows and processes through mobile innovation, Google has made a number of significant improvements in Android-specific security. These enhancements add to Google-provided security services, which are continuously updated to address both new and ongoing threats.
While security at the application and operating system level is critical, enterprises can go further by choosing the right mobility management platform. Building on Google’s security enhancements, BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to meet all enterprise use cases.
The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring compliance with corporate security guidelines. This paper describes how these developments work together to keep enterprise Android users productive and protected.
Identity - building trust in a digital worldConor Bronsdon
A Microsoft Services Whitepaper which I contributed to where we examine the topic of Identity in today's evolving digital threat landscape.
You can download the Whitepaper from Microsoft Services' here: http://download.microsoft.com/download/E/7/C/E7CECE45-1749-4C2F-AA91-0586DAEAF464/Identity_Building_Trust_in_a_Digital_World_eBook.pdf
Threats to industrial control systems are on the rise. This briefing explores potential threats and vulnerabilities as well as what organizations can do to guard against them.
Digitalization is the new buzzword, and digital solutions have become the platform for a new generation of Information Technology use cases, architectures and systems. Digital strategies and emerging digital technologies are the basis for disruptive IT innovations that will influence and guide enterprise planners and designers for many years to come. This white paper identifies and introduces the key framework technologies that will push us into the new digital era.
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...eraser Juan José Calderón
Covid-19 and IoT: Some Perspectives on the Use of
IoT Technologies in Preventing and Monitoring
COVID-19 Like Infectious Diseases & Lessons
Learned and Impact of Pandemic on IoT
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
11 things IT leaders need to know about the internet of things WGroup
The Internet of Things (IoT) is the next phase in the evolution of the Internet. More than 100 devices connect to the Internet every second. By 2020, Cisco estimates that number to be more than 250 per second. Morgan Stanley projects the Internet will be loaded with 75 billion devices by the end of the decade. This document discusses WGroup's perspective on what 11 things IT leaders need to know about IoT.
In this study I have tried to conduct a technology forecast for the mobile industry. In order to do this we have developed and followed a ten steps methodology as follows;
First we started by defining the industry and determining the exact sub industry definition. Second we studied the history of mobile phones with special focus on the important milestones to determine the important inflection technology events which took the technology to the second level, or helped in diffusing the technology, or created a new trend or resulted in a technology disruption. Third we gone through an industry analysis phases in which we studied the market growth rate, market share of different players, identifying leaders, followers. Followed by studying the market dynamics and main trends from both producers and consumers. Producers revenue pyramid, current and future strategies have been included. Fourth we composed the industry PEST analysis followed by industry overall analysis using porter five forces model. Fifth, a study for the major technological trends have been conducted, resulted in identifying main important industry trends. For each of the identified industry trend, we have identified the main technological challenges based on the consumer pull demand and the technology implication of each. Sixth, we constructed our technology future wheel based on all the previously mentioned types of analysis, resulted in identifying the main technology subcomponents. Seventh, we gone through a structural analysis followed by cross impact analysis for those subcomponents. Eights, a relevance tree for all those subcomponents including different technological alternative for each have been constructed. Followed by an analysis based on experts opinion about existing diffusion rate for each of those technology alternatives. Ninth, a road map for the forecasted technologies have been compiled, followed a wild card listing for alternative technologies which may exist in the near or far future, even technologies which in research and we believe that it is extremely wild have been included. Tenth, a conclusion of our forecasted short and terms technologies landscape have been composed and presented.
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
You might have heard plenty of jargons related to the internet, but the one that has become a buzzword recently and is broken into the mainstream as potentially the most significant term for the way we communicate, work and live in the near future is: The Internet of Things (IoT). Today, everyone is talking about the Internet of Things (IoT) from the newspaper to tech blogs. But what, exactly, is the IoT for beginners? Let’s find out. For more details visit: https://goo.gl/qT4LYA
The Internet of Things (IoT) is an umbrella term which covers a broad repertoire of sensors, applications, technologies, and use cases as they are enabled by the network of objects and devices with an IP address (Internet Protocol). Smart locks, smart cars, smart security system, smart thermostats, and smart health monitor are some of the examples of The Internet of Things (IoT) you’ve probably heard recently, and you’re going to hear more as the year progresses.
IBM Institute for Business Value - The Upwardly Mobile EnterpriseIBM Software India
Senior managers from hundreds of enterprises around the globe, in multiple industries, with a range of titles, were asked about their mobile strategies and current level of success. From this survey, only the top 14% were ranked as leaders. The complete IBM Institute for Business Value study will share with you the use of mobile by industry and highlight what the leaders have done to rise to the top.
Digital transformation-of-business-harvard-business-reviewJerry Chen
Business value of Strategy for enterprise organizations
A Harvard Business Review report - The Digital Transformation of Business – demonstrates how leading organizations are getting creative with cloud, mobile, social and big data. Understand how 537 enterprise executives are using megatrend technologies to drive transformational impact for their business, their customers and their employees.
Senior managers from hundreds of enterprises around the globe, in multiple industries, with a range of titles, were asked about their mobile strategies and current level of success. From this survey, only the top 14% were ranked as leaders. The complete IBM Institute for Business Value study will share with you the use of mobile by industry and highlight what the leaders have done to rise to the top.
The quest for digital skills is an Economist Intelligence Unit report, sponsored by Cognizant, on the supply and demand of digital skills across four industries: financial services, healthcare, retail and manufacturing.
Five Reasons why Digital Transformation is Essential for Business Growth.pdfMaveric Systems
Regardless of the response organizations chose for the slowdown, their future rebound can be rebooted through digital transformation. Here are five reasons – urgent and essential.
The GTO 2013 focuses on this confluence, which is transforming the way companies deliver millions of systems, software, and services to billions of users. While each technology driver is important when considered individually, this confluence is fueling four “mega-trends” with significant implications for enterprises.
Don't come last in a mobile first --WhitepaperAbhishek Sood
By 2020 mobile devices will outsell PC’s by a factor of 10.
Regardless of what mobility strategy your company has in place, or how you intend to execute it, the more mobile users, devices, applications and content your organization adopts, the more challenges you will have to deal with.
Download this white paper to discover how to overcome the most pressing mobility challenges including device security and management, app development, remote support, mobile data and analytics, and more.
IT that matters in the new machine age prioritizes cybersecurity, innovation, time-to-market and customers over cost-cutting, according to our latest study. Here’s what the future looks like for IT infrastructure, including our HEROES framework to guide you along the way.
Similar to Enterprise Mobility Applications: Addressing a Growing Gap (20)
File Sharing Use Cases in Financial ServicesBlackBerry
Financial services institutions need to meet high standards of security, particularly when collaborating with external partners, in order to comply with federal regulations and protect their customers. However, security protocols designed to protect sensitive information can actually hinder workplace productivity. This presentation demonstrates different ways that financial institutions were able to get back to business using BlackBerry Workspaces, the secure file sync & share solution.
Check it out - BlackBerry QNX is the only company to pop up in 4 categories of this infographic showcasing all of the autonomous vehicle companies in Ottawa, Canada! Learn more at OttawaAVCluster.com.
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
How many companies pushing the envelope on self-driving cars are based in the Kanata North Tech Park in Ottaway, Canada? And how many times does BlackBerry QNX and its Autonomous Vehicle Innovation Center (AVIC) show up? Learn more at OttawaAVCluster.com
In most industries, the enterprise market is bigger than the consumer market; the Internet of Things (IoT) is no exception. Spend in 2016 was valued at $737 billion, with most of that spend occurring among enterprises. This is why when it comes to “Things,” BlackBerry is focused on EoT – the Enterprise of Things. So today we have taken our unique quality and turned it into a market-leading strategy – securing the EoT.
BlackBerry is a security software and services company dedicated to securing the enterprise of things. The Enterprise of Things is the network of intelligent connections and end points within the enterprise that enable products to move from sketch to scale. BlackBerry's integrated security software helps companies manage and secure their mobile devices and connected things and secures communications for all messaging and file types – ultimately making them BlackBerry Secure.
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
BlackBerry is a mobile-native security software and services company dedicated to securing the Enterprise of Things. From Unified Endpoint Management to secure communications and collaboration, BlackBerry software provides the embedded intelligence to secure the Enterprise of Things so that the Internet of Things can thrive.
BlackBerry QNX technology touches our lives in many ways, from flipping a light switch, to seeing the doctor, to driving a car. Learn 35 surprising ways you encounter QNX technology in your daily live.
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
BlackBerry Work (formerly known as Good Work) is the best-in-class all-in-one enterprise productivity app that provides employees with integrated email, calendar, contacts, presence, document access, document editing, and more. With countless features such as contact photos and status, the ability to join meetings with one tap, full contact management and VIP notifications, and the ability to run presentations from mobile, you can be sure that every business process that can be done on desktop can now be done on the go.
Unlike consumer grade apps, BlackBerry Work is built for the business user. Designed to offer a consistent user experience across any device, it allows employees to communicate effectively from anywhere, whether it be at work, home, on the road—the possibilities are endless.
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
Organizations need to share files. In fact, over 50% of business processes, including some of the most critical, are document- based. However, most file sharing solutions have consumer-grade roots, and were not built with the security that enterprises need, balanced with the collaboration and mobility features their end users want. BlackBerry Workspaces™ makes enterprises more mobile and collaborative, while reducing the risk, complexity and cost of sharing information across and beyond your organization. Workspaces embeds digital rights management (DRM) protection in your files, so your content remains secure everywhere it goes. With Workspaces, you stay in control – even after files are shared outside your firewall.
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
Supporting outmoded technology for fragmented business processes can inevitably put any business at risk of becoming competitively irrelevant. This is especially true for enterprises in the fast-paced world of technology and manufacturing, where businesses are often globally dispersed and at risk of copycats in the black market. This is also an industry where the careful timing of product releases drives profitability. Staying on the leading-edge of technology adoption is critical to keeping up with the speedy execution and high expectations of the market.
Learn how BlackBerry Workspaces enables Technology & Manufacturing companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
BlackBerry® Workspaces allows enterprises to realize numerous business workflows to promote increased productivity and cost savings. The unique file-centric security approach allows controls and tracking to be built into documents. Now employees can safely access, share and collaborate on sensitive information on any endpoint with any user, reaping the benefits while reducing the risk associated with sharing across organizations.
BlackBerry Workspaces Mobile ApplicationsBlackBerry
Native mobile applications from BlackBerry Workspaces can enable smartphones and tablets to access sensitive corporate information, combining strong security, granular tracking and user-friendly mobile collaboration tools to realize work efficiency from anywhere on any device. Enterprises can now manage all of their corporate content through a “single pane of glass” or unified view for Enterprise File Sharing, Mobile Content Management and Collaboration.
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
In media and entertainment, timing is everything. Presenting the right information at the right time is often the key to success. Protecting creative assets, such as scripts and production plans, is just as important as sharing and collaborating on them — because leaks can have severe implications. The industry is in dire need for a better way to share information.
Learn how BlackBerry Workspaces enables Media & Entertainment companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
In healthcare, the efficient delivery of accurate information can save lives. Thus, the current technology trends of mobility and collaboration hold tremendous potential in improving administrative and patient care processes. Yet many hospitals still rely on paper-centric solutions, such as faxes and printers, that are expensive, labor intensive, and prone to data loss. Outdated technology drives up the cost of care and puts organizations at risk of violating industry regulations such as HIPAA and HITECH — potentially incurring exorbitant fines or jeopardizing reputation.
Learn how BlackBerry Workspaces enables Healthcare organizations to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
Government agencies face strict requirements to carefully manage and control sensitive information. However, this information often needs to be shared internally and externally (with other agencies, law enforcement and private sector). As agencies embrace mobility, new challenges emerge for providing information to any mobile device, computer or tablet, anywhere in the world. Users need the ability to work with and share fi les while mobile. Device-centric security fails to address data security requirements when information is accessed on unmanaged devices.
Learn how BlackBerry Workspaces enables Government agencies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
Energy and utilities companies derive significant competitive advantage and operational effectiveness from their resources and processes. Using outdated technologies, such as paper forms and faxes, makes them prone to accidental sharing and data leakage. Also, if the integrity of critical information, such as operational safety procedures, is tampered with, the safety and well-being of employees and reputation of the company are at stake. Careful coordination and consistent communication of such information with select business partners or mobile workers are essential to sustaining productivity.
Learn how BlackBerry Workspaces enables Energy and Utilities companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry
Introducing BlackBerry Workspaces to an enterprise workforce kick-starts secure collaboration and true mobile productivity. With powerful security controls centered on files, content that includes intellectual property or Personal Identifiable Information (PII) can now be accessed on BYOD mobile devices, or shared with external business partners without fear. The ability to control, revoke and track corporate files provides unprecedented Data Loss Prevention.
In addition to the protected distribution of sensitive files, Workspaces provides two additional pillars in the world of Data Loss Prevention. Learn about them in this data sheet.
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry
No enterprise security strategy or solution is complete without authentication. Managing and authorizing hundreds of user identities across disparate systems presents a formidable challenge for any IT organization. BlackBerry Workspaces recognizes that authentication and identity management should not be a deterrent to adopting critical new technology. We make it easy for enterprises to deploy Workspaces by providing self-provisioning methods out-of-the-box and by enabling integration with existing systems to align with current policies.
Organizations need to mobilize all their core business apps including collaboration, ISV, and custom-developed apps. However, the conflicting needs of IT, developers and business owners often slow mobile initiatives. A common app platform can speed mobilization by enabling each stakeholder to focus on what they do best.
BlackBerry Dynamics enables IT, developers and business owners to meet their diverse needs and requirements when it comes to mobility, allowing each to focus on its own domain without interfering with other stakeholders.
3. Table of
Contents
4 Executive Summary-
Addressing the growing enterprise mobility gap
7 How large is the enterprise mobility gap today?
14 How well is Central IT addressing the mobility gap?
18 New mobility methods and partnerships are needed
20 The benefits of mobility could be far reaching
22 Four steps to closing the enterprise mobility gap
4. This new report on enterprise
mobility applications highlights the
alarming gap between Central IT and
line-of-business IT environments.
Millennials in particular are showing
signs of growing frustration with the
devices and software tools available
to support them in the workplace.
Many are making their own mobility
arrangements, through ‘shadow IT’,
despite growing regulatory risk. The
advent of the ‘Internet of Things’ will
further exacerbate the situation as
mobile staff seek access to real time
data from their phones and tablets.
Our recent survey of over 100 financial
service organizations, conducted by
Forbes Insights in the UK and North
America, indicates that despite current
business and employee demand,
enterprise mobile applications remain
at a very early stage of maturity, with
less than a quarter of employees
eligible to access such facilities.
The implications here are profound,
given the need to support mobile
working with appropriate tools in every
sphere of corporate activity today.
Many employees complain that
the only advance over the last ten
years has been to ‘mobilize the
laptop’. This merely emulates the
traditional desktop environment
outside the office.
Set against this stark background
of underperformance in the mobility
area, Central IT appears to be
preoccupied with legacy issues such
as costly infrastructures and aging
systems. Our survey reveals that
despite having developed policies and
tools to address enterprise mobility,
Central IT has little visibility of what is
actually going on within the lines of
business or at the end user level.
Nor does it have the necessary
resources currently to respond
rapidly to the growing pressures
for workplace mobility. External
agencies appear to be stepping in to
fill this gap, frequently circumventing
Central IT. Mobility remains low on
the Central IT agenda.
Executive Summary
Addressing the growing enterprise mobility gap
4 Executive Summary
5. Our discussions with leading CIOs
reveal that there is a clear road map
towards achieving genuine enterprise
mobility. This includes:
• Integrating mobile applications into
the current programs to escape IT
legacy, including both system and
infrastructure upgrades
• Adopting standard APIs
between internal systems,
external cloud services and
enterprise mobile applications
to increase transparency
• Developing effective governance
policies that reflect the growing
need for organizational flexibility,
especially with the lines of business
• Engaging a qualified eco-system
of internal and external
partners who will comply
with governance policies
Such a road map can deliver a wide
range of business benefits over the
next three to five years, including
improved employee engagement,
revenue growth and central
efficiencies. Mobility needs to
be placed within the top three
strategic IT issues to deliver
such universal benefits.
Our survey reveals that despite having
developed policies and tools to address
enterprise mobility, Central IT has little visibility
of what is actually going on within the lines of
business or at the end user level.
6. 6 How large is the enterprise mobility gap today
7. Within the tight regulatory environment
of this sector, the historic range of
such applications remains severely
limited as do the devices that they are
deployed on. This is in sharp contrast
to the rapid development of mobile
applications within personal and social
domains such as Dropbox, Facebook,
LinkedIn and WhatsApp, all of which
can be accessed from
any tablet or smartphone.
The benefits of mobility have been
well established in previous research
conducted by BlackBerry (reference
‘IT Consumerization: The Dawn of
a New Era’, 2012). These include
improved connectivity between
members of staff and external
organizations through a range
of multi-media applications such
as Lync, Skype and Bloomberg;
increased productivity through access
to functional tools such as expense
reporting, financial management
and CRM; and deeper collaboration
involving exchange of documents
and interactions between relevant
expert and social groups. However,
those organizations surveyed
appeared to be slow in realizing
such benefits amongst an
increasingly mobile workforce.
The enormous disparity between
corporate and public mobility is
causing tension between employees,
such as the Millennials, who show
serious signs of frustration, the
lines of business who are pursuing
their own IT investments, especially
around cloud based applications, and
Central IT that is pre-occupied with
the renewal of legacy infrastructures
and applications. Such tensions are
leading to local mobile initiatives and
‘work arounds’ that are likely to cause
major commercial and operational
risks for the future – what an insurance
CIO referred to as ‘the blight of gray or
shadow IT’.
To understand how the current
situation can be resolved, our survey
has examined why enterprise mobile
applications are now so critical to
businesses, what the issues are about
deploying such applications to the
relevant segment of employees, when
organizations expect to achieve such
deployment, and how they are tackling
some of the obstacles to adoption
that appear prevalent within today’s
Central IT organizations.
Here are the results of the online
survey of 100 UK and US financial
services companies and some ten
face to face interviews with CIOs.
How large is the enterprise
mobility gap today?
According to a senior executive survey of over one hundred leading
financial services companies in the UK and North America in 2016,
enterprise mobile applications are now reaching a critical stage in their
adoption life cycle.
8. Three current factors influence
the trend towards enterprise
mobility. The first is the nature of
the workplace itself and how the
physical environment is changing
rapidly to respond to the need for
organizational agility and flexibility
including such items as hot desking.
The second is the workforce who
now includes a significant proportion
(some 25%) of young, mobile
professionals (Millennials). The third
is the consumerization of IT itself that
enables billions of people and devices
to interconnect and exploit a torrent
of new applications. We also detect a
fourth factor that is as yet in its infancy
and that is the imminent explosion of
the Internet of Things that will connect
people with their environment (homes,
offices, cars and other objects).
Against these positive factors,
take-up of mobile applications
within the enterprise appears to be
disproportionately slow across the
sector. Our survey suggests that only
40% of financial service organizations
have achieved even a 25% penetration
rate of mobile applications amongst
their workforce. This figure is expected
to grow to 58% by 2020, with one
third of the organizations expecting
the majority of the workforce to be
using mobile applications at this
point. The main reasons for such slow
adoption include tight regulatory and
compliance conditions that apply in
the financial sector, and associated
preoccupation with security and data
protection issues.
The survey pointed to three specific
drivers of enterprise mobility that
are relevant to financial services.
Increased employee productivity
was the most significant, with
respondents pointing to areas such
as better use of travel time to
complete administrative tasks.
The second was increased
profitability, with particular reference
to more effective sales and marketing
techniques. The third was improved
collaboration with clients, especially
in the retail and wealth management
areas of banking.
‘Millennials’ and ‘IoT’ will accelerate the
case for enterprise mobility
Figure 1 – percentage of employees using mobile apps, 2016 to 2020
Firms with more than
25% of employees
using mobile apps
58%40%
2016 2020
8 How large is the enterprise mobility gap today
9. This supports our earlier research
(IT Consumerization: The Dawn of a
New Era) that illustrated a three stage
progression along the mobility path,
driven by specific business benefits:
• Connectivity between staff and
external parties such as email,
audio and visual conferencing and
instant messaging. Multi-media
connectivity is a key driving force
that encourages richer and more
intensive communication
• Productivity tools that enable
employees to access functional
applications such as CRM,
Finance and HR away from the
office. A particular need here is
to enter expenses by capturing
receipts directly from a smartphone
• Collaboration tools that increasingly
involve social networking as well
as the sharing of documents and
relevant data across multiple
parties, including external clients.
Business executives believe
that this delivers the highest
productivity gains.
Speaking with CIOs across the entire
financial services sector, the majority
now recognize that IT services
should become more responsive
to their internal customers, i.e. lines
of business and employees. The
device (personal computer, tablet and
smartphone) and the services that are
available here represent the shop-
window of the IT department.
Given the constraints on cost
and resource, such CIOs are now
segmenting their audiences to tailor
IT services to fit the needs of different
categories of user. In the case of
mobility, some 25-30% of employees
today require round-the-clock access
to corporate IT services through a
range of mobile devices.
Figure 2 – drivers that encourage mobile app adoption
39%
36% 35%
30% 30%
Increased employee productivity
Increased profitability
Enabling better collaboration
with clients
Increased sales
Need to replace / better
manage shadow technology
used by employees
10. Against all the factors that encourage
adoption, business and IT executives
interviewed through the survey
recognize a number of risks
associated with enterprise mobility.
High on the list here are security,
and compliance with regulatory
standards. Regulation within the
financial sector has increased
dramatically since 2008. Other
important risks include employee
attrition and employee productivity.
Discussions with employees of
professional service firms and
investment banks illustrate the high
levels of frustration with current mobile
devices and software applications.
Many remark that enterprise mobility
today is the ‘anywhere’ laptop – a pure
replication of the desktop environment
in the mobility space. This might be
okay for the baby boomers but has
little relevance for the Millennials!
Enterprise mobility remains constrained
by regulatory pressures
Figure 3 – risks associated with enterprise mobility
62%
43%
34% 30%
25%
Risk management and compliance
Security compromized due
to shadow technology
Inadequate collaboration with external
parties (e.g., contractors, agencies)
Employee attrition
Lower efficiency
10 How large is the enterprise mobility gap today
11. Despite the visible gap between public
and enterprise mobility adoption, the
survey suggests that considerable
progress has been made already
within the enterprise in specific areas,
and that mobile developments are
likely to accelerate within the next
four years (up to 2020).
Technology and IT operations are
currently the most advanced functions
in leading with enterprise mobility
applications, with 82% registering
adoption, followed by 64% for the
marketing community and 53% for
sales and customer service. The latter
reflects the strong interest taken by
lines of business in using mobility to
promote revenue growth.
Functions such as HR, legal and
compliance and product development
appear to be least advanced, with only
39% of HR organizations registering
adoption and 18% of compliance
departments. However, all functions
are likely to exceed the 66% adoption
mark by 2020 as roll-out begins
to accelerate. This illustrates that
companies are beginning to place
more emphasis on enterprise mobility
as user pressure continues to build.
This illustrates that companies are
beginning to place more emphasis
on enterprise mobility as user
pressure continues to build.
There are, however, some interesting
counter trends. Whereas in the early
days of smartphone adoption (pre-
2010) many members of staff including
those who were essentially office
bound such as personal assistants,
were given smartphones and access
to costly services such as Bloomberg.
IT organizations now recognize that
such ‘largess’ was inappropriate,
and are reducing the population of
mobile users by some 10-15%.
This accords well with our observation
that IT services are being more
carefully tailored to the needs of
each individual.
For example, in the case of a leading
financial news agency, IT recognized
that the needs of a front line reporter
in a war zone such as Syria or
Iraq would be very different to
administrative staff located in the
London head office. In such a situation
IT defined six different categories of
information worker, each having a
specific set of devices and application
services. Only two such categories
included multi-media mobile
connection (e.g. field reporters
and technical support staff).
Enterprise mobility take-up varies widely
between functions
12. Senior executive attitudes towards
enterprise mobile apps are also
changing. Currently our survey
suggests that 57% of IT leaders say
that internal mobility is a component
of their IT strategy. Only 44% have
placed mobility as a key component
of their business strategy.
Exploring this further in face to face
interviews, CIOs readily admit that
certain segments of their employee
base are reaching a crisis of
confidence with central IT relating to
their restricted use of mobile devices
and applications. In some cases, this
is causing a fundamental reappraisal
of such facilities, placing mobility at
the top of the IT agenda. Central IT
recognizes that it must take dramatic
steps to improve its ‘shop window’
to retain the loyalty and respect of its
employees. Mobility is key to such
service improvements.
One senior investment banking
executive stated that it was easier
to locate a fellow member of staff
through a public Google search
than by accessing the mobile
staff directory.
At the business level, a small sample
of top executives in banks and
insurance companies recognize the
true value of internal mobility, these
executives are key to accelerating
mobile transformation.
One insurance CEO stated that the
introduction of mobile devices that
could access board documents
‘actually changed my life’.
Enterprise mobility appears far
down the list of strategic IT issues
Figure 4 – view of mobility as a strategic asset
IT views internal mobility
as a strategic asset
Fully agree
100%
Business unit leaders view internal
mobility as a strategic asset
Top management views internal
mobility as a strategic asset
Employees view internal
mobility as a must-have
18% 15%
25%
16%
12 How large is the enterprise mobility gap today
13.
14. The survey identified a number of
challenges, ranging from a lack of
visibility of what is actually happening
within enterprise mobility across large
organizations and the associated loss
of control by Central IT, through to
the growing occurrence of ‘gray or
shadow IT’ amongst employees and
lines of business.
Despite the growing importance
of enterprise mobility to certain
segments of the user community,
Central IT admits to having limited
visibility of such applications.
Our survey suggests that only
18% of central IT groups have
visibility of mobility usage and
security arrangements across their
organizations. A further 25% have
partial visibility. There is a close
correlation here between enterprise
mobility and cloud adoption, the latter
also being relatively invisible to many
central IT organizations.
Lack of visibility suggests that
governance of this critical IT activity is
not as tight as it should be. Although
governance policy appears to be
relatively mature, as demonstrated
by 57% of the survey population,
its adoption within lines of business
is less apparent. Key areas of
governance include security and
identity management. A deeper dive
reveals that IT organizations are also
struggling with user experience (50%)
and business integration (47%).
The survey reveals that governance
of enterprise mobile apps can
take a number of different forms,
ranging from central control, through
central policy guidelines, to a fully
decentralized approach that puts
all the power in the hands of the
lines of business. More than half of
the companies surveyed have been
able to retain central influence over
enterprise apps, implying that a third
have lost control.
The implication here is that
fragmentation of applications and
supporting platforms could be a
growing risk for many large and
diverse organizations, especially in
the new era of cloud based business
services that are bought directly by
lines of business.
How well is Central IT
addressing the mobility gap?
Figure 5 – central visibility of enterprise mobility applications
13%
4%
14%
8%
4%
Applications that are being used
Full visibility
Adoption rates
Devices that are being used
Applications that are being developed
Policies and standards that govern
internal mobile applications
Security of usage of internal
mobile applications
Business functions/cases for
the applications being used
25%
18%
14 How well is Central IT addressing the mobility gap
15. Partial or complete loss of control
indicates that Central IT does not
in many cases respond quickly
enough to the demands of the lines
of business and their end users.
An urgent response is required to
regain lost ground here. In today’s
environment, lines of business are
pushing ahead rapidly with their own
IT investments, which according to
Gartner represent the majority (70%)
of new IT spend. The advent of cloud
based applications, such as CRM
(Salesforce), HR (Workday), Expenses
(CONCUR) and management
information (TABLEAU), are providing
employees with direct access to
services via tablets and smartphones.
Many such applications circumvent
central visibility or control.
A further contributing factor is the
growing incidence of ‘shadow IT’
where employees use their personal
devices to access public cloud
services such as YouTube, Facebook,
WhatsApp and Dropbox. Such
employees, especially the Millennials,
are driven by convenience. The
majority of organizations interviewed
continue to offer a locked-down
corporate device such as a BlackBerry
smartphone, whilst at the same time
supporting enterprise applications
on Android and Apple platforms
(e.g. iPhone and Samsung Galaxy)
using containers such as Good
Technology. However, a multiplicity
of private and corporate devices
encourages employees to plug and
play applications to suit their own
circumstances rather than those of
their employer.
Central IT needs to respond now
to regain control over mobility
Figure 6 – Governance is not managed uniformly across organizations
29%
27%
21%
13%
10%
Governance is managed effectively / uniformly
through central channels such as IT Services
Governance based on guidelines from central IT,
but carried out by line-of-business IT
Governance is managed effectively / uniformly
at the local level through line-of-business IT
Governance is not managed uniformly across
our organization / no uniform set of policies
We do not have a governance management
system for business process mobility
16. According to the survey and face to
face interviews, there are a number
of reasons why enterprise mobility
has lagged well behind business and
employee expectations over the last
five years. These include:
• Legacy platforms and applications
– in 50% or more cases these do
not lend themselves to a mobile
environment, especially large scale
transaction engines and ERP
systems that were installed some
20-30 years ago
• Insufficient governance – nearly
one quarter of respondents to
the survey admitted that they
lacked any form of governance.
Just 29% said that governance is
managed effectively and uniformly
through Central IT channel or
line of business
• Business partnerships – Central
IT has taken the initiative for
mobile strategy origination
and implementation in 77% of
respondent organizations. In only
43% of cases did the lines of
business contribute to strategy,
and only half acted as champions
for implementation.
• Resourcing – most CIOs admit that
resourcing of mobile developments
is insufficient to meet today’s
needs at the employee and line of
business levels. However, over half
are planning to increase central
resources in the coming two years.
Associated investment in mobility is
expected to increase in some 33%
of companies surveyed.
A further challenge to be addressed
here is the desire by business
executives and employees to
adopt a ‘bring your own (BYO)’
everything. Only a third of survey
respondents were satisfied with
internal BYO policies.
The speed at which new consumer
devices are entering the market
(6-12 months) is entirely out of
step with enterprise depreciation
cycles (3-5 years). This continues to
create tensions between users and
Central IT services.
Several factors continue to
impede enterprise mobility
16 How well is Central IT addressing the mobility gap
17. Perhaps the greatest challenge
currently for Central IT is the
preoccupation with legacy upgrades
and renewals – both infrastructure
and applications. A recent survey by
the University of Surrey (Escaping
Legacy: Removing the Roadblock
to a Digital Future, 2016) suggests
that between 45 and 50% of all such
corporate IT assets are in need of
urgent modernization.
Most IT organizations have focused
initially on upgrading infrastructure
to take advantage of public cloud
services such as AZURE and AWS.
Efforts are now being made to replace
core application systems. Only when
such programs are completed in say
three to five years will it be possible to
effectively mobilize such applications.
The CEO of an investment bank commented
that ‘Central IT seem to have entered a world
of their own. They seem out of touch with the
fast changing needs of my business’
Our survey reveals that only one third
of Central IT organizations have been
able to integrate enterprise mobile
applications with core transaction and
back-office (ERP) systems. Equally
just 39% report that their mobile
applications are fully or partially
integrated with external services
such as cloud.
However, over 51% of financial service
organizations have been successful in
integrating a range of mobile devices
and related operating systems into
their internal infrastructures (e.g. iOS,
Android and BlackBerry).
Lastly, some 46% of senior IT
executives admit that current
business processes and associated
methodologies are a key challenge
to implementing enterprise mobility.
A further 31% say that speed of
implementing such applications is a
critical impediment, and 30% believe
that regulation and compliance is
holding back adoption. Altogether,
CIOs remain skeptical about their
capacity to respond quickly to the
demand of their business customers.
Substantial changes will be required
if IT is to meet the latent demand
for such mobility services – albeit
within a relatively small segment of
the user population.
Legacy remains the
‘elephant in the room’
18. With the pressure increasing on
Central IT for a wider range of
enterprise mobile apps in the coming
years, organizations appear to be
engaging with a range of external
partners, from consultants and
software houses to digital agencies.
Consultants in particular are helping
to champion mobile apps at the
local business level. However, such
external parties often appear to be
willing to circumvent Central IT in order
to generate sales from the lines of
business. This adds to the governance
difficulties mentioned earlier.
A whole new software industry
has grown up in the last five years,
focused on enterprise applications.
Leaders such as Tigerspike offer
hundreds of off-the-shelf packages
to fill the emerging private apps
stores that corporations are adopting.
Overall, lines of business have an easy
choice to by-pass Central IT in this
fast evolving area of technology.
New mobility methods and
partnerships are needed
Figure 7 – who is championing mobile applications
Consulting Firms
Local IT teams in the
line-of-business
#1
#2
System integrators#3
Central IT services
Business unit leaders
#4
#5
External digital agencies#6
18 New mobility methods and partnerships are needed
19. 60%
31%
9%
Ranking
A mix of waterfall and agile /
Internal Mobile Solutions
Mostly agile / Internal Mobile Solutions
Mostly waterfall / Internal Mobile Solutions
Responding to growing demand
for enterprise mobility, Central IT
has adopted a mix of approaches
to sourcing new apps. The
majority of firms surveyed (56%)
use a combination of off-the-shelf
and custom built approaches to
applications development.
However, this varies widely between
organizations, with one leading
bank indicating that out of 33 mobile
applications only one was built
internally. Most organizations surveyed
use a mix of internal and external
resources, with an emphasis on
system integrators.
Development methods also vary
between agile (31%) and waterfall
(60%). In one extreme case we found
that a bank had employed a team of
over 60 people to develop a mobile
app during a two-year period. In
comparison, an Eastern European
start-up had developed a similar
application with five people in just
six months.
The deployment and tooling of
mobility resources also appears
to be a challenge for many of the
survey respondents.
Whilst the large majority have
centralized mobile applications
development, only half the companies
surveyed have established a center
of excellence for mobility. One CIO
admitted that this had become a ‘part
time’ job amongst the many other
pressing IT issues associated with
infrastructure. Again, this echoes
the likely lack of mobility governance
prevailing today in most businesses.
A common approach to mobility is to
adopt a private apps store within the
enterprise with stringent conditions
attached to conditions of entry. Such
a philosophy was piloted successfully
by Apple and has been emulated by
Android vendors. This approach could
help to reinforce central deployment
and management of applications.
Central IT is turning to agile methods and off the shelf
packages to address the growing mobility gap
Figure 8 – approaches to applications development
20. The benefits of enterprise mobile
applications appear to be spread
equally across employees, lines of
business and central functions:
• Employees – the survey indicates
that mobility helps improve
productivity and efficiency in
over 50% of respondents. It also
contributes directly to employee
engagement in 42% of cases.
IT Services frequently ranks in
the lower quartile of employee
satisfaction surveys, and has
come under the spot light of
several HR departments
• Lines of business – 27% of
respondents indicate that mobility
is now an integral component to
successful sales and marketing
campaigns. This increases to 39%
by 2020. Customer service is also
a strong beneficiary of mobility with
the current score of 36% increasing
to 44% by 2020.
• Central functions – according to the
survey the most successful user
of mobility applications to date has
been technology and operations
(63% of respondents). Legal and
compliance currently appears at
the other end of the range at 19%.
Other functions such as finance,
HR and CRM fall into a mid-range
category (45-50%).
One of the main issues reported
by CIOs is the lack of a tangible
business case for enterprise mobile
applications. Nearly half (47%) of the
companies surveyed plan to place
more emphasis on measuring the
return on investment (RoI) of current
applications to demonstrate a positive
business case. Such benefits are
likely to be associated with the
modernization of infrastructure
and legacy applications which will
materialize over the coming 2-3
years as well as through tighter
partnerships between the Centre
and lines of business.
The benefits of mobility
could be far reaching
Figure 9 - which functions benefit most from enterprise mobility
47% 46%
38%
36%
26% 25%
19%
Sales representatives / CRO
Marketing / CMO
Human resource / CHRO
Customer service / relationship officers
Product development
Finance
Legal / compliance
20 The benefits of mobility could be far reaching
21.
22. Every indication from the recent
market survey suggests that the gap
between current provision and future
demand is widening and needs to be
addressed as a high level priority by
both Central IT and lines of business.
This may also require a closer
partnership with external parties
to increase access to resources.
The constraints to be overcome are a
combination of technical issues such
as removing legacy and exploiting
modern development methods,
and business issues such as
tighter governance, strategic
alignment, investment levels and
improved collaboration.
Four steps to closing the
enterprise mobility gap
Placing mobility as a core element of any
legacy modernization program at the
systems and infrastructure levels.
This will include support for multiple end
devices (PC, Tablet and Smartphone) and
mobility operating systems (iOS, Android
and BlackBerry), as well as IT support.
Standard API interfaces will be needed to
integrate mobile applications with internal
systems such as ERP, and external cloud
services such as Salesforce and Workday.
1. PLATFORM MODERNIZATION 2. APPROPRIATE API INTERFACES
22 Four steps to closing the enterprise mobility gap
23. By adopting this four-point plan,
businesses and employees will be
able to enjoy the full benefits of a
comprehensive mobile environment.
This should help to eliminate ‘gray
or shadow’ IT activities amongst
employees, and support growth
plans within the lines of business.
However, CIOs should become more
focused on which communities to
focus their mobility efforts on. Not all
members of staff would benefit from
such applications.
Our survey suggests that no more
than a third of employees should be
priority targets for such services.
Such a tailored approach should help
deploy financial and human resources
where returns are highest and
satisfaction most easily achieved.
Establishing a consistent governance
framework for mobility across Central IT
and lines of business that introduces
the necessary levels of compliance
relating to information security without
limiting commercial options. Such
governance should recognize the
need for organizational flexibility.
Such vendors should be prepared to
work within the prevailing governance
framework by adopting the chosen
development methods and procedures.
A central applications development
factory approach may help to streamline
the production process.
3. EFFECTIVE GOVERNANCE
4. ECO-SYSTEM OF QUALIFIED
DEVELOPERS