SlideShare a Scribd company logo
1 of 24
Enterprise
Mobility in
the Cloud
Dipesh Mukerji
Sr. Director
Product Strategy &
Marketing
66%
<3yrs
Tablet shipments
surpassed notebook
and PC shipments in
within three years
of introduction.
Mary Meeker,
Internet Trend 2013

of employees use at least two devices for work.
Forrsights Workforce Employee Survey, Q1 2012

20%

of all internet traffic in 2013
will be mobile.
Mary Meeker, Internet Trend 2013

4:1

150 68%

Mobile app
development projects
will out number PC
development projects
4:1 in the next 3 years.
Gartner August 2013

mobile users reach for phone 150 times per day.
Mary Meeker, Internet Trend 2013

of US/EMEA employees choose
their own tablet and smart
phone for work.
Forrsights Workforce Employee Survey, Q1 2012
Update

Connect

Interact

Enable

Today, the rapid pace of change is driving new
behaviors and increasing our expectations of our
employers and those companies we do business with.
Update

Connect

Interact

Enable
Mobility Revolution
Our World Today
11:00 AM – iPad

1:00 PM – Desktop

While visiting
customer, inputs new data
on iPad

Completes review, approval
inside corporate firewall
pre PC mouse interface app

3:00 PM – Tablet

9:00 AM – Mobile Web
Outside firewall at
work, quickly accesses app
via Mobile Web

Requests new services on
Windows 8 tablet - touch
device inside the office

8:00 AM – Blackberry

6:00 PM – Android

User wakes up and checks
a notification on Blackberry
device.

Reviews and approves
changes at home via
Android phone.

Consistent view and experience in every interaction
Social & Collaboration
Experience
First

Insight &
Analytics

AGILITY
CONTROL
Core Line of
Business

Security /
Governance

Consolidation
Social & Collaboration
Experience
First

Insight &
Analytics

AGILITY

Next-Gen Experience
Platform
CONTROL

Core Line of
Business

Security /
Governance

Consolidation
“

LINE OF BUSINESS

I want to access our data
anywhere and everywhere.”

“

I want to develop for
multi-channel, but it’s
hard and expensive.”

DEVELOPERS

“

I need an easier
way to manage all
this new stuff…”

IT SECURITY
Apps have rigid and fixed
points of interaction

Apps are designed
mobile-last

Brute force app
management

Channel specific
development is
costly and isolated

MDM, MAM, MC
M are siloed
solutions from
different vendors
Messy dev
lifecycles
User-First Experiences
Multi-Channel SaaS Apps

Next-Gen Experience
Platform

Multi-channel
Application Development

Edge-optimized
Management & Security
Will the Enterprise keep up with the market?
• Consumer consumption will drive enterprise adoption of

new channels
• Security/Accessibility capabilities will be at a premium in

determining enterprise adoption
• Easy and fast development platforms, tools and

communities will drive growth
• Must seamlessly integrate with existing products
• Must have the best yet different user experience

= MUST BE ON THE CLOUD!
Why Cloud?
• 10 year cycle of market refresh from a

web-centric to a mobile-centric environment
• Rapid market adoption SaaS and cloud solutions

• Convergence of cloud & mobile (Kony,

New Relic, Appcelerator, PhoneGap, and Sencha)
• Need anytime anywhere access
• Reduce operational costs
• Availability, Scalability, Reliability, Flexibility
There are 3 basic Cloud Service Models - SaaS

SaaS

App1

App2

App3

PaaS

Integration and Middleware

IaaS

Infrastructure (Hardware, Network, Storage)

Software as service.
Software, applications, and
data are hosted in “the cloud’
by a 3rd party. Typically access
via a web browser.
There are 3 basic Cloud Service Models - PaaS

SaaS

App1

App2

App3

PaaS

Integration and Middleware

IaaS

Infrastructure (Hardware, Network, Storage)

Platform as service.
A service that allows you to
build, deploy, and host
applications in “the cloud’
by a 3rd party.
There are 3 basic Cloud Service Models - IaaS

SaaS

App1

App2

App3

PaaS

Integration and Middleware

IaaS

Infrastructure (Hardware, Network, Storage)

Infrastructure as service.
A service that allows you to
utilize IT
hardware, network, and/or
storage in “the cloud’ by a
3rd party.
Application Delivery System
Mobile Components

Wrappers / Containers

Secure Containers

HTML5 Frameworks

Web Services

X-platform IDEs

Middleware

Integration Adapters

In-app Analytics

API Management

Event Tracking

mBaaS

MAM / MDM

BUILD

MANAGE
Cloud Vs. On-Prem

• Rapid development cycles
• Low barrier - try before
you buy
• Lower TCO
• Large customer base /
Developer Community

•
•
•
•

High in Capital Expense
Slow product releases
Long Proof-of-Concepts
Slower time-to-market
…but there are challenges & barriers with Mobile & Cloud
Top Mobile Barriers Executives
Top Mobile Barriers––Executives

Corporate IT leaders are struggling with:

Culture

35%
30%
27%
0%

50%

100%

Mobile Work Exchange Survey May 2013

Top Cloud Barriers – IT Leaders
Top Cloud Barriers– IT Leaders

46%

32%

25%

Security

Performance

Integration

CDW 2013 State of the Cloud Report

Mobile network communication
Budgets / BYOD hidden costs

•

Lack of corporate policies

•

Cultural adoption & training

•

Technical

Service performance

•

42%

C-Level pressure to act now

•

Policies

Technology & enterprise backend integration

•

60%

Security of proprietary data and systems

•

73%

Budgets

Leadership

•
•

Security

Rapid pace of technology change

•

Large & growing # of vendors

•

Regulatory & mandate compliance

•

Supporting multiple OS / Platforms

•

Changes to organizational R&R
Various benefits are driving adoption of Mobile & Cloud

Messaging / Notifications
Synchronization / Reconciliation
Device Detection
Service Integration
Reporting and Analytics
Enterprise Integration
Business Apps
Data / Back End
MOBILE MIDDLEWARE

mBaaS / PaaS

Enterprise Grade

Cheap

Stable

Easy

Expensive

Limited

Difficult

Unstable

PROS

CONS
MOBILE MIDDLEWARE

PROS

CONS

• Single vendor, with flexibility to add
components, 3rd party services
• Experienced & knowledgeable
professional Services teams
• B2E experience, focus
• Specific LOB and industry vertical
experience, focus
• Enterprise pricing model

•
•
•
•

Vendor “lock in”
Fewer 3rd party add-in choices
Start-up effort much higher
Price can be much higher, initially

mBaaS / PaaS
•
•
•
•

Easy & free to get started
Very developer friendly
Very inexpensive for enterprise apps
Lots of online resources
(docs, APIs, code samples, dev
communities)
• Possible to get “best-of-breed” for
every piece of the stack
• Quick access to newest technology
• Most offerings severely limited in
functionality (e.g., basic web services
or JSON-only integration, provide only
simple relational structures, etc.)
• Multiple vendors required to piece
together a complete solution
• Most vendors are small, unproven;
consolidation imminent
• Limited support, no services
Why Enterprise
Mobility
in the Cloud?

SPEED
COST
APPS
CONTROL

• Client side
• Reusable packaged services

• Hardware
• Software
• UI / UX
• mBaaS
• Management
• Monitoring / Analytics
Enterprise mobility in the Cloud vs On-Prem

More Related Content

What's hot

Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroIBM Security
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Sophie Jasson-Holt
 
Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation JoAnna Cheshire
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
iPhone 6 and what's behind the larger screens
iPhone 6 and what's behind the larger screensiPhone 6 and what's behind the larger screens
iPhone 6 and what's behind the larger screensJoe Morris
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Actionable insights
Actionable insightsActionable insights
Actionable insightsTim Youm
 
Connected Print Infographic
Connected Print InfographicConnected Print Infographic
Connected Print InfographicEricsson
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessJoAnna Cheshire
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 

What's hot (20)

Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security Superhero
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
 
Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
iPhone 6 and what's behind the larger screens
iPhone 6 and what's behind the larger screensiPhone 6 and what's behind the larger screens
iPhone 6 and what's behind the larger screens
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Actionable insights
Actionable insightsActionable insights
Actionable insights
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Connected Print Infographic
Connected Print InfographicConnected Print Infographic
Connected Print Infographic
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 

Similar to Enterprise mobility in the Cloud vs On-Prem

Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud ComputingIMC Institute
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1Roger Snook
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsTAKE Supply Chain
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionDalia Reda
 
TRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGYTRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGYDhrutim25
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Ahmed Banafa
 
CIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application TransformationCIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application TransformationGlobal Business Intel
 
IBM Systems of Interaction
IBM Systems of InteractionIBM Systems of Interaction
IBM Systems of InteractionIBM Sverige
 
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...polenumerique33
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileMonitise MEA
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security William John Todd
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloudKamesh Pemmaraju
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space미래웹기술연구소 (MIRAE WEB)
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopRazorfish
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 

Similar to Enterprise mobility in the Cloud vs On-Prem (20)

Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Enterprise mobility platforms
Enterprise mobility platformsEnterprise mobility platforms
Enterprise mobility platforms
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motion
 
TRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGYTRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGY
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 
Ahmed Banafa EMM
Ahmed Banafa EMMAhmed Banafa EMM
Ahmed Banafa EMM
 
CIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application TransformationCIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application Transformation
 
IBM Systems of Interaction
IBM Systems of InteractionIBM Systems of Interaction
IBM Systems of Interaction
 
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes Mobile
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloud
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshop
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 

More from Dipesh Mukerji

Developing For The Business
Developing For The BusinessDeveloping For The Business
Developing For The BusinessDipesh Mukerji
 
Latest Trends in Mobile App Development
Latest Trends in Mobile App DevelopmentLatest Trends in Mobile App Development
Latest Trends in Mobile App DevelopmentDipesh Mukerji
 
HTML5: Next Generation Web Development
HTML5: Next Generation Web DevelopmentHTML5: Next Generation Web Development
HTML5: Next Generation Web DevelopmentDipesh Mukerji
 
Kony - End-to-End Proof of Technology
Kony - End-to-End Proof of TechnologyKony - End-to-End Proof of Technology
Kony - End-to-End Proof of TechnologyDipesh Mukerji
 
Mobile App Development: Off the-Shelf vs Platform
Mobile App Development: Off the-Shelf vs PlatformMobile App Development: Off the-Shelf vs Platform
Mobile App Development: Off the-Shelf vs PlatformDipesh Mukerji
 
Kony Development Cloud
Kony Development CloudKony Development Cloud
Kony Development CloudDipesh Mukerji
 
8 Steps to a Long-Term Mobile Strategy
8 Steps to a Long-Term Mobile Strategy8 Steps to a Long-Term Mobile Strategy
8 Steps to a Long-Term Mobile StrategyDipesh Mukerji
 
Multi channel advantage
Multi channel advantageMulti channel advantage
Multi channel advantageDipesh Mukerji
 
What Mobile Development Approach Makes Sense
What Mobile Development Approach Makes SenseWhat Mobile Development Approach Makes Sense
What Mobile Development Approach Makes SenseDipesh Mukerji
 
Kony Mobile Management
Kony Mobile ManagementKony Mobile Management
Kony Mobile ManagementDipesh Mukerji
 

More from Dipesh Mukerji (13)

Developing For The Business
Developing For The BusinessDeveloping For The Business
Developing For The Business
 
Latest Trends in Mobile App Development
Latest Trends in Mobile App DevelopmentLatest Trends in Mobile App Development
Latest Trends in Mobile App Development
 
HTML5: Next Generation Web Development
HTML5: Next Generation Web DevelopmentHTML5: Next Generation Web Development
HTML5: Next Generation Web Development
 
Kony - End-to-End Proof of Technology
Kony - End-to-End Proof of TechnologyKony - End-to-End Proof of Technology
Kony - End-to-End Proof of Technology
 
Mobile App Development: Off the-Shelf vs Platform
Mobile App Development: Off the-Shelf vs PlatformMobile App Development: Off the-Shelf vs Platform
Mobile App Development: Off the-Shelf vs Platform
 
Kony Development Cloud
Kony Development CloudKony Development Cloud
Kony Development Cloud
 
8 Steps to a Long-Term Mobile Strategy
8 Steps to a Long-Term Mobile Strategy8 Steps to a Long-Term Mobile Strategy
8 Steps to a Long-Term Mobile Strategy
 
Multi channel advantage
Multi channel advantageMulti channel advantage
Multi channel advantage
 
What Mobile Development Approach Makes Sense
What Mobile Development Approach Makes SenseWhat Mobile Development Approach Makes Sense
What Mobile Development Approach Makes Sense
 
Win 8 webinar
Win 8 webinarWin 8 webinar
Win 8 webinar
 
HTML5 / Mobile Web
HTML5 / Mobile WebHTML5 / Mobile Web
HTML5 / Mobile Web
 
Kony Mobile Management
Kony Mobile ManagementKony Mobile Management
Kony Mobile Management
 
Kony plaform short
Kony plaform   shortKony plaform   short
Kony plaform short
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Enterprise mobility in the Cloud vs On-Prem

  • 1. Enterprise Mobility in the Cloud Dipesh Mukerji Sr. Director Product Strategy & Marketing
  • 2. 66% <3yrs Tablet shipments surpassed notebook and PC shipments in within three years of introduction. Mary Meeker, Internet Trend 2013 of employees use at least two devices for work. Forrsights Workforce Employee Survey, Q1 2012 20% of all internet traffic in 2013 will be mobile. Mary Meeker, Internet Trend 2013 4:1 150 68% Mobile app development projects will out number PC development projects 4:1 in the next 3 years. Gartner August 2013 mobile users reach for phone 150 times per day. Mary Meeker, Internet Trend 2013 of US/EMEA employees choose their own tablet and smart phone for work. Forrsights Workforce Employee Survey, Q1 2012
  • 3. Update Connect Interact Enable Today, the rapid pace of change is driving new behaviors and increasing our expectations of our employers and those companies we do business with. Update Connect Interact Enable
  • 5. Our World Today 11:00 AM – iPad 1:00 PM – Desktop While visiting customer, inputs new data on iPad Completes review, approval inside corporate firewall pre PC mouse interface app 3:00 PM – Tablet 9:00 AM – Mobile Web Outside firewall at work, quickly accesses app via Mobile Web Requests new services on Windows 8 tablet - touch device inside the office 8:00 AM – Blackberry 6:00 PM – Android User wakes up and checks a notification on Blackberry device. Reviews and approves changes at home via Android phone. Consistent view and experience in every interaction
  • 6. Social & Collaboration Experience First Insight & Analytics AGILITY CONTROL Core Line of Business Security / Governance Consolidation
  • 7. Social & Collaboration Experience First Insight & Analytics AGILITY Next-Gen Experience Platform CONTROL Core Line of Business Security / Governance Consolidation
  • 8. “ LINE OF BUSINESS I want to access our data anywhere and everywhere.” “ I want to develop for multi-channel, but it’s hard and expensive.” DEVELOPERS “ I need an easier way to manage all this new stuff…” IT SECURITY
  • 9. Apps have rigid and fixed points of interaction Apps are designed mobile-last Brute force app management Channel specific development is costly and isolated MDM, MAM, MC M are siloed solutions from different vendors Messy dev lifecycles
  • 10. User-First Experiences Multi-Channel SaaS Apps Next-Gen Experience Platform Multi-channel Application Development Edge-optimized Management & Security
  • 11. Will the Enterprise keep up with the market? • Consumer consumption will drive enterprise adoption of new channels • Security/Accessibility capabilities will be at a premium in determining enterprise adoption • Easy and fast development platforms, tools and communities will drive growth • Must seamlessly integrate with existing products • Must have the best yet different user experience = MUST BE ON THE CLOUD!
  • 12. Why Cloud? • 10 year cycle of market refresh from a web-centric to a mobile-centric environment • Rapid market adoption SaaS and cloud solutions • Convergence of cloud & mobile (Kony, New Relic, Appcelerator, PhoneGap, and Sencha) • Need anytime anywhere access • Reduce operational costs • Availability, Scalability, Reliability, Flexibility
  • 13. There are 3 basic Cloud Service Models - SaaS SaaS App1 App2 App3 PaaS Integration and Middleware IaaS Infrastructure (Hardware, Network, Storage) Software as service. Software, applications, and data are hosted in “the cloud’ by a 3rd party. Typically access via a web browser.
  • 14. There are 3 basic Cloud Service Models - PaaS SaaS App1 App2 App3 PaaS Integration and Middleware IaaS Infrastructure (Hardware, Network, Storage) Platform as service. A service that allows you to build, deploy, and host applications in “the cloud’ by a 3rd party.
  • 15. There are 3 basic Cloud Service Models - IaaS SaaS App1 App2 App3 PaaS Integration and Middleware IaaS Infrastructure (Hardware, Network, Storage) Infrastructure as service. A service that allows you to utilize IT hardware, network, and/or storage in “the cloud’ by a 3rd party.
  • 17. Mobile Components Wrappers / Containers Secure Containers HTML5 Frameworks Web Services X-platform IDEs Middleware Integration Adapters In-app Analytics API Management Event Tracking mBaaS MAM / MDM BUILD MANAGE
  • 18. Cloud Vs. On-Prem • Rapid development cycles • Low barrier - try before you buy • Lower TCO • Large customer base / Developer Community • • • • High in Capital Expense Slow product releases Long Proof-of-Concepts Slower time-to-market
  • 19. …but there are challenges & barriers with Mobile & Cloud Top Mobile Barriers Executives Top Mobile Barriers––Executives Corporate IT leaders are struggling with: Culture 35% 30% 27% 0% 50% 100% Mobile Work Exchange Survey May 2013 Top Cloud Barriers – IT Leaders Top Cloud Barriers– IT Leaders 46% 32% 25% Security Performance Integration CDW 2013 State of the Cloud Report Mobile network communication Budgets / BYOD hidden costs • Lack of corporate policies • Cultural adoption & training • Technical Service performance • 42% C-Level pressure to act now • Policies Technology & enterprise backend integration • 60% Security of proprietary data and systems • 73% Budgets Leadership • • Security Rapid pace of technology change • Large & growing # of vendors • Regulatory & mandate compliance • Supporting multiple OS / Platforms • Changes to organizational R&R
  • 20. Various benefits are driving adoption of Mobile & Cloud Messaging / Notifications Synchronization / Reconciliation Device Detection Service Integration Reporting and Analytics Enterprise Integration Business Apps Data / Back End
  • 21. MOBILE MIDDLEWARE mBaaS / PaaS Enterprise Grade Cheap Stable Easy Expensive Limited Difficult Unstable PROS CONS
  • 22. MOBILE MIDDLEWARE PROS CONS • Single vendor, with flexibility to add components, 3rd party services • Experienced & knowledgeable professional Services teams • B2E experience, focus • Specific LOB and industry vertical experience, focus • Enterprise pricing model • • • • Vendor “lock in” Fewer 3rd party add-in choices Start-up effort much higher Price can be much higher, initially mBaaS / PaaS • • • • Easy & free to get started Very developer friendly Very inexpensive for enterprise apps Lots of online resources (docs, APIs, code samples, dev communities) • Possible to get “best-of-breed” for every piece of the stack • Quick access to newest technology • Most offerings severely limited in functionality (e.g., basic web services or JSON-only integration, provide only simple relational structures, etc.) • Multiple vendors required to piece together a complete solution • Most vendors are small, unproven; consolidation imminent • Limited support, no services
  • 23. Why Enterprise Mobility in the Cloud? SPEED COST APPS CONTROL • Client side • Reusable packaged services • Hardware • Software • UI / UX • mBaaS • Management • Monitoring / Analytics

Editor's Notes

  1. Start as disconnected … DEV: One to one developmentIT MGR: Security as a fortressLoB: Rigid points of access….
  2. Start as disconnected … DEV: One to one developmentIT MGR: Security as a fortressLoB: Rigid points of access….
  3. Start as disconnected … DEV: One to one developmentIT MGR: Security as a fortressLoB: Rigid points of access….
  4. DON’T MISS THE BOAT!!!
  5. C-Level pressure and “Consumerization of IT” are driving both agency and corporate CIOs to actBYOD can increase expenses if no governance / expense managementRapid pace of change in innovation – ability for IT organizations to ‘certify’ new devices like smartphones and tablets to access the network. New devices are coming out approximately every 6 months – it takes the gov’t over 1-year to certify. They are working to reduce this timeNeed to support multiple platforms, operating systems, and devices are straining IT operations and flooding service desksAn exponentially growing and fragmented number of technology vendorsAdopting BYOD in way that is both secure and respects privacyovercoming cultural challenges to a more mobile work environment (e.g. no permanent offices or “hoteling”)Innovative technologies are driving new operating models requiring change to traditional organizational roles and responsibilities (e.g. Marketing and IT). Lines between IT and Business are starting to blur – business leaders are more involved in mobile and cloud decision making
  6. Reduced Capital Expenditures: In traditional computing models, creating your own system involves a huge capital outlay in software and hardware Agility: ability to quickly design, build, configure and deploy business applications. Save the cost of investing in Beta and new versions of software releases, and the time it takes to acquire and install these upgrades. Instead, cloud service providers complete these upgrades Metered billing: Pay only for the resources you use. In cloud computing, the cloud service provider covers the cost of software and hardware, and of the human resources required to create and maintain the systems. This means that you can simply log on and pay for the resources you requireElasticity – Ability to scale to meet application demand spikes. In a tradition model, the system needs to be designed for peak loads, which means that the resources you purchase could be underutilized a large part of the time Green IT – Sharing of computer resources mean you no longer require data centers that consume lost of power