SlideShare a Scribd company logo
The Future of Enterprise Mobility:

Predictions
for 2014
Introduction: 2014 predictions slide deck

Introduction
Enterprise mobility is a rapidly evolving area of
technology, requiring corporate IT departments to move at a
faster pace than they were accustomed to in previous eras.
According to a recent survey, 72 percent of IT executive
respondents plan to spend more than 20 percent of their 2014
budget on mobility.
Introduction: 2014 predictions slide deck

Mobile technology offers enticing productivity gains and competitive
differentiation, yet it continues to erode the traditional top-down model of enterprise
IT control. In 2014, companies will continue to face the challenges introduced by userdriven adoption of new hardware, apps, and cloud services. They will need to solve
dynamic security and management challenges in order to offer enhanced productivity,
collaboration, and capabilities to their employees.
Introduction: 2014 predictions slide deck

While 2013 has been an exciting and eventful year in enterprise
mobility, 2014 will bring even more change.
Prediction 1:

Wearable
computing
takes off
Prediction 1: Wearable computing takes off

Until recently, wearable computing devices such
as smart watches and head-mounted displays

were seen more often in spy and sci-fi movies
than the real world. Today, Galaxy Gear is a
reality, iWatch rumors abound, and Google is
rolling out its head-mounted Glass product to the
general market in 2014.

6
Prediction 1: Wearable computing takes off

Today’s wearable computers are largely targeted at consumers, but it’s likely that
the market for business-focused wearables will grow. It’s reasonable to
expect that employees will want to use their personal wearables for work just as they
did with consumer-focused mobile devices—but this time, businesses should see it

coming.

7
Prediction 1: Wearable computing takes off

Manufacturers are doing their best to align wearables with their
overall technology portfolios. One strategy is to pair or bundle wearable
devices with smartphones. For example, Samsung has announced the release of
Samsung Galaxy Gear, a smart watch that pairs with Galaxy smartphones.

8
Prediction 1: Wearable computing takes off

With Samsung now having the largest global market share in mobile hardware, this
could propel them ahead in the wearables market. Overall, wearables will

become another way for the largest technology companies to
increase user adoption of their platforms, services, and devices.

9
Prediction 1: Wearable computing takes off

Industry specific scenarios drive
wearable computer adoption
On the surface, smart watches and head-mounted displays may seem like Silicon Valley
extravagances that lack the fundamental utility of a smartphone. However, in addition to
giving information workers faster access to the data already on their smartphones,
wearable computers will be increasingly adopted in industry-specific scenarios.

10
Prediction 1: Wearable computing takes off

For example, look at Motorola’s image of the connected police officer. While few

workers will be this wired any time soon, it demonstrates the range of applications
for the technology. One area of innovation will be devices that

provide real-time information to people who need to keep their
hands free for manual tasks, from repair techs to medical
professionals to warehouse workers.

11
Prediction 1: Wearable computing takes off

Wearable computers may also be used to track personnel,
enabling companies to enforce breaks, reduce accident risk,
and optimize routes. Another potential application is the use of biometric
monitors to reduce health insurance risk.

12
Prediction 1: Wearable computing takes off

Wearables present unique
business challenges
Businesses already face the challenge of managing iOS, Android, Windows, and legacy
mobile devices. Now add to that mix the wide range of wearable computer operating
systems and platforms, and the fact that many wearables are ultra-low-power embedded
devices that don’t support standard security software.

13
Prediction 1: Wearable computing takes off

Changes in user behavior due to wearable computers could be even more
significant. A head-mounted display, for example, could accidentally record and
transmit sensitive information. Privacy issues will also make a formal

entrance.

14
Prediction 1: Wearable computing takes off

Court cases about businesses’ rights to access employees’ personal data may

increase, and the stakes will be higher when “personal data” means capturing one’s
physical movements in detail. In 2014, organizations should begin to

define clear policies concerning privacy and the appropriate use of
wearable computers.

15
Prediction 2:

Security & compliance
challenges continue
to grow
Prediction 2: Security and compliance challenges continue to grow

Not too long ago, most employees had a single desktop PC
that was physically connected to a corporate network.

Today, many employees access these networks
on multiple devices, often over public Wi-Fi
networks. Mobile devices introduce new operating
systems, security models, and threat patterns.

17
Prediction 2: Security and compliance challenges continue to grow

While device-focused attacks are still rare compared to the PC world, they are on the
rise, according to CSO Online. Some devices tend to be targeted more

than others—a lot more according to a report by Kaspersky Lab, which claims that
99 percent of mobile malware targets Android devices.

18
Prediction 2: Security and compliance challenges continue to grow

Security researchers and, unfortunately, cybercriminals will
continue to find innovative ways to compromise mobile
systems, such as the SIM card exploit revealed earlier this year. It is possible
that we will see major mobile security incidents make headlines in 2014, and
there will be many more that are never made public.

19
Prediction 2: Security and compliance challenges continue to grow

The revelations about the degree to which US government agencies have access
to everyday communications may also lead companies to look for ways to
control access to information on mobile devices. Companies can no longer

assume that even the largest IT vendors will keep their data
private.

20
Prediction 2: Security and compliance challenges continue to grow

Users remain the key
to security
User behavior will continue to be the source of most security issues.
Of the top 10 mobile security risks mentioned by the European Union Agency for
Network and Information Security, most can be attributed to a lack of user awareness
and education. The risks include data leakage due to device loss or theft, unintentional
disclosure, malware, and network spoofing.

21
Prediction 2: Security and compliance challenges continue to grow

Companies that want to successfully minimize security risks in
2014 will include user engagement and education in their efforts.

22
Prediction 2: Security and compliance challenges continue to grow

A growing number of organizations already use technological
solutions to confront user-created security issues. For example, data loss
prevention (DLP) technology attempts to reduce unintended data leaks by detecting
sensitive data in email messages and other communications. As mobile usage grows,
companies will evaluate DLP and similar solutions based on their ability to reduce risk
on mobile platforms.

23
Prediction 3:

Competition
drives rapid
changes in the
MDM market
Prediction 3: Competition drives rapid changes in the MDM market

The mobile device management (MDM) market currently
has more than 100 companies competing for a piece of an
increasingly commoditized business, meaning some
consolidation is likely. There are now fewer viable

mobile platforms than there were a year ago.
The remaining players all provide robust management
APIs, which will obligate MDM providers to offer more

than basic hardware management services.

25
Prediction 3: Competition drives rapid changes in the MDM market

MDM providers will increasingly differentiate themselves with advanced and
innovative solutions. Examples include mobile risk management services, enhanced
cloud-based device management interfaces, unified corporate app stores, and
sophisticated user self-service portals. The goal of MDM will shift from

providing fundamental hardware controls to helping increase
mobility return on investment (ROI).

26
Prediction 3: Competition drives rapid changes in the MDM market

Mind the apps
(and the content)
If employees bring multiple devices to work, an endpoint-based management strategy
becomes less efficient than a user-based approach. Employees in bring-your-own-

device (BYOD) scenarios mix personal and business content on their
devices and are hesitant to hand over full control to IT.

27
Prediction 3: Competition drives rapid changes in the MDM market

Additionally, mobile devices are designed to integrate cloud storage and content
sharing services. Enterprises face a choice. They can give employees robust
enterprise content management tools that work with mobile devices, or they can
look for ways to manage employees’ use of public cloud services without
diminishing productivity or invading privacy.

28
Prediction 3: Competition drives rapid changes in the MDM market

Because BYOD blurs the boundaries between personal and

business use, companies will continue to push MDM boundaries by
delivering solutions for mobile application management (MAM) and mobile
content management (MCM).

29
Prediction 3: Competition drives rapid changes in the MDM market

MAM will enable wider adoption of controls at the application layer by supplementing
hardware management with better ways to manage application access and separate
personal and corporate data. As MAM matures, businesses will be better

able to support BYOD and offer employees more freedom while
maintaining company security and manageability.

30
Prediction 3: Competition drives rapid changes in the MDM market

Side by side with MAM services, more companies will adopt MCM
strategies. MCM typically aims to provide secure, controlled mobile access to
corporate resources so that employees don’t rely on consumer-oriented content
sharing platforms. For more insights into how MDM is changing, download the
Enterprise Mobile white paper “Beyond MDM.”

31
Prediction 4:

Managed mobility
services grow increasingly
important to business
success
Prediction 4: Managed mobility services grow increasingly important to business success

As businesses continue to adopt mobile technologies
across their operations, they find it harder to manage and
support mobile devices and services globally in ways that
deliver the highest ROI. Respondents to a study by the
Enterprise Mobility Exchange highlight challenges ranging
from “aligning mobile strategy with the wider business” to
“implementation challenges of ensuring technologies

communicate with each other.”

33
Prediction 4: Managed mobility services grow increasingly important to business success

How will these businesses provide best-in-class mobility support
to their employees? Increasingly, they will take advantage of
managed mobility services (MMS), a term recently coined by analysts to
describe companies that facilitate, advise, and directly assist businesses with their
mobility needs.

34
Prediction 4: Managed mobility services grow increasingly important to business success

Done properly, MMS helps decision makers evolve from working in a
reactive mode toward forming actionable plans that are aligned with
long-term strategy.

35
Prediction 4: Managed mobility services grow increasingly important to business success

MMS makes an impact in 2014
MMS is a growing market that will continue to increase
the value it offers to customers in 2014.

36
Prediction 4: Managed mobility services grow increasingly important to business success

By choosing the right MMS provider, companies will be able to take
advantage of offerings such as:
•
•
•
•
•
•

Enterprise mobility planning—Objective evaluation of key issues in mobility relevant to a
company’s needs.
Mobile application development—Platform-agnostic services that help companies design,
develop, deploy, and manage high-quality apps.
Enterprise mobility deployment—Streamlined acquisition and device deployment across
multiple mobile operating system platforms.
MDM—Evaluation, implementation, and administration of MDM, MAM, and MCM solutions.
Mobile workforce support—Training and support to extend the IT help desk and minimize
downtime.
Mobility monitoring intelligence and analytics—Standardized usage monitoring, hardware
replacement, and expense management to contain costs.

37
Prediction 5:

Operating system
features proliferate
Prediction 5: Operating system features proliferate

As with the PC market, one

of the key dynamics in
mobile technology is between third-party
applications and services and those offered
by original equipment manufacturers (OEMs).
Just as Microsoft began offering a built-in hypervisor as part of
Windows Server, mobile operating system (OS) vendors are rapidly
innovating to boost their advantages against competitors.

39
Prediction 5: Operating system features proliferate

Mobile technology companies are increasingly aligning their mobile offerings with
other services they provide. For example, Google Android 4.4 (KitKat) continues the
trend of deeper integration with Google+, Google Now, and other Google services.
Apple, Amazon, and Microsoft are doing the same. Some of this is driven by
consumerization of IT, but it also demonstrates that mobile players see services

as critical to their competitive strategy.

40
Prediction 5: Operating system features proliferate

How businesses handle these developments remains to be seen. Many companies
have significant investment in Microsoft technologies, which could give the Microsoft
mobile solution set an advantage in the business world.

41
Prediction 5: Operating system features proliferate

One focus is the growing need to separate business and personal data, which once
required custom third-party solutions to implement. Now, Apple offers data
segregation as a platform-level feature with iOS 7, and LG and Samsung provide it as
part of their enterprise security offerings (GATE and Knox, respectively).

42
Prediction 5: Operating system features proliferate

This growing trend is good for businesses, as it is part of the overall
push by device makers to improve their enterprise capabilities and
find revenue streams outside the increasingly saturated consumer
market.

43
Prediction 5: Operating system features proliferate

New features need to be secured
and managed
While mobile platforms increasingly include business-friendly features such as data
segregation, data protection, and single sign on, the market is still clearly

driven by consumer preferences.

44
Prediction 5: Operating system features proliferate

Just as BYOD shifted corporate security strategies by bringing Dropbox and other
sharing services inside the corporate firewall, consumer device features

will continue to create management and security challenges for
businesses.

45
Prediction 5: Operating system features proliferate

One writer predicts that Android will feature universal messaging, real-time location
tracking, enhanced payments services, and other features by 2020. All of these have
potential policy, security, and management implications for businesses as employees
connect Android devices to the corporate network.

46
Prediction 6:

Mobile users
drive cloud
adoption
Prediction 6: Mobile users drive cloud adoption

Cloud computing has generated its fair share of hype, but
it remains a growing phenomenon in the enterprise. While
cloud vendors often cite cost savings and scalability as key
advantages of adopting their solutions, growth in

cloud services will continue to be driven
largely by demand from mobile users.

48
Prediction 6: Mobile users drive cloud adoption

Enterprise cloud storage vendor Box, for example, has grown rapidly not because
companies are divesting themselves of local storage for cost reasons, but because

mobile users want an easy way to share and access files.

49
Prediction 6: Mobile users drive cloud adoption

Providers of cloud services and apps will aggressively roll out new
and powerful features to appeal to mobile business users. They will
also enhance the consistency of the user experience across major device platforms.

50
Prediction 6: Mobile users drive cloud adoption

Gartner recently predicted that the market for cloud-based security-as-a-

service will continue to grow. Innovations in this area will increasingly provide
new ways for companies to authenticate users and secure data and networks across onpremises and cloud-based deployments. These developments may increase the utility of
cloud services for enterprise mobile use.

51
Prediction 7:

Mobile titans
jockey for
position
Prediction 7: Mobile titans jockey for position

What do Palm, Nokia, and BlackBerry (formerly known as
Research in Motion) have in common? They were all vast,
successful, highly profitable enterprises that defined the
mobile technology landscape over the past decade. And
all were (or are in the process of being) sold for a small
fraction of their peak value.

53
Prediction 7: Mobile titans jockey for position

When the divide between business and consumer technology was
wider, vendors could count on winning market share by appealing to
business decision makers with enterprise-friendly features.

54
Prediction 7: Mobile titans jockey for position

In the mobile space today, consumers drive adoption and businesses
play catch up. The remaining players are businesses that have succeeded in building
more than mobile devices. They have created strong brands and rich ecosystems that
keep fickle customers loyal.

55
Prediction 7: Mobile titans jockey for position

Competition drives innovation
Amazon, Apple, Google, Microsoft, and Samsung will continue battling for dominance in
the mobile space. Competition will deliver continued innovations in

hardware, user experiences, cloud services, apps, and content. Some
of these innovations will be a boon to enterprise, while others will create challenges.

56
Prediction 7: Mobile titans jockey for position

Although consumer preferences still drive mobile technology development,

manufacturers are increasingly recognizing enterprise needs. In
any case, while mobile vendors may seem to have secured positions in the mobile
market, their strategic wiggle room is shrinking and there may be further
consolidation in the not-too-distant future.

57
Conclusion: 2014 predictions slide deck

Conclusion
Mobile is a moving target—steady your aim.
In such a fast-moving market, it is challenging to predict how
things will look next quarter, let alone next year. One thing is

certain: enterprises will continue to adopt mobile
technology at a rapid pace. They will need to keep
evolving their approach to security, compliance, management,
and deployment of mobile devices, services, and apps to
maintain ROI and competitive advantage.
Conclusion: 2014 predictions slide deck

Enterprise Mobile is well-positioned to help organizations achieve their mobility goals with a
holistic approach to planning, implementing, and managing mobility environments. Through
our comprehensive portfolio of services, we can simplify your company’s transition

to enterprise mobility today and help you get the most from tomorrow’s
mobile technology innovations.
For more information, visit www.enterprisemobile.com or contact
info@enterprisemobile.com. Or follow us online:

/

/

/

/

59
The Future of Enterprise Mobility: Predictions for 2014

More Related Content

What's hot

Everything you need to know about Corona Virus.
Everything you need to know about Corona Virus.Everything you need to know about Corona Virus.
Everything you need to know about Corona Virus.
Tanveer Padder
 
Zika virus
Zika virusZika virus
Zika virus
Mamdouh Sabry
 
Zika virus
Zika virusZika virus
Zika virus
THUSHARA MOHAN
 
The novel coronavirus disease 2019 (covid 19)overview
The novel  coronavirus disease 2019 (covid 19)overviewThe novel  coronavirus disease 2019 (covid 19)overview
The novel coronavirus disease 2019 (covid 19)overview
Makrani Shaharukh
 
COVID-19
COVID-19 COVID-19
COVID-19
Partha sarathi
 
Coronavirus Disease (nCOV-19)
Coronavirus Disease (nCOV-19)Coronavirus Disease (nCOV-19)
Coronavirus Disease (nCOV-19)
A Biodiction : A Unit of Dr. Divya Sharma
 
Coronavirus
CoronavirusCoronavirus
Coronavirus
Sushil Patel
 
Middle East Respiratory Syndrome: MERS- CoV
Middle East Respiratory Syndrome: MERS- CoVMiddle East Respiratory Syndrome: MERS- CoV
Middle East Respiratory Syndrome: MERS- CoV
Gaurav Kamboj
 
Corona virus
Corona virusCorona virus
Corona virus
Ankit Mishra
 
Chikungunya fever by capt sayeed
Chikungunya fever by capt sayeedChikungunya fever by capt sayeed
Chikungunya fever by capt sayeed
kazi sayeed
 
Dengue Fever
Dengue FeverDengue Fever
Dengue Fever
MasudRana461
 
Sars corona virus .
Sars corona virus .Sars corona virus .
Sars corona virus .
Rachna Tewari
 
2022 February Patch Tuesday
2022 February Patch Tuesday2022 February Patch Tuesday
2022 February Patch Tuesday
Ivanti
 
Covid 19 Overview
Covid 19 OverviewCovid 19 Overview
Covid 19 Overview
Ibrahim Fadl Mahmoud Etelem
 
Middle East Respiratory Syndrome MERS
Middle East Respiratory Syndrome MERSMiddle East Respiratory Syndrome MERS
Middle East Respiratory Syndrome MERS
drsajithnv
 
Securing and Hacking LINE OA Integration
Securing and Hacking LINE OA IntegrationSecuring and Hacking LINE OA Integration
Securing and Hacking LINE OA Integration
Pichaya Morimoto
 
Final Assignment.pptx
Final Assignment.pptxFinal Assignment.pptx
Final Assignment.pptx
HariNathaReddy14
 
Hantavirus
HantavirusHantavirus
Hantavirus
Abullah Jnaid
 
Office365 training - for the Beginner
Office365 training - for the BeginnerOffice365 training - for the Beginner
Office365 training - for the Beginner
Lynn Dye
 
Corona Virus Basic Introduction
Corona Virus Basic IntroductionCorona Virus Basic Introduction
Corona Virus Basic Introduction
Shubham Kolge
 

What's hot (20)

Everything you need to know about Corona Virus.
Everything you need to know about Corona Virus.Everything you need to know about Corona Virus.
Everything you need to know about Corona Virus.
 
Zika virus
Zika virusZika virus
Zika virus
 
Zika virus
Zika virusZika virus
Zika virus
 
The novel coronavirus disease 2019 (covid 19)overview
The novel  coronavirus disease 2019 (covid 19)overviewThe novel  coronavirus disease 2019 (covid 19)overview
The novel coronavirus disease 2019 (covid 19)overview
 
COVID-19
COVID-19 COVID-19
COVID-19
 
Coronavirus Disease (nCOV-19)
Coronavirus Disease (nCOV-19)Coronavirus Disease (nCOV-19)
Coronavirus Disease (nCOV-19)
 
Coronavirus
CoronavirusCoronavirus
Coronavirus
 
Middle East Respiratory Syndrome: MERS- CoV
Middle East Respiratory Syndrome: MERS- CoVMiddle East Respiratory Syndrome: MERS- CoV
Middle East Respiratory Syndrome: MERS- CoV
 
Corona virus
Corona virusCorona virus
Corona virus
 
Chikungunya fever by capt sayeed
Chikungunya fever by capt sayeedChikungunya fever by capt sayeed
Chikungunya fever by capt sayeed
 
Dengue Fever
Dengue FeverDengue Fever
Dengue Fever
 
Sars corona virus .
Sars corona virus .Sars corona virus .
Sars corona virus .
 
2022 February Patch Tuesday
2022 February Patch Tuesday2022 February Patch Tuesday
2022 February Patch Tuesday
 
Covid 19 Overview
Covid 19 OverviewCovid 19 Overview
Covid 19 Overview
 
Middle East Respiratory Syndrome MERS
Middle East Respiratory Syndrome MERSMiddle East Respiratory Syndrome MERS
Middle East Respiratory Syndrome MERS
 
Securing and Hacking LINE OA Integration
Securing and Hacking LINE OA IntegrationSecuring and Hacking LINE OA Integration
Securing and Hacking LINE OA Integration
 
Final Assignment.pptx
Final Assignment.pptxFinal Assignment.pptx
Final Assignment.pptx
 
Hantavirus
HantavirusHantavirus
Hantavirus
 
Office365 training - for the Beginner
Office365 training - for the BeginnerOffice365 training - for the Beginner
Office365 training - for the Beginner
 
Corona Virus Basic Introduction
Corona Virus Basic IntroductionCorona Virus Basic Introduction
Corona Virus Basic Introduction
 

Similar to The Future of Enterprise Mobility: Predictions for 2014

Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
EMC
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Technology Trends 2013
Technology Trends 2013Technology Trends 2013
Technology Trends 2013
IMC Institute
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
Mobile security
Mobile securityMobile security
Mobile security
Saieesha Chitoori
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
IMC Institute
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
SameerShaik43
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Mobiloitte
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
Abhishek Sood
 
Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017
Louis F Vargas Business Development•Marketing Executive
 
Top Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 articleTop Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 article
Louis F Vargas Business Development•Marketing Executive
 
Oracle's Top 10 Cloud Predictions
Oracle's Top 10 Cloud PredictionsOracle's Top 10 Cloud Predictions
Oracle's Top 10 Cloud Predictions
Smart ERP Solutions, Inc.
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
Icomm Technologies
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022
Bernard Marr
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
sreevidyaopenteq
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
J
 

Similar to The Future of Enterprise Mobility: Predictions for 2014 (20)

Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Security that works
Security that worksSecurity that works
Security that works
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Technology Trends 2013
Technology Trends 2013Technology Trends 2013
Technology Trends 2013
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
 
Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017
 
Top Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 articleTop Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 article
 
Oracle's Top 10 Cloud Predictions
Oracle's Top 10 Cloud PredictionsOracle's Top 10 Cloud Predictions
Oracle's Top 10 Cloud Predictions
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

The Future of Enterprise Mobility: Predictions for 2014

  • 1. The Future of Enterprise Mobility: Predictions for 2014
  • 2. Introduction: 2014 predictions slide deck Introduction Enterprise mobility is a rapidly evolving area of technology, requiring corporate IT departments to move at a faster pace than they were accustomed to in previous eras. According to a recent survey, 72 percent of IT executive respondents plan to spend more than 20 percent of their 2014 budget on mobility.
  • 3. Introduction: 2014 predictions slide deck Mobile technology offers enticing productivity gains and competitive differentiation, yet it continues to erode the traditional top-down model of enterprise IT control. In 2014, companies will continue to face the challenges introduced by userdriven adoption of new hardware, apps, and cloud services. They will need to solve dynamic security and management challenges in order to offer enhanced productivity, collaboration, and capabilities to their employees.
  • 4. Introduction: 2014 predictions slide deck While 2013 has been an exciting and eventful year in enterprise mobility, 2014 will bring even more change.
  • 6. Prediction 1: Wearable computing takes off Until recently, wearable computing devices such as smart watches and head-mounted displays were seen more often in spy and sci-fi movies than the real world. Today, Galaxy Gear is a reality, iWatch rumors abound, and Google is rolling out its head-mounted Glass product to the general market in 2014. 6
  • 7. Prediction 1: Wearable computing takes off Today’s wearable computers are largely targeted at consumers, but it’s likely that the market for business-focused wearables will grow. It’s reasonable to expect that employees will want to use their personal wearables for work just as they did with consumer-focused mobile devices—but this time, businesses should see it coming. 7
  • 8. Prediction 1: Wearable computing takes off Manufacturers are doing their best to align wearables with their overall technology portfolios. One strategy is to pair or bundle wearable devices with smartphones. For example, Samsung has announced the release of Samsung Galaxy Gear, a smart watch that pairs with Galaxy smartphones. 8
  • 9. Prediction 1: Wearable computing takes off With Samsung now having the largest global market share in mobile hardware, this could propel them ahead in the wearables market. Overall, wearables will become another way for the largest technology companies to increase user adoption of their platforms, services, and devices. 9
  • 10. Prediction 1: Wearable computing takes off Industry specific scenarios drive wearable computer adoption On the surface, smart watches and head-mounted displays may seem like Silicon Valley extravagances that lack the fundamental utility of a smartphone. However, in addition to giving information workers faster access to the data already on their smartphones, wearable computers will be increasingly adopted in industry-specific scenarios. 10
  • 11. Prediction 1: Wearable computing takes off For example, look at Motorola’s image of the connected police officer. While few workers will be this wired any time soon, it demonstrates the range of applications for the technology. One area of innovation will be devices that provide real-time information to people who need to keep their hands free for manual tasks, from repair techs to medical professionals to warehouse workers. 11
  • 12. Prediction 1: Wearable computing takes off Wearable computers may also be used to track personnel, enabling companies to enforce breaks, reduce accident risk, and optimize routes. Another potential application is the use of biometric monitors to reduce health insurance risk. 12
  • 13. Prediction 1: Wearable computing takes off Wearables present unique business challenges Businesses already face the challenge of managing iOS, Android, Windows, and legacy mobile devices. Now add to that mix the wide range of wearable computer operating systems and platforms, and the fact that many wearables are ultra-low-power embedded devices that don’t support standard security software. 13
  • 14. Prediction 1: Wearable computing takes off Changes in user behavior due to wearable computers could be even more significant. A head-mounted display, for example, could accidentally record and transmit sensitive information. Privacy issues will also make a formal entrance. 14
  • 15. Prediction 1: Wearable computing takes off Court cases about businesses’ rights to access employees’ personal data may increase, and the stakes will be higher when “personal data” means capturing one’s physical movements in detail. In 2014, organizations should begin to define clear policies concerning privacy and the appropriate use of wearable computers. 15
  • 16. Prediction 2: Security & compliance challenges continue to grow
  • 17. Prediction 2: Security and compliance challenges continue to grow Not too long ago, most employees had a single desktop PC that was physically connected to a corporate network. Today, many employees access these networks on multiple devices, often over public Wi-Fi networks. Mobile devices introduce new operating systems, security models, and threat patterns. 17
  • 18. Prediction 2: Security and compliance challenges continue to grow While device-focused attacks are still rare compared to the PC world, they are on the rise, according to CSO Online. Some devices tend to be targeted more than others—a lot more according to a report by Kaspersky Lab, which claims that 99 percent of mobile malware targets Android devices. 18
  • 19. Prediction 2: Security and compliance challenges continue to grow Security researchers and, unfortunately, cybercriminals will continue to find innovative ways to compromise mobile systems, such as the SIM card exploit revealed earlier this year. It is possible that we will see major mobile security incidents make headlines in 2014, and there will be many more that are never made public. 19
  • 20. Prediction 2: Security and compliance challenges continue to grow The revelations about the degree to which US government agencies have access to everyday communications may also lead companies to look for ways to control access to information on mobile devices. Companies can no longer assume that even the largest IT vendors will keep their data private. 20
  • 21. Prediction 2: Security and compliance challenges continue to grow Users remain the key to security User behavior will continue to be the source of most security issues. Of the top 10 mobile security risks mentioned by the European Union Agency for Network and Information Security, most can be attributed to a lack of user awareness and education. The risks include data leakage due to device loss or theft, unintentional disclosure, malware, and network spoofing. 21
  • 22. Prediction 2: Security and compliance challenges continue to grow Companies that want to successfully minimize security risks in 2014 will include user engagement and education in their efforts. 22
  • 23. Prediction 2: Security and compliance challenges continue to grow A growing number of organizations already use technological solutions to confront user-created security issues. For example, data loss prevention (DLP) technology attempts to reduce unintended data leaks by detecting sensitive data in email messages and other communications. As mobile usage grows, companies will evaluate DLP and similar solutions based on their ability to reduce risk on mobile platforms. 23
  • 25. Prediction 3: Competition drives rapid changes in the MDM market The mobile device management (MDM) market currently has more than 100 companies competing for a piece of an increasingly commoditized business, meaning some consolidation is likely. There are now fewer viable mobile platforms than there were a year ago. The remaining players all provide robust management APIs, which will obligate MDM providers to offer more than basic hardware management services. 25
  • 26. Prediction 3: Competition drives rapid changes in the MDM market MDM providers will increasingly differentiate themselves with advanced and innovative solutions. Examples include mobile risk management services, enhanced cloud-based device management interfaces, unified corporate app stores, and sophisticated user self-service portals. The goal of MDM will shift from providing fundamental hardware controls to helping increase mobility return on investment (ROI). 26
  • 27. Prediction 3: Competition drives rapid changes in the MDM market Mind the apps (and the content) If employees bring multiple devices to work, an endpoint-based management strategy becomes less efficient than a user-based approach. Employees in bring-your-own- device (BYOD) scenarios mix personal and business content on their devices and are hesitant to hand over full control to IT. 27
  • 28. Prediction 3: Competition drives rapid changes in the MDM market Additionally, mobile devices are designed to integrate cloud storage and content sharing services. Enterprises face a choice. They can give employees robust enterprise content management tools that work with mobile devices, or they can look for ways to manage employees’ use of public cloud services without diminishing productivity or invading privacy. 28
  • 29. Prediction 3: Competition drives rapid changes in the MDM market Because BYOD blurs the boundaries between personal and business use, companies will continue to push MDM boundaries by delivering solutions for mobile application management (MAM) and mobile content management (MCM). 29
  • 30. Prediction 3: Competition drives rapid changes in the MDM market MAM will enable wider adoption of controls at the application layer by supplementing hardware management with better ways to manage application access and separate personal and corporate data. As MAM matures, businesses will be better able to support BYOD and offer employees more freedom while maintaining company security and manageability. 30
  • 31. Prediction 3: Competition drives rapid changes in the MDM market Side by side with MAM services, more companies will adopt MCM strategies. MCM typically aims to provide secure, controlled mobile access to corporate resources so that employees don’t rely on consumer-oriented content sharing platforms. For more insights into how MDM is changing, download the Enterprise Mobile white paper “Beyond MDM.” 31
  • 32. Prediction 4: Managed mobility services grow increasingly important to business success
  • 33. Prediction 4: Managed mobility services grow increasingly important to business success As businesses continue to adopt mobile technologies across their operations, they find it harder to manage and support mobile devices and services globally in ways that deliver the highest ROI. Respondents to a study by the Enterprise Mobility Exchange highlight challenges ranging from “aligning mobile strategy with the wider business” to “implementation challenges of ensuring technologies communicate with each other.” 33
  • 34. Prediction 4: Managed mobility services grow increasingly important to business success How will these businesses provide best-in-class mobility support to their employees? Increasingly, they will take advantage of managed mobility services (MMS), a term recently coined by analysts to describe companies that facilitate, advise, and directly assist businesses with their mobility needs. 34
  • 35. Prediction 4: Managed mobility services grow increasingly important to business success Done properly, MMS helps decision makers evolve from working in a reactive mode toward forming actionable plans that are aligned with long-term strategy. 35
  • 36. Prediction 4: Managed mobility services grow increasingly important to business success MMS makes an impact in 2014 MMS is a growing market that will continue to increase the value it offers to customers in 2014. 36
  • 37. Prediction 4: Managed mobility services grow increasingly important to business success By choosing the right MMS provider, companies will be able to take advantage of offerings such as: • • • • • • Enterprise mobility planning—Objective evaluation of key issues in mobility relevant to a company’s needs. Mobile application development—Platform-agnostic services that help companies design, develop, deploy, and manage high-quality apps. Enterprise mobility deployment—Streamlined acquisition and device deployment across multiple mobile operating system platforms. MDM—Evaluation, implementation, and administration of MDM, MAM, and MCM solutions. Mobile workforce support—Training and support to extend the IT help desk and minimize downtime. Mobility monitoring intelligence and analytics—Standardized usage monitoring, hardware replacement, and expense management to contain costs. 37
  • 39. Prediction 5: Operating system features proliferate As with the PC market, one of the key dynamics in mobile technology is between third-party applications and services and those offered by original equipment manufacturers (OEMs). Just as Microsoft began offering a built-in hypervisor as part of Windows Server, mobile operating system (OS) vendors are rapidly innovating to boost their advantages against competitors. 39
  • 40. Prediction 5: Operating system features proliferate Mobile technology companies are increasingly aligning their mobile offerings with other services they provide. For example, Google Android 4.4 (KitKat) continues the trend of deeper integration with Google+, Google Now, and other Google services. Apple, Amazon, and Microsoft are doing the same. Some of this is driven by consumerization of IT, but it also demonstrates that mobile players see services as critical to their competitive strategy. 40
  • 41. Prediction 5: Operating system features proliferate How businesses handle these developments remains to be seen. Many companies have significant investment in Microsoft technologies, which could give the Microsoft mobile solution set an advantage in the business world. 41
  • 42. Prediction 5: Operating system features proliferate One focus is the growing need to separate business and personal data, which once required custom third-party solutions to implement. Now, Apple offers data segregation as a platform-level feature with iOS 7, and LG and Samsung provide it as part of their enterprise security offerings (GATE and Knox, respectively). 42
  • 43. Prediction 5: Operating system features proliferate This growing trend is good for businesses, as it is part of the overall push by device makers to improve their enterprise capabilities and find revenue streams outside the increasingly saturated consumer market. 43
  • 44. Prediction 5: Operating system features proliferate New features need to be secured and managed While mobile platforms increasingly include business-friendly features such as data segregation, data protection, and single sign on, the market is still clearly driven by consumer preferences. 44
  • 45. Prediction 5: Operating system features proliferate Just as BYOD shifted corporate security strategies by bringing Dropbox and other sharing services inside the corporate firewall, consumer device features will continue to create management and security challenges for businesses. 45
  • 46. Prediction 5: Operating system features proliferate One writer predicts that Android will feature universal messaging, real-time location tracking, enhanced payments services, and other features by 2020. All of these have potential policy, security, and management implications for businesses as employees connect Android devices to the corporate network. 46
  • 48. Prediction 6: Mobile users drive cloud adoption Cloud computing has generated its fair share of hype, but it remains a growing phenomenon in the enterprise. While cloud vendors often cite cost savings and scalability as key advantages of adopting their solutions, growth in cloud services will continue to be driven largely by demand from mobile users. 48
  • 49. Prediction 6: Mobile users drive cloud adoption Enterprise cloud storage vendor Box, for example, has grown rapidly not because companies are divesting themselves of local storage for cost reasons, but because mobile users want an easy way to share and access files. 49
  • 50. Prediction 6: Mobile users drive cloud adoption Providers of cloud services and apps will aggressively roll out new and powerful features to appeal to mobile business users. They will also enhance the consistency of the user experience across major device platforms. 50
  • 51. Prediction 6: Mobile users drive cloud adoption Gartner recently predicted that the market for cloud-based security-as-a- service will continue to grow. Innovations in this area will increasingly provide new ways for companies to authenticate users and secure data and networks across onpremises and cloud-based deployments. These developments may increase the utility of cloud services for enterprise mobile use. 51
  • 53. Prediction 7: Mobile titans jockey for position What do Palm, Nokia, and BlackBerry (formerly known as Research in Motion) have in common? They were all vast, successful, highly profitable enterprises that defined the mobile technology landscape over the past decade. And all were (or are in the process of being) sold for a small fraction of their peak value. 53
  • 54. Prediction 7: Mobile titans jockey for position When the divide between business and consumer technology was wider, vendors could count on winning market share by appealing to business decision makers with enterprise-friendly features. 54
  • 55. Prediction 7: Mobile titans jockey for position In the mobile space today, consumers drive adoption and businesses play catch up. The remaining players are businesses that have succeeded in building more than mobile devices. They have created strong brands and rich ecosystems that keep fickle customers loyal. 55
  • 56. Prediction 7: Mobile titans jockey for position Competition drives innovation Amazon, Apple, Google, Microsoft, and Samsung will continue battling for dominance in the mobile space. Competition will deliver continued innovations in hardware, user experiences, cloud services, apps, and content. Some of these innovations will be a boon to enterprise, while others will create challenges. 56
  • 57. Prediction 7: Mobile titans jockey for position Although consumer preferences still drive mobile technology development, manufacturers are increasingly recognizing enterprise needs. In any case, while mobile vendors may seem to have secured positions in the mobile market, their strategic wiggle room is shrinking and there may be further consolidation in the not-too-distant future. 57
  • 58. Conclusion: 2014 predictions slide deck Conclusion Mobile is a moving target—steady your aim. In such a fast-moving market, it is challenging to predict how things will look next quarter, let alone next year. One thing is certain: enterprises will continue to adopt mobile technology at a rapid pace. They will need to keep evolving their approach to security, compliance, management, and deployment of mobile devices, services, and apps to maintain ROI and competitive advantage.
  • 59. Conclusion: 2014 predictions slide deck Enterprise Mobile is well-positioned to help organizations achieve their mobility goals with a holistic approach to planning, implementing, and managing mobility environments. Through our comprehensive portfolio of services, we can simplify your company’s transition to enterprise mobility today and help you get the most from tomorrow’s mobile technology innovations. For more information, visit www.enterprisemobile.com or contact info@enterprisemobile.com. Or follow us online: / / / / 59