SlideShare a Scribd company logo
The rise in mobility has raised
challenges around connectivity,
security, visibility, and productivity.
It places significant pressure on CIOs
to keep pace with a new digital
transformational age and changing
end-user habits.
The CIO as catalyst
for transformation
Our recent Mobile Workforce
Report (MWR) indicated that more
than half of its respondents saw a
return on investment from
mobility-related initiatives.
It’s hardly surprising in light of
mega trends such as social media,
mobility, analytics, and cloud.
Create workspaces
for tomorrow by
embracing mobility
and smart-working
solutions
End-users want to be able to access
applications to complete work tasks
and be productive, in and outside of
the traditional office space. The CIO’s
focus must be on ensuring the right
levels of security are being afforded to
mobile enterprise applications without
putting the network at risk.
Security through
The network lens
The challenge is that there’s no
longer control over traditional IT,
because the edge of the network
has moved. Business applications
may, or may not, reside in an
on-premise data centre,
or alternatively in a private or public
cloud, or a hybrid thereof.
Granting the
employee
ubiquitous access
to the corporate
network
The biggest change is the role of the
network in security, as it relates to
mobility. Fewer firewalls and perimeter
devices will be deployed in a data
centre, because the network has
increasingly become the security
endpoint.
Wireless and wired
access – the 80/20
rule
While traditional IT can enable access
for a computer or device working
from a standard operating system,
the explosion of IoT will drive a
significant amount of growth in
technology, or even non-technology,
that needs to be IT enabled.
The Internet of
complexity
This introduces another stumbling
block for CIOs: the lack of
interoperability and integration
between business systems and the
data centre. Programming interfaces
need to allow for the proliferation
of new devices, while being simple
enough not to complicate their use.
The Internet of
complexity
continued
Going forward, CIOs will need to focus
on how users will connect to an
application, as well as the best use of
that application. It means a shift from
the typical manual user-based
intervention to policy-based
abstraction — so the focus will be
more on people, policies,
and the platform.
People, policy, and
platform
As the end-user wants access to more
in terms of applications, connectivity
becomes more and more prevalent.
Those organisations that offer flexible
work experiences, and improved access
control to the information,
are transforming the fastest.
It’s not about the
end-user; it’s about
what the end-user
needs
The network, often seen as a laggard
in the transformational journey, now
has to be able to provide business with
significant speed, agility and, of
course, security.
Picking up the pace
It’s exciting to see the pace change in
networking as a technology after years
of stagnation. The evolution is
allowing CIOs to facilitate mobility and
end-user computing in a way that’s
not restrictive to the mobile worker.
By making the network a security
endpoint, it’s allowing more flexibility
in rolling out applications and services.
Concluding
thoughts

More Related Content

What's hot

Can you afford (not) moving to the cloud
Can you afford (not) moving to the cloudCan you afford (not) moving to the cloud
Can you afford (not) moving to the cloud
ebuc
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakout
Orange Business Services
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1
InterQuest Group
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
Tata Tele Business Services
 
Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security
IDC Italy
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
Dean Bonehill ♠Technology for Business♠
 
Top 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - GartnerTop 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - Gartner
Dinh Le Dat (Kevin D.)
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
ebuc
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
Dr.Neeraj Kumar Pandey
 
Emerging Technology
Emerging TechnologyEmerging Technology
Emerging Technology
Krishnan Viswanath
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africatechzimslides
 
PTC: Connected Manufacturing
PTC: Connected ManufacturingPTC: Connected Manufacturing
PTC: Connected Manufacturing
Rahul Neel Mani
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
Orange Business Services
 
Internet of things cisco
Internet of things   ciscoInternet of things   cisco
Internet of things cisco
moldovaictsummit2016
 
Enable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want ToEnable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want To
DImension Data
 
Trends in IT
Trends in ITTrends in IT
Trends in IT
Rahul Sudame
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
Wikki Verma
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu India
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
IMC Institute
 
Researching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses GrowthResearching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses Growth
AJASTJournal
 

What's hot (20)

Can you afford (not) moving to the cloud
Can you afford (not) moving to the cloudCan you afford (not) moving to the cloud
Can you afford (not) moving to the cloud
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakout
 
Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1Top 10 Strategic Tech Trends 2018 Pt 1
Top 10 Strategic Tech Trends 2018 Pt 1
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security Data Privacy & The Golden Age of Security
Data Privacy & The Golden Age of Security
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Top 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - GartnerTop 10 Strategic Technology Trends 2007-2014 - Gartner
Top 10 Strategic Technology Trends 2007-2014 - Gartner
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
 
Emerging Technology
Emerging TechnologyEmerging Technology
Emerging Technology
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 
PTC: Connected Manufacturing
PTC: Connected ManufacturingPTC: Connected Manufacturing
PTC: Connected Manufacturing
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Internet of things cisco
Internet of things   ciscoInternet of things   cisco
Internet of things cisco
 
Enable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want ToEnable People to Communicate the Way They Want To
Enable People to Communicate the Way They Want To
 
Trends in IT
Trends in ITTrends in IT
Trends in IT
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
 
Researching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses GrowthResearching How Cloud Computing Enhances the Businesses Growth
Researching How Cloud Computing Enhances the Businesses Growth
 

Viewers also liked

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
DImension Data
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
DImension Data
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top Employers
DImension Data
 
The Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity EverywhereThe Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity Everywhere
Seven
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
DImension Data
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandate
DImension Data
 

Viewers also liked (6)

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top Employers
 
The Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity EverywhereThe Future of Connectivity – Connectivity Everywhere
The Future of Connectivity – Connectivity Everywhere
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandate
 

Similar to Mobility at the network’s edge

IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
Conor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
Pablo Junco
 
The Key to Going Digital: Think People
The Key to Going Digital: Think PeopleThe Key to Going Digital: Think People
The Key to Going Digital: Think People
Jennifer Stern
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationEric Lightfoot
 
8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf
online Marketing
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
curwenmichaela
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
Pablo Junco
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
thaiantivirus
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
IBM India Smarter Computing
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
Ismail Muhammad
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Troy Marshall
 
Importance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldImportance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise World
TEWMAGAZINE
 
The_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOThe_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOGlenn Mommens
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
sreevidyaopenteq
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
Eric Wong
 

Similar to Mobility at the network’s edge (20)

Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
The Key to Going Digital: Think People
The Key to Going Digital: Think PeopleThe Key to Going Digital: Think People
The Key to Going Digital: Think People
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
 
8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Importance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise WorldImportance of Network Connectivity for Business Success | The Enterprise World
Importance of Network Connectivity for Business Success | The Enterprise World
 
The_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIOThe_BT_CIO_report_2016_the_digital_CIO
The_BT_CIO_report_2016_the_digital_CIO
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 

More from DImension Data

Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
DImension Data
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
DImension Data
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
DImension Data
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
DImension Data
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
DImension Data
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
DImension Data
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
DImension Data
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
DImension Data
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
DImension Data
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
DImension Data
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
DImension Data
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
DImension Data
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
DImension Data
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
DImension Data
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
DImension Data
 
2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings
DImension Data
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?
DImension Data
 
Cure your monday morning networking headaches
Cure your monday morning networking headachesCure your monday morning networking headaches
Cure your monday morning networking headaches
DImension Data
 
Dimension Data – doing business with the biggest
Dimension Data – doing business with the biggestDimension Data – doing business with the biggest
Dimension Data – doing business with the biggest
DImension Data
 
Understanding Workspaces for Tomorrow
Understanding Workspaces for TomorrowUnderstanding Workspaces for Tomorrow
Understanding Workspaces for Tomorrow
DImension Data
 

More from DImension Data (20)

Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
 
2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings2015 Global Contact Centre Benchmarking Report key findings
2015 Global Contact Centre Benchmarking Report key findings
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?
 
Cure your monday morning networking headaches
Cure your monday morning networking headachesCure your monday morning networking headaches
Cure your monday morning networking headaches
 
Dimension Data – doing business with the biggest
Dimension Data – doing business with the biggestDimension Data – doing business with the biggest
Dimension Data – doing business with the biggest
 
Understanding Workspaces for Tomorrow
Understanding Workspaces for TomorrowUnderstanding Workspaces for Tomorrow
Understanding Workspaces for Tomorrow
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Mobility at the network’s edge

  • 1. The rise in mobility has raised challenges around connectivity, security, visibility, and productivity. It places significant pressure on CIOs to keep pace with a new digital transformational age and changing end-user habits. The CIO as catalyst for transformation
  • 2. Our recent Mobile Workforce Report (MWR) indicated that more than half of its respondents saw a return on investment from mobility-related initiatives. It’s hardly surprising in light of mega trends such as social media, mobility, analytics, and cloud. Create workspaces for tomorrow by embracing mobility and smart-working solutions
  • 3. End-users want to be able to access applications to complete work tasks and be productive, in and outside of the traditional office space. The CIO’s focus must be on ensuring the right levels of security are being afforded to mobile enterprise applications without putting the network at risk. Security through The network lens
  • 4. The challenge is that there’s no longer control over traditional IT, because the edge of the network has moved. Business applications may, or may not, reside in an on-premise data centre, or alternatively in a private or public cloud, or a hybrid thereof. Granting the employee ubiquitous access to the corporate network
  • 5. The biggest change is the role of the network in security, as it relates to mobility. Fewer firewalls and perimeter devices will be deployed in a data centre, because the network has increasingly become the security endpoint. Wireless and wired access – the 80/20 rule
  • 6. While traditional IT can enable access for a computer or device working from a standard operating system, the explosion of IoT will drive a significant amount of growth in technology, or even non-technology, that needs to be IT enabled. The Internet of complexity
  • 7. This introduces another stumbling block for CIOs: the lack of interoperability and integration between business systems and the data centre. Programming interfaces need to allow for the proliferation of new devices, while being simple enough not to complicate their use. The Internet of complexity continued
  • 8. Going forward, CIOs will need to focus on how users will connect to an application, as well as the best use of that application. It means a shift from the typical manual user-based intervention to policy-based abstraction — so the focus will be more on people, policies, and the platform. People, policy, and platform
  • 9. As the end-user wants access to more in terms of applications, connectivity becomes more and more prevalent. Those organisations that offer flexible work experiences, and improved access control to the information, are transforming the fastest. It’s not about the end-user; it’s about what the end-user needs
  • 10. The network, often seen as a laggard in the transformational journey, now has to be able to provide business with significant speed, agility and, of course, security. Picking up the pace
  • 11. It’s exciting to see the pace change in networking as a technology after years of stagnation. The evolution is allowing CIOs to facilitate mobility and end-user computing in a way that’s not restrictive to the mobile worker. By making the network a security endpoint, it’s allowing more flexibility in rolling out applications and services. Concluding thoughts