SlideShare a Scribd company logo
Channel
Bytes
Mobility Part 2: Beyond the Device
On Tap For Today
 Change in workflow
 Improving integration
 Putting it in writing
 Helping with issues
 Addressing the skills gap
The Mobility Ecosystem
Device+OS
e.g. Apple,
Samsung,
Google
Communications
e.g. Lync,
Skype, or
Native function
Public Cloud
e.g. Salesforce,
Dropbox, or
AWS-hosted systems
Private Cloud
Systems running on
Eucalyptus or
Openstack
On-premise systemsInternet
3rd Party App
Procured through
standard app
store
Custom App
Built internally or
outsourced
Mobile web
Standard browser
functionality
3G/4G
e.g. AT&T,
Verizon
Wi-Fi
Carriers,
Corporate or
Public Networks
Peripherals
e.g. keyboards
or health
monitors
CHANGE IN WORKFLOW
Amount of Workflow Change as a Result of Mobility
8%
38% 41%
10% 3%
Significant
Change
No
Change
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 400 U.S. end users
Areas of Investment
68%
67%
55%
54%
53%
47%
42%
37%
24%
24%
23%
22%
Mobile device purchasing
Wi-Fi networking
Desktop/laptop purchasing
Mobile device support
Security
Desktop/laptop support
Networking infrastructure
Cloud applications and infrastructure
Application development
Datacenter maintenance and support
Website optimization
Datacenter equipment
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 400 U.S. end users
IMPROVING INTEGRATION
Steps Towards Integration
46%
46%
39%
36%
36%
31%
41%
34%
29%
25%
29%
23%
Device usage information provided to users
IT team assists with configuring devices
Build custom mobile applications
Move applications to cloud systems
Implement/explore virtual desktops
Move to applications with mobile apps
Heavy/Moderate integration Minor/No integration
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 400 U.S. end users
PUTTING IT IN WRITING
Slow Progress in Policy Creation
30%
37%
21%
10%
2%
24%
40%
18%
12%
6%
Currently have a formal policy
Currently building a policy
Only share best practices
No set policy or practices
Don't know status of policy
2014 2013
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 400 U.S. end users
67%
39%
52%
35%
31%
24%
30%
6%
24%
11%
7%
7%
26%
24%
23%
25%
31%
31%
34%
28%
26%
3%
8%
4%
4%
8%
15%
16%
Connecting to corporate email
Accessing private corporate data
Accessing public corporate information
Internal video calls
External video calls
Using personal file-sharing app
Storing corporate data on device
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 218 U.S. end users with some form of BYOD
Addressed in policy No policy statement
Allowed Prohibited Acceptable Unacceptable
HELPING WITH ISSUES
43%
35%
31%
18%
17%
44%
44%
44%
49%
46%
Technologies need to be improved
Control security from a central location
Poor security implementation by users
Tight security impacts usability
Security is lower priority than mobility
Major issue Minor issue
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 400 U.S. end users
Many Mobile Security Issues to Solve
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 400 U.S. end users
Different Challenges for Different Companies
Medium-Sized Firms Large Firms
1. Integrating devices
2. Multiple OS
support
3. Enforcing policy
1. Balancing needs
2. Enforcing policy
3. Integrating devices
Small Firms
1. Integrating devices
2. Remote support
3. Balancing needs
19%
36%
39%
39%
39%
40%
42%
Managing suggestions from end users
Rapid pace of innovation in mobility
Supporting multiple mobile OS
Supporting devices remotely
Enforcing mobility policy among end users
Balancing the needs of end users and IT
Integrating mobile devices
ADDRESSING THE SKILLS GAP
Types of Training Provided to General Staff
29%
38%
23%
8%
30%
27%
46%
23%
19%
23%
27%
56%
45%
24%
14%
One-time sessions Ongoing training
sessions
Online training
modules
Pointer to
written policy
No official training
Small
Medium
Large
Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
Base: 400 U.S. end users
Seth Robinson
srobinson@comptia.org
@sethdrobinson
For more information, contact:

More Related Content

What's hot

DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
TNS_Australia
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?
VMware
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
Phil Reynolds
 
Toward 2012 the first mobile Olympics
Toward 2012 the first mobile OlympicsToward 2012 the first mobile Olympics
Toward 2012 the first mobile Olympics
Jedifireblade
 
Software Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP ReportSoftware Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice
 
W3W WEEK#38
W3W WEEK#38W3W WEEK#38
W3W WEEK#38
Patrick Herrmann
 
International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)
ijmnct
 
2019 SIIM Impact Report
2019 SIIM Impact Report2019 SIIM Impact Report
2019 SIIM Impact Report
Anna Zawacki
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Advantages and Disadvantages of E-marketing
Advantages and Disadvantages of E-marketingAdvantages and Disadvantages of E-marketing
Advantages and Disadvantages of E-marketing
Jyoti Srivastava
 
Call for Papers - International Journal of Mobile Network Communications & Te...
Call for Papers - International Journal of Mobile Network Communications & Te...Call for Papers - International Journal of Mobile Network Communications & Te...
Call for Papers - International Journal of Mobile Network Communications & Te...
ijmnct
 
Sophos mobile security survey 2012
Sophos mobile security survey 2012Sophos mobile security survey 2012
Sophos mobile security survey 2012Brett Martin
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec
 
IJMNCT
IJMNCTIJMNCT
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
PECB
 
Network solutions
Network solutionsNetwork solutions
Network solutionsMidshire
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
Tony Fish
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities
Peter Jarich
 
International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)
ijmnct_journal
 
WSO2Con EU 2015: Keynote - The Business Value of Open Source
WSO2Con EU 2015: Keynote - The Business Value of Open SourceWSO2Con EU 2015: Keynote - The Business Value of Open Source
WSO2Con EU 2015: Keynote - The Business Value of Open Source
WSO2
 

What's hot (20)

DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Toward 2012 the first mobile Olympics
Toward 2012 the first mobile OlympicsToward 2012 the first mobile Olympics
Toward 2012 the first mobile Olympics
 
Software Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP ReportSoftware Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP Report
 
W3W WEEK#38
W3W WEEK#38W3W WEEK#38
W3W WEEK#38
 
International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)
 
2019 SIIM Impact Report
2019 SIIM Impact Report2019 SIIM Impact Report
2019 SIIM Impact Report
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Advantages and Disadvantages of E-marketing
Advantages and Disadvantages of E-marketingAdvantages and Disadvantages of E-marketing
Advantages and Disadvantages of E-marketing
 
Call for Papers - International Journal of Mobile Network Communications & Te...
Call for Papers - International Journal of Mobile Network Communications & Te...Call for Papers - International Journal of Mobile Network Communications & Te...
Call for Papers - International Journal of Mobile Network Communications & Te...
 
Sophos mobile security survey 2012
Sophos mobile security survey 2012Sophos mobile security survey 2012
Sophos mobile security survey 2012
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
IJMNCT
IJMNCTIJMNCT
IJMNCT
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
 
Network solutions
Network solutionsNetwork solutions
Network solutions
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities
 
International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)International Journal of Mobile Network Communications & Telematics (IJMNCT)
International Journal of Mobile Network Communications & Telematics (IJMNCT)
 
WSO2Con EU 2015: Keynote - The Business Value of Open Source
WSO2Con EU 2015: Keynote - The Business Value of Open SourceWSO2Con EU 2015: Keynote - The Business Value of Open Source
WSO2Con EU 2015: Keynote - The Business Value of Open Source
 

Viewers also liked

2013 IT Hall of Fame
2013 IT Hall of Fame2013 IT Hall of Fame
2013 IT Hall of Fame
CompTIA
 
Making Informed Decisions on IT Training and Certification
Making Informed Decisions on IT Training and CertificationMaking Informed Decisions on IT Training and Certification
Making Informed Decisions on IT Training and CertificationCompTIA
 
Accelerating Managed Services
Accelerating Managed ServicesAccelerating Managed Services
Accelerating Managed Services
CompTIA
 
Today's Tech and CompTIA Certs
Today's Tech and CompTIA CertsToday's Tech and CompTIA Certs
Today's Tech and CompTIA Certs
CompTIA
 
Tech Sector Overview and Outlook shown at the TechVoice Fly-In
Tech Sector Overview and Outlook shown at the TechVoice Fly-In Tech Sector Overview and Outlook shown at the TechVoice Fly-In
Tech Sector Overview and Outlook shown at the TechVoice Fly-In
CompTIA
 
The Evolving Internet of Things
The Evolving Internet of ThingsThe Evolving Internet of Things
The Evolving Internet of Things
CompTIA
 
Military IT Career Path Study by CompTIA
Military IT Career Path Study by CompTIAMilitary IT Career Path Study by CompTIA
Military IT Career Path Study by CompTIA
CompTIA
 
2014 TechAmerica Foundation Vision Forecast Overview
2014 TechAmerica Foundation Vision Forecast Overview2014 TechAmerica Foundation Vision Forecast Overview
2014 TechAmerica Foundation Vision Forecast Overview
CompTIA
 
Reducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills DevelopmentReducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills Development
CompTIA
 
Leveraging Funding Programs in the UK and European Union
Leveraging Funding Programs in the UK and European UnionLeveraging Funding Programs in the UK and European Union
Leveraging Funding Programs in the UK and European Union
CompTIA
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...CompTIA
 
Creating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information TechnologyCreating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information Technology
CompTIA
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
CompTIA
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
CompTIA
 
IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas
CompTIA
 
Business Process Automation: Are You Ready for It?
Business Process Automation: Are You Ready for It?Business Process Automation: Are You Ready for It?
Business Process Automation: Are You Ready for It?
CompTIA
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for Businesses
CompTIA
 

Viewers also liked (17)

2013 IT Hall of Fame
2013 IT Hall of Fame2013 IT Hall of Fame
2013 IT Hall of Fame
 
Making Informed Decisions on IT Training and Certification
Making Informed Decisions on IT Training and CertificationMaking Informed Decisions on IT Training and Certification
Making Informed Decisions on IT Training and Certification
 
Accelerating Managed Services
Accelerating Managed ServicesAccelerating Managed Services
Accelerating Managed Services
 
Today's Tech and CompTIA Certs
Today's Tech and CompTIA CertsToday's Tech and CompTIA Certs
Today's Tech and CompTIA Certs
 
Tech Sector Overview and Outlook shown at the TechVoice Fly-In
Tech Sector Overview and Outlook shown at the TechVoice Fly-In Tech Sector Overview and Outlook shown at the TechVoice Fly-In
Tech Sector Overview and Outlook shown at the TechVoice Fly-In
 
The Evolving Internet of Things
The Evolving Internet of ThingsThe Evolving Internet of Things
The Evolving Internet of Things
 
Military IT Career Path Study by CompTIA
Military IT Career Path Study by CompTIAMilitary IT Career Path Study by CompTIA
Military IT Career Path Study by CompTIA
 
2014 TechAmerica Foundation Vision Forecast Overview
2014 TechAmerica Foundation Vision Forecast Overview2014 TechAmerica Foundation Vision Forecast Overview
2014 TechAmerica Foundation Vision Forecast Overview
 
Reducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills DevelopmentReducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills Development
 
Leveraging Funding Programs in the UK and European Union
Leveraging Funding Programs in the UK and European UnionLeveraging Funding Programs in the UK and European Union
Leveraging Funding Programs in the UK and European Union
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
 
Creating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information TechnologyCreating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information Technology
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas
 
Business Process Automation: Are You Ready for It?
Business Process Automation: Are You Ready for It?Business Process Automation: Are You Ready for It?
Business Process Automation: Are You Ready for It?
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for Businesses
 

Similar to Mobility: Beyond the Device

3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
Motorola Solutions
 
Mobility: Dealing with Devices
Mobility: Dealing with DevicesMobility: Dealing with Devices
Mobility: Dealing with Devices
CompTIA
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
CompTIA
 
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. CompaniesCompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. CompaniesCompTIA
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
Samir Kotarwar
 
CompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & OpportunitiesCompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & OpportunitiesCompTIA
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
Chris Pepin
 
2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities 2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities
CompTIA
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
TAKE Supply Chain
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Jim Kaplan CIA CFE
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
Info-Tech Research Group
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
IBM
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
Jorge Sebastiao
 
Chuck Jones Presentation: November 2007 Technology Trends and Directions
Chuck Jones Presentation: November 2007 Technology Trends and DirectionsChuck Jones Presentation: November 2007 Technology Trends and Directions
Chuck Jones Presentation: November 2007 Technology Trends and Directions
Chuck Jones
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
GGR Communications
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
sunnay
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
Insight UK
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
Wing Venture Capital
 

Similar to Mobility: Beyond the Device (20)

3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Mobility: Dealing with Devices
Mobility: Dealing with DevicesMobility: Dealing with Devices
Mobility: Dealing with Devices
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
 
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. CompaniesCompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
CompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & OpportunitiesCompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & Opportunities
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities 2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Chuck Jones Presentation: November 2007 Technology Trends and Directions
Chuck Jones Presentation: November 2007 Technology Trends and DirectionsChuck Jones Presentation: November 2007 Technology Trends and Directions
Chuck Jones Presentation: November 2007 Technology Trends and Directions
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 

More from CompTIA

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
CompTIA
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
CompTIA
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
CompTIA
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
CompTIA
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
CompTIA
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
CompTIA
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
CompTIA
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
CompTIA
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
CompTIA
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
CompTIA
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
CompTIA
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
CompTIA
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
CompTIA
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
CompTIA
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
CompTIA
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
CompTIA
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
CompTIA
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
CompTIA
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
CompTIA
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
CompTIA
 

More from CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

Mobility: Beyond the Device

  • 1. Channel Bytes Mobility Part 2: Beyond the Device
  • 2. On Tap For Today  Change in workflow  Improving integration  Putting it in writing  Helping with issues  Addressing the skills gap
  • 3. The Mobility Ecosystem Device+OS e.g. Apple, Samsung, Google Communications e.g. Lync, Skype, or Native function Public Cloud e.g. Salesforce, Dropbox, or AWS-hosted systems Private Cloud Systems running on Eucalyptus or Openstack On-premise systemsInternet 3rd Party App Procured through standard app store Custom App Built internally or outsourced Mobile web Standard browser functionality 3G/4G e.g. AT&T, Verizon Wi-Fi Carriers, Corporate or Public Networks Peripherals e.g. keyboards or health monitors
  • 5. Amount of Workflow Change as a Result of Mobility 8% 38% 41% 10% 3% Significant Change No Change Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 400 U.S. end users
  • 6. Areas of Investment 68% 67% 55% 54% 53% 47% 42% 37% 24% 24% 23% 22% Mobile device purchasing Wi-Fi networking Desktop/laptop purchasing Mobile device support Security Desktop/laptop support Networking infrastructure Cloud applications and infrastructure Application development Datacenter maintenance and support Website optimization Datacenter equipment Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 400 U.S. end users
  • 8. Steps Towards Integration 46% 46% 39% 36% 36% 31% 41% 34% 29% 25% 29% 23% Device usage information provided to users IT team assists with configuring devices Build custom mobile applications Move applications to cloud systems Implement/explore virtual desktops Move to applications with mobile apps Heavy/Moderate integration Minor/No integration Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 400 U.S. end users
  • 9. PUTTING IT IN WRITING
  • 10. Slow Progress in Policy Creation 30% 37% 21% 10% 2% 24% 40% 18% 12% 6% Currently have a formal policy Currently building a policy Only share best practices No set policy or practices Don't know status of policy 2014 2013 Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 400 U.S. end users
  • 11. 67% 39% 52% 35% 31% 24% 30% 6% 24% 11% 7% 7% 26% 24% 23% 25% 31% 31% 34% 28% 26% 3% 8% 4% 4% 8% 15% 16% Connecting to corporate email Accessing private corporate data Accessing public corporate information Internal video calls External video calls Using personal file-sharing app Storing corporate data on device Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 218 U.S. end users with some form of BYOD Addressed in policy No policy statement Allowed Prohibited Acceptable Unacceptable
  • 13. 43% 35% 31% 18% 17% 44% 44% 44% 49% 46% Technologies need to be improved Control security from a central location Poor security implementation by users Tight security impacts usability Security is lower priority than mobility Major issue Minor issue Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 400 U.S. end users Many Mobile Security Issues to Solve
  • 14. Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 400 U.S. end users Different Challenges for Different Companies Medium-Sized Firms Large Firms 1. Integrating devices 2. Multiple OS support 3. Enforcing policy 1. Balancing needs 2. Enforcing policy 3. Integrating devices Small Firms 1. Integrating devices 2. Remote support 3. Balancing needs 19% 36% 39% 39% 39% 40% 42% Managing suggestions from end users Rapid pace of innovation in mobility Supporting multiple mobile OS Supporting devices remotely Enforcing mobility policy among end users Balancing the needs of end users and IT Integrating mobile devices
  • 16. Types of Training Provided to General Staff 29% 38% 23% 8% 30% 27% 46% 23% 19% 23% 27% 56% 45% 24% 14% One-time sessions Ongoing training sessions Online training modules Pointer to written policy No official training Small Medium Large Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study Base: 400 U.S. end users