BYOD: Infrastructure Requirements & the Effect on Business Processes

Size: px
Start display at page:

Download "BYOD: Infrastructure Requirements & the Effect on Business Processes"

Transcription

1 BYOD: Infrastructure Requirements & the Effect on Business Processes By Philip Clarke Research Analyst, Nemertes Research Executive Summary Increasingly, employees no longer must be tethered to an Ethernet port or power plug to complete their workday. Rather, these employees need only a Wi- Fi or cellular link for connectivity to the enterprise. This trend stems not only from the nature of these workers tasks but also the growth of mobility and mobile devices as true content creation engines. Enterprise- enabled mobile devices are no longer the domain of only salespeople, field workers, and ipad- toting executives. Most employees are now choosing their devices and associated work habits based on a combination of their daily job requirements and personal preferences. Accordingly, this paper will examine emerging work models, supporting security and infrastructure adoption and the devices that are driving this growth. As bring your own device (BYOD) purchasing models continue to flourish within the enterprise, IT professionals remain unconvinced that offloading device and monthly fees to the employee outweigh the security and direct costs of BYOD- supporting infrastructure. Along with other new work trends, this report will review the pros and cons of teleworking and how wireless- only workers are changing how companies view the importance of WLAN. Readers will walk away with a clear perspective on what is driving wireless- only work, what they should do to enable it, what infrastructure requirements IT should address, and the productivity, monetary, and overall success to expect. The Issue The growth in mobile workers is driving the adoption of faster, more secure, and more integrated wireless technologies. The promise of Wireless Local Area Networks (WLAN) and 4G cellular as enabling technologies are coming to fruition - not as convenience or back- up to wired Ethernet, but as primary access methods for many employees and their endpoints. Companies investments in wireless technologies reflect a) an understanding with the exception of a few holdouts that it s required for mobility and b) a few fundamental and powerful cultural changes taking place in the enterprise. First and foremost, a growing number of employees are demonstrating Nemertes Research 2013 ± ± ± DN2565 1

2 their preference for mobile devices as work tools for all but the most computationally demanding tasks. Laptops and even desktop PCs still have their place, but only as a necessity as tablet architecture catches up. Additionally, employees are validating their changing preferences in the devices they bring to work, which are largely tablets, smartphones or laptops/hybrids rather than corporate- provisioned endpoints. With this shift in devices, work habits and processes, IT professionals continue to face the challenging task of ensuring corporate resources remain secure, while fostering infrastructure that enables employees device, mobile work, and instant information access requirements. To accomplish these ostensibly conflicting goals of marrying security with enablement, IT departments are adopting solutions such as Mobile Device Management (MDM) and Mobile Application Management (MAM), Secure Document Shares (SDS), Virtual Desktop Interface (VDI) and robust, high capacity WLANs. BYOD & the New Mobile Workforce Underscoring and driving the new mobile workforce are the popularity of consumer- oriented devices and the rapid acceptance of employee- owned devices (a trend known as BYOD, or Bring Your Own Device). In only a couple of years, the average organization s mobile device inventory has shifted from nearly all Blackberry to 45% ios (iphones and ipads) and 24% Android (smartphones and tablets). These devices app- centric interfaces have changed the way employees tackle work and personal tasks, as workers become more accustomed to using apps to access, create, and even learn information. The upshot? Businesses are changing their processes to also fit this world of apps, resulting in procedure redesign and development that require best practices to succeed. BlackBerry s Fall, ios Rise Although the enterprise stalwart BlackBerry still comprises 30% of companies devices, this number will drop significantly by the end of Further demonstration that consumerization and BYOD are impacting BlackBerry s bottom line, the companies enterprise focus has shifted in acknowledgement of ios dominance. BlackBerry has modernized their platform in version 10 of its mobile OS with a fully- touch based interface however, the popularity of ios and Android and their much larger and complete app catalog s make BlackBerry a difficult sell for both employees and corporate provisioning bodies. BYOD Benefits & Cost Savings BYOD continues to grow within the enterprise as a popular purchasing model, reflected in the 69% of organizations using it either as part of a larger purchasing strategy or as their sole policy (19%). Top examples of BYOD s benefits include allowing employees and executives to use devices of their preference, associated employee productivity increases, sparking lasting IT and business unit working Nemertes Research 2013 ± ± ± DN2565 2

3 relationships, and expected cost savings, particularly after organizations pay off BYOD- supporting capital infrastructure investments. Figure 1: BYOD & Combination Models Less Expensive Than IT-Purchased Though BYOD lets companies offload device, monthly, and some app expenses to employees, infrastructure such as MDM, MAM, SDS can make the tradeoff an expensive proposition, at least in the early phases of deployment. Nemertes gathered data on mobility budgets, including device and service costs, as well as associated security, app development, and WLAN infrastructure. By correlating mobile budgets per employee with purchasing model, we find the most expensive model is when IT purchases the devices ($820 per employee). Companies that only use employee- purchased devices still spend $500 per employee, and those that have adopted a combination model (business units, IT, and employees buy devices) spend the least ($350 per employee) These figures underscore that a) BYOD is cheaper than IT- purchased today and b) is even less expensive if it s targeted to specific roles where BYOD lends itself well, i.e. knowledge workers, travelling, field or teleworkers and salespeople (Please see Figure 1). BYOD might prove to be the least expensive option over time as supporting systems capital expenses are amortized and/or diluted by the scale of BYOD deployments. Conversely, the costs of supporting a larger, more diverse BYOD population may end up being more expensive for IT departments, outweighing the potential savings. Nemertes Research 2013 ± ± ± DN2565 3

4 BYOD, Mobility Aligned With Business Process Initiatives In many companies, the complexities and cross- departmental considerations of enabling mobility serve as a showcase for how IT should work side- by- side with business units to ensure both company usage and technology requirements are met. Some popular initiatives that CIOs are engaging in with requirements that parallel mobility enablement projects include: Embedded networks and facilities Business strategy and product development Logistics and automation To the point, 100% of companies engaging in these joint CIO and business- unit projects use BYOD as their only purchasing model. Further exploration of this link between cutting edge process design and BYOD strategies reveals companies involved in these projects also report the highest overall mobility success. Telework & Telecommuting Like BYOD, the promise of cost reductions with remote work and telecommuting help companies to drive initiatives to support virtual work, resulting in better supporting infrastructure and improved or lower- cost business processes. With our plans on reducing real- estate costs, we will integrate [mobile devices] with other applications and provide better support for home/teleworkers, including better integration with SharePoint, Exchange, LiveMeeting and Lync, says the senior architect of a very large, global manufacturing firm. In organizations that expect their full- time telecommuting workforce to increase from 2012 to 2013 report 7.1% of their workforce is wireless- only, meaning they never use a wired connection throughout their workday (versus 4.3% and 1% wireless- only workers in companies reporting full- time telecommuting as being flat or decreasing, respectively). Wireless Workforce & Infrastructure The average office building of yesteryear was well connected with wired Ethernet but not wireless, driven by a workforce equipped with heavy laptops and heavier desktops. Accordingly, companies approached WLAN (Wi- Fi) as a convenience technology, resulting in spotty or location- specific deployments. Fast- forward to today, and most employees are not only using WLAN and/or cellular as their primary method of access, many use wireless as their only way of connecting to the enterprise. These wireless- only users comprise a small, but growing segment of the workforce. (Please See Figure 2). However, Nemertes expects this number is likely to see a bigger jump in as tablets move from ancillary, consumption- focused devices to PC replacements. The demands these workers and their increasingly wireless devices Nemertes Research 2013 ± ± ± DN2565 4

5 place on WLAN and cellular infrastructure requires companies to rethink how they enable local or remote wireless access.!"#$%#&%'()*+(,%-./0%.1% ).3%6%-7-%8-#-%% Wireless Only Users 20.00% 18.00% 16.00% 14.00% 12.00% 10.00% 8.00% 6.00% 7.60% 9.56% 11.30% 4.00% 2.00% 0.00% Figure 2: Steady Climb: Wireless Only Workers % WLAN As Primary Mode of Access WLAN deployments within the enterprise continue to grow, both in terms of capacity and functionality as companies look to support a variety of wireless initiatives. Though almost 85% of companies have upgraded their WLANs to newer n access points (APs), capacity concerns remain. Enterprises are planning to add 81% capacity to their WLANs through Moreover, companies are provisioning 74% of this growth specifically for tablets and smartphone usage. Cost considerations are also driving companies to deploy WLAN; with more devices requiring it and workers preferring wireless over wired, the expense of wired connections makes Ethernet cabling redundant. However, IT organizations pushing WLAN as a viable alternative or replacement for wired connectivity should expect resistance. A problem we face is that out facilities budgets haven t evolved with the times, so [while] we know that WLAN is $1 per square foot, facilities doesn't include IT in their thought process, says the global network infrastructure architect of a very large manufacturing company. Still, the value proposition for WLAN or wireless- only deployments continues to solidify, especially as mobile devices become more powerful and empowered within organizations. Nemertes Research 2013 ± ± ± DN2565 5

6 WLAN For MDM, MAM & More Vendor offerings in the WLAN space have matured substantially to offer companies more mobile and particularly BYOD- specific functionality over the last few years. Nemertes coined the term network- based mobile device management or NMDM, a descriptor of capabilities designed to extend mobile security and enablement to the edge of the network. Figure 3: MDM and MAM adoption Top Mobile Security Particularly well- suited to companies with large BYOD populations, NMDM allows companies to start applying advanced network functionality that are based off of both long- standing network standards and vendor specific functionality, including: App- level Quality of Service (QoS) Device fingerprinting (a snapshot of a connecting device s operating system, security stance and installed apps) Radio Frequency (RF) optimizations, Software- defined antennae techniques Air- time sharing to maintain network speed across devices Anti- clustering tools that reflect the way employees collaborate Adjacent tools, such as virtual private networks (VPN) and virtual desktop infrastructure (VDI) along with network monitoring tools enables IT professionals to have a complete picture of the mobile devices on their network (Please see Figure 3.). Essentially, NMDM products enable end- to- end mobile device security, giving IT Nemertes Research 2013 ± ± ± DN2565 6

7 departments the confidence to start developing mobile app strategies in the face of mounting security issues. Mobile Security Infrastructure Trends BYOD and consumer- focused devices have made traditional mobility infrastructure, such as Blackberry Enterprise Server (BES) and Exchange ActiveSync (EAS), far less effective. These systems are essentially the forerunners to modern day MDM, but lag behind in terms of capability to support the special requirements of ios and Android devices. Accordingly, companies are adopting MDM solutions that fully support their growing consumer- oriented device population at a rapid pace; 46% of companies are using a solution today, with a 84% of organizations expecting to have it deployed by the end of Complementary to MDM, many companies are getting their MAM as part of a MDM/MAM bundle. This makes sense, but companies are lagging behind with their deployments of MAM features as they first ensure 84% of companies expect to be using MDM by the end of 2014 devices are secure before worrying about app delivery. Although 29% of organizations are using MAM today, another 18% expect to deploy it through 2013 and an additional 18% of enterprises are evaluating it. Increasingly bundled with MDM, 29% of companies use SDS today, with another 18% of organizations looking to deploy it through MDM, MAM and SDS are fundamental to ensuring that mobility is properly secured, enabled and distributed based on identity. As companies devices populations become increasingly diverse due to BYOD and consumerization, mobile security infrastructure including NMDM, MDM, MAM and SDS are necessary to both secure and enable mobile endpoints. 4G & Cellular Considerations Most organizations are doing everything in their power to mitigate any hindering effects cellular access might be having on mobility growth and employee productivity. We are building our own DAS [Distributed Antenna Systems] and letting mobile operators bid on using them for office locations and/or sites that have really poor cellular coverage, says the manager of telecommunications at a very large, global manufacturing firm. Organizations like this are involved in projects that underscore a trend 57.1% of companies continue to report: Sporadic or insufficient cellular availability is affecting enterprise adoption of 4G data. Early 4G offers speeds ranging from 8 Mbps to 40 Mbps in real world tests, speeds which are comparable to many small business- class wireline solutions. So, even with decreasing data caps, rising data and voice costs and reliance on a non- enterprise network, 4G continues to be an attractive mobility enabler for many organizations. Nemertes Research 2013 ± ± ± DN2565 7

8 Conclusions and Recommendations Mobility and BYOD continue to drive and enable myriad of forces within the enterprise, including different work patterns ranging from wireless- only to telecommuting workforces to IT looking at business processes in a completely new light. BlackBerry has given way to more consumer- oriented devices running ios and Android, highlighting an inflection point in not only how companies see the role of mobility today, but also how employees prefer to work, learn, create and consume. The infrastructure requirements to properly leverage mobile devices are substantial, including mature technologies such as MDM, MAM and SDS along with nascent offerings such as NMDM. WLAN and cellular are the only way for mobile devices to connect, a fact reflected in the amount of effort and investment companies are putting forth to ensure their wireless assets are up to the task. Companies that look at mobility as an opportunity rather than a consumer- driven security risk and/or money drain, are ideally suited to enjoy the productivity of a truly enabled workforce. Nemertes recommends you consider the following: ± IT professionals should review BYOD, ensuring that there are good reasons for deploying it; some top reasons include allowing employee preferences, mobility success aspirations and even a showcase for the advantages of IT/business- unit joint ventures. ± When evaluating BYOD mainly as a way to save money, IT staffs should look at supporting infrastructure costs over normal ROI/NPV cycle to see if cost per device starts trending downwards towards the end of this cycle versus more traditional or existing device provisioning methods. Organizations can use these findings to inform whether or not BYOD is worth it, and for what types of employees. ± IT workers should ensure they have the right supporting infrastructure for mobility and BYOD: Intelligent Access Points (AP)s, WLAN & WAN capacity, virtual desktop interface (VDI) or terminal services for application access as needed, as well as a VPN endpoint client and infrastructure. ± Companies looking to use NMDM for a converged NAC, MDM and MAM platform, should review the costs of purchasing enabled AP(s) and other WLAN infrastructure many offerings are enabled through a standard- based OS to work on any WLAN. ± Given MAM and apps growing role in how people perceive information, IT professionals should review whether they have substantial enough apps to warrant MAM, or if this would be more of a cost burden. About Nemertes Research: Nemertes Research is a research-advisory and strategicconsulting firm that specializes in analyzing and quantifying the business value of emerging technologies. You can learn more about Nemertes Research at our Website, or contact us directly at research@nemertes.com. Nemertes Research 2013 ± ± ± DN2565 8

Tablets: Will They Replace PCs?

Tablets: Will They Replace PCs? Tablets: Will They Replace PCs? By Phil Clarke Research Analyst, Nemertes Research Executive Summary As mobility becomes more prevalent within the enterprise, tablets are becoming crucial tools with specific

More information

Networking for the BYOD Enterprise

Networking for the BYOD Enterprise Networking for the BYOD Enterprise By Philip Clarke Research Analyst, Nemertes Research Executive Summary For many companies, the transition to Bring Your Own Device (BYOD) and provisioning the right supporting

More information

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring

More information

Video Conferencing: A TCO Analysis

Video Conferencing: A TCO Analysis Video Conferencing: A TCO Analysis A Look at What Companies Really Spend By Irwin Lazar, Vice President & Research Director, Nemertes Research Philip Clarke, Research Analyst, Nemertes Research Executive

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager justrong@novell.com

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager justrong@novell.com Community Chat MDM Meets Endpoint Mgmt Justin Strong Sr. Product Marketing Manager justrong@novell.com Bryce Romney Product Manager bromney@novell.com The next 45 minutes or so Why is MDM so important

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

Practical Enterprise Mobility

Practical Enterprise Mobility Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business

More information

Smartphones and ipads: mobility blessing or technology support curse?

Smartphones and ipads: mobility blessing or technology support curse? Smartphones and ipads: mobility blessing or technology support curse? harris.com Smartphones and ipads: mobility blessing or technology support curse? An ipad and a smartphone walk into a building and

More information

UNB s Mobility Strategy 2016 2017

UNB s Mobility Strategy 2016 2017 UNB s Mobility Strategy 2016 2017 The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative mobile technologies that

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in

More information

Mobile Application Development Meets the Mainstream

Mobile Application Development Meets the Mainstream Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER August 2012 Mobile Application Development Meets the Mainstream Fragmentation and Chaos Is the New Normal... 3 Content Consumption versus Content

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.

More information

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document

More information

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE BLUEPRINT Cisco Small and Medium Business Class Solutions Cisco offers small and medium-sized business customers a suite of intelligent

More information

Mobile Security: The good, the bad, the way forward

Mobile Security: The good, the bad, the way forward Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &

More information

Monitoring & Measuring: Wi-Fi as a Service

Monitoring & Measuring: Wi-Fi as a Service Monitoring & Measuring: Wi-Fi as a Service Parker Smith, Director of Business Development, ProCloud Services, ADTRAN IT Professional Wi-Fi Trek 2015 Agenda Wireless Trends and Impacts How Cloud Wireless

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic

More information

Mobile and BYOD Strategy

Mobile and BYOD Strategy Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring

More information

Enterprise on the Go. How enterprises can leverage mobile apps

Enterprise on the Go. How enterprises can leverage mobile apps Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.

More information

The flexible workplace: Unlocking value in the bring your own device era

The flexible workplace: Unlocking value in the bring your own device era IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile

More information

Empowering Students with Mobility and BYOD Technology

Empowering Students with Mobility and BYOD Technology Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices

More information

Real-World Scale for Mobile IT: Nine Core Performance Requirements

Real-World Scale for Mobile IT: Nine Core Performance Requirements White Paper Real-World Scale for Mobile IT: Nine Core Performance Requirements Mobile IT Scale As the leader in Mobile IT, MobileIron has worked with hundreds of Global 2000 companies to scale their mobile

More information

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS

More information

The Ultralight Branch

The Ultralight Branch The Ultralight Branch By John E. Burke Principal Research Analyst, Nemertes Research Executive Summary The distributed, virtualizing enterprise seeks to limit or break the relationship between physical

More information

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM PREPARED BY DANIEL MAYCOCK AND FRED CLARKE SLALOM CONSULTING INTRODUCTION The use of mobile devices in enterprises is

More information

The New Workplace: Supporting Bring your own

The New Workplace: Supporting Bring your own IBM Global Technology Services Thought Leadership White Paper December 2011 The New Workplace: Supporting Bring your own 2 The New Workplace: Supporting Bring your own Contents 2 Consumerization takes

More information

White. Paper. Citrix XenDesktop Eases Windows 7/8.1 Migration. October 2013

White. Paper. Citrix XenDesktop Eases Windows 7/8.1 Migration. October 2013 White Paper Citrix XenDesktop Eases Windows 7/8.1 Migration By Mark Bowker, Senior Analyst October 2013 This ESG White Paper was commissioned by Citrix and is distributed under license from ESG. 2013 by

More information

2015 Survey: Managing Apple Devices in the Enterprise

2015 Survey: Managing Apple Devices in the Enterprise 2015 Survey: Managing Apple Devices in the Enterprise 2015 Survey: Managing Apple Devices in the Enterprise The annual JAMF Software Trends Survey uncovers trends associated with Apple adoption in business,

More information

alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence

alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence the corporate network is under pressure Today, corporate networks are facing unprecedented

More information

Best Practices for Deploying Wireless LANs

Best Practices for Deploying Wireless LANs Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

Access Tropical Cloud Desktop from Any Device

Access Tropical Cloud Desktop from Any Device Access Tropical Cloud Desktop from Any Device Tropical Business Solutions White Paper Contents What is Tropical Cloud Desktop?... 3 Information you are going to need... 3 How to connect to the Tropical

More information

The 9 Pillars of Enterprise Mobility

The 9 Pillars of Enterprise Mobility The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align

More information

Empower the Workforce With BYOD and Collaboration 5 propose

Empower the Workforce With BYOD and Collaboration 5 propose Empower the Workforce with BYOD and Collaboration Cloud-Based Unified Communications Enhances BYOD Strategies January 2014 Prepared by: Zeus Kerravala Empower the Workforce with BYOD and Collaboration

More information

Is It Time To Refresh Your Wireless Infrastructure?

Is It Time To Refresh Your Wireless Infrastructure? A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies October 2015 Is It Time To Refresh Your Wireless Infrastructure? Table Of Contents Executive Summary... 1 The Age Of The

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

State of the Enterprise Tablet Market

State of the Enterprise Tablet Market A Supplement to Mobile Enterprise Magazine State of the Enterprise Tablet Market The New Age of True Mobile Computing Impact of BYOD on Tablets Acceptance in the Enterprise OS Trends The major technology

More information

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint

More information

Business Benefits of Smarter Networks for Smarter Branches

Business Benefits of Smarter Networks for Smarter Branches Business Benefits of Smarter Networks for Smarter Branches By John Burke CIO and Principal Research Analyst, Nemertes Research Executive Summary The next iteration of the WAN and the branch is an opportunity

More information

Welcome to the era of the anywhere worker

Welcome to the era of the anywhere worker Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Mobility in Claims Management

Mobility in Claims Management January 2014 Mobility in Claims Management Aparna Krishnan, SENIOR BUSINESS ANALYST, BFSI-Insurance Practice 2 CONTENTS CLAIMS TRANSFORMATION IS THE WAY TO GO 3 BUSINESS DRIVERS FOR ADOPTING MOBILE SOLUTIONS

More information

Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy

Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy PRESENTED BY: Giannis Loussidis EMM Landscape 2 Enterprise Mobility Management Landscape 77% of US and European businesses

More information

Enterprise Broadband Access:

Enterprise Broadband Access: Enterprise Broadband Access: What s Your Choice? Executive Summary Today, broadband access isn t just about making a connection to the Internet; it s about running bandwidth-intensive business and multimedia

More information

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise

More information

Cisco Virtual Office: Flexibility and Productivity for Your Workforce

Cisco Virtual Office: Flexibility and Productivity for Your Workforce Cisco Virtual Office: Flexibility and Productivity for Your Workforce The Cisco Virtual Office solution provides secure, rich network services to workers at locations outside of the traditional corporate

More information

ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices

ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices The Landscape of IT Services Provision is Changing! Customers and users are demanding a higher level of customer service

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

allchoice We are XMA. Empowering employee device choice within the workplace

allchoice We are XMA. Empowering employee device choice within the workplace allchoice Empowering employee device choice within the workplace We are XMA. We are XMA. We deliver innovative IT solutions that enhance how people learn, teach, govern, deliver healthcare and do business.

More information

How Desktop-as-a-Service Can Solve Higher Education s End-User Computing Challenges

How Desktop-as-a-Service Can Solve Higher Education s End-User Computing Challenges How Desktop-as-a-Service Can Solve Higher Education s End-User Computing Challenges Colleges and universities face considerable end-user computing challenges today. Here s how moving to cloudhosted desktops

More information

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity

More information

Mobilize your Enterprise in 60 Minutes!

Mobilize your Enterprise in 60 Minutes! Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

Profiting from the Rise of Wi-Fi

Profiting from the Rise of Wi-Fi Cisco Internet Business Solutions Group (IBSG) Cisco IBSG 2012 Cisco and/or its affiliates. All rights reserved. Profiting from the Rise of Wi-Fi New, Innovative Business Models for Service Providers Authors

More information

BYOD: Moving toward a More Mobile and Productive Workforce

BYOD: Moving toward a More Mobile and Productive Workforce Montana Tech Library Digital Commons @ Montana Tech Business & Information Technology Faculty Scholarship 2013 BYOD: Moving toward a More Mobile and Productive Workforce D. Lance Revenaugh, Ph.D. Montana

More information

Mobile Device Inventory the first step in enterprise mobile management

Mobile Device Inventory the first step in enterprise mobile management Mobile Device Inventory the first step in enterprise mobile management EXECUTIVE SUMMARY As phones and tablets overtake PCs as the most-often used means of connecting to company data and apps, organizations

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM ESG Solution Showcase SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract:

More information

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case

More information

FROM TELEPHONY TO IP COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH IP COMMUNICATIONS APPLICATION NOTE

FROM TELEPHONY TO IP COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH IP COMMUNICATIONS APPLICATION NOTE FROM TELEPHONY TO COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH COMMUNICATIONS APPLICATION NOTE CONTENTS INTRODUCTION / 3 INCREASE PRODUCTIVITY WITH A CONNECTED WORKSTATION

More information

Vision on Mobile Security and BYOD BYOD Seminar

Vision on Mobile Security and BYOD BYOD Seminar Vision on Mobile Security and BYOD BYOD Seminar Brussel, 25 september 2012 Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl +31 610 999 199 1

More information

Bring Your Own Device - A Case Study

Bring Your Own Device - A Case Study A FROST & SULLIVAN EXECUTIVE SUMMARY Navigating the Enterprise Mobility Maze to a BYOD Strategy In Collaboration With: View the ondemand version of the ebroadcast: www.frost.com/byod Thanks to the rapid

More information

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global

More information

Compliance Management for Mobile Devices

Compliance Management for Mobile Devices Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration

More information

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2 WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with

More information

CLOUD COLLABORATION. Understanding the Options to Find the Right Fit. September 2012. Robert Chilton. Prepared by:

CLOUD COLLABORATION. Understanding the Options to Find the Right Fit. September 2012. Robert Chilton. Prepared by: CLOUD COLLABORATION Understanding the Options to Find the Right Fit September 2012 Prepared by: Robert Chilton Every CEO s wish list includes a desire for tools that enable innovation, growth and boost

More information

Unified Communications, Diverse Benefits

Unified Communications, Diverse Benefits TECHNOLOGY SOLUTIONS Unified Communications, Diverse Benefits Adopting a unified communications platform increases productivity, reduces costs and improves end-user service. Your staff may sit in cubicles

More information

Mobile Center of Excellence

Mobile Center of Excellence Mobile Center of Excellence Mobility is fast emerging as a critical component of the enterprise application architecture as smart devices, next generation service provider networks and clouds enable rich

More information

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Legal Statement This product roadmap sets forth Juniper Networks current intention

More information

Preparing your network for the mobile onslaught

Preparing your network for the mobile onslaught IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing

More information

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management. 1 FUTURE FOCUS What s Coming in Enterprise Mobility Management Whitepaper 2 Future Focus: What s Coming in Enterprise Mobility Management (EMM) There s far more power in modern smartphones and tablets

More information

Solve BYOD with! Workspace as a Service!

Solve BYOD with! Workspace as a Service! Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

Mobilize to Rightsize Your Network

Mobilize to Rightsize Your Network Mobilize to Rightsize Your Network Table of Contents How enterprise mobility can reduce the total cost of network ownership by 70 percent 3 Mobility means cost savings 3 Getting started on savings 4 Make

More information

Mobile Network Access Control

Mobile Network Access Control Mobile Network Access Control Extending Corporate Security Policies to Mobile Devices WHITE PAPER Executive Summary Network Access Control (NAC) systems protect corporate assets from threats posed by devices

More information

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

BYOD Networks for Kommuner

BYOD Networks for Kommuner BYOD Networks for Kommuner Simon Tompson Solutions Architect @MerakiSimon About Meraki The recognized leader in Cloud Networking - Thousands of customer networks in over 100 countries worldwide - World

More information

http://www.velocis.in Extending Collaboration to BYOD Devices

http://www.velocis.in Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

State of Mobility Survey. France Results

State of Mobility Survey. France Results State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

SAP White Paper Enterprise Mobility. Best Practices for a Mobility Center of Excellence Keeping Pace with Mobile Technology

SAP White Paper Enterprise Mobility. Best Practices for a Mobility Center of Excellence Keeping Pace with Mobile Technology SAP White Paper Enterprise Mobility Best Practices for a Mobility Center of Excellence Keeping Pace with Mobile Technology Table of Contents 5 Executive Summary 6 Exploring a Mobility Center of Excellence

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Mobile Device Security Risks and RemediaAon Approaches

Mobile Device Security Risks and RemediaAon Approaches Mobile Device Security Risks and RemediaAon Approaches Raj Chaudhary, Principal, Crowe Horwath LLP In- Depth Seminars D11 CRISC CGEIT CISM CISA Informal Poll What is your Atle/role? Internal Audit IT Audit

More information

The transformation of client device and the rise of cloud computing

The transformation of client device and the rise of cloud computing The transformation of client device and the rise of cloud computing 客 戶 端 設 備 的 轉 化 和 雲 端 運 算 的 崛 起 Jason Lui HP Inc. Agenda 1. Some Definition & Industry Trends 2. Trend for Client end in Cloud Computing

More information

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest

More information

So, you need a mobility strategy Five things you must do. David P Merrill Senior Technical Staff Member June 2012

So, you need a mobility strategy Five things you must do. David P Merrill Senior Technical Staff Member June 2012 So, you need a mobility strategy Five things you must do. David P Merrill Senior Technical Staff Member June 2012 Mobile is a major driver in the evolution of computing Employees Mobile/Wireless/Cloud

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems Overcoming IP Address Issues with Remote Monitoring and Alarm Systems Released on April 14, 2009 Stanley Liu, Product Manager stanley.liu@moxa.com is a communication technology that allows data acquisition

More information

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville

More information

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION Executive Summary Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information