Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever!

Size: px
Start display at page:

Download "Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever!"

Transcription

1 Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever!

2 Executive Summary: The Survey at a Glance Small and medium-sized businesses in the DACH region are also seeing a growth in the number of employees who use mobile devices such as tablets and smartphones. This presents a number of problems for IT organizations as the number and diversity of mobile devices is increasing workloads and the level of complexity for the Service Desk. In the survey, 57 percent of IT professionals indicated that an adequate solution for managing mobile devices is not currently used in their organization. Only seven percent could confirm that the ITSM tool used in their company could also support mobile devices. The issue of licensing was clearly also a sore point: 30 percent of those polled had to admit that their company does not have a license management solution for mobile devices and apps. Content 4 The 5 The 6 Service Reality: Smartphones and Tablets but No Adequate MDM Solution Challenge: Workplace Management with Mobile Devices Desks in Companies: Not Properly Prepared for Mobility 9 The Matrix42 Approach: The Solution Is Simplicity Conclusion: Using Mobile ITSM to Counter the Rapid Growth in Mobility Appendix: Survey Implementation and Demography 7 Reasons: Why Is Mobility Characterized by such a High Degree of Complexity? 8 Critical and Unresolved: License Management in the Mobile World Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 2

3 Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! Nowadays, the use of mobile devices in companies is generally taken for granted. However, a survey conducted by Matrix42 of 1,500 attendees at a recent trade show reveals that many companies are not properly prepared for the rapid growth in mobility that is currently sweeping across the IT departments of German companies. Not only are the solutions that are used by companies for IT Service Management (ITSM) mostly incapable of coping with the complexity that s found its way into company networks as a result of mobile end devices and apps, many companies are still in the very early stages when it comes to compliance and license management for mobile devices and solutions. Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 3

4 The Reality: Smartphones and Tablets but No Adequate MDM Solution A brief glance at the IT end devices that are currently used by a large number of employees in German companies for day-to-day tasks shows that the situation has changed dramatically during the last five years: Mobile devices such as smartphones and tablets have taken both private and professional users by storm. The survey carried out by Matrix42 also made it clear that Apple ios and Android devices are largely used in the majority of organizations. Which Smartphone Operating Systems Are Used in your Company? 100 % 80 % 60 % 40 % 20 % 0 % Very low use (< 10 % of employees) Low use (10 % to 29 % of employees) Normal use (30 % to 69 % of employees) High use (70 % to 89 % of employees) Very high use (90 % to 100 % of employees) Apple ios Google Android Windows Phone Blackberry OS Others Although the modern development towards mobile workers who can access their work and data while always on seems in many ways to have happened already, the survey revealed huge deficits when it comes to topics such as the management and support of mobile devices as well as compliance and license management. 57 percent of the companies that were surveyed said that they do not currently have an adequate solution for managing these devices. Do You Know how your Mobile Device Management (MDM) Is Currently Operated? No Mobile Device Management is available 31 % I don t know 26 % On-premise 17 % Cloud / SaaS 16 % Both 9 % Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 4

5 The Challenge: Workplace Management with Mobile Devices We cannot deny that traditional workplaces with permanently installed PCs, which used to be allocated to a single user, are slowly but surely losing their right to exist. These stationary workplaces are giving way to mobile and flexible work environments that are presenting new challenges to IT teams and Service Desks, in particular: Mobility generates a multi-device work environment that must also be managed and supported by Service Desk staff. What Do You Think Are the Greatest Challenges Facing Workplace Management with Mobile Devices? (Multiple Answers Possible) Data protection Separation of private and business data and apps 21 % 33 % Access to apps and data Legal regulations Interfaces to business apps License management Lack of mobility strategy No IT support 8 % 7 % 6 % 6 % 5 % 13 % The respondents were also aware of these difficulties: 30 percent of respondents said that data protection was the greatest challenge for the management and support of mobile devices and 21 percent of those polled identified the separation of private and business data as a decisive factor for workplace management that in many ways also affects safety. The answers to the question concerning the number of tickets in the respondents company that previously involved mobile devices are also parti cularly interesting in this context: 59 percent of the organizations that were surveyed stated that this figure was between zero (!) and a maximum of 29 percent. Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 5

6 Service Desks in Companies: Not Properly Prepared for Mobility The question that remains then is Why does it seem so difficult for many companies to manage and support mobile devices in the way that IT professionals have been doing for years with PCs and mobile devices such as notebooks and laptops? The answers to the question in the survey concerning the facilities and options available to IT support for supporting and maintaining mobile devices such as smartphones and tablets show a completely different picture. Which Facilities and Options Are Available to your IT Support Team for Supporting Mobile Devices? Training of IT support staff (ios, Android) 24 % Nothing 22 % Guidelines for using mobile devices 19 % MDM tool 13 % Social networks for peer-to-peer support 10 % ITSM tool 7 % I don t know 5 % Other options 1 % 20 percent of those questioned had to admit that their own IT support staff are simply unable to offer users support when it comes to problems with mobile devices, even though 24 percent of the companies that were surveyed stated that their IT support staff have received training in the ios and Android operating systems. For mobile devices too, the solution to this problem is to combine the right IT Service Management (ITSM) with the right tools. However, a mere seven percent of survey respondents could claim that their ITSM solution also covers this increasingly important field of IT infrastructure. Many IT managers and administrators currently face the situation that further efforts are needed to cope with the increasing day-to-day use of mobile devices in their companies. They are quickly realizing that the Service Desk s task of managing and supporting mobile users is much more complex and extensive than many IT professionals perhaps initially thought. They are powerless in the face of this dramatic rise in com plexity, which is the inevitable result of their users new-found mobility. Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 6

7 Reasons: Why Is Mobility Characterized by such a High Degree of Complexity? Mobility is an extremely important topic for all companies. The IT managers and administrators involved in these issues, however, frequently find themselves confronted with the problem of increasing complexity. Why is this topic so multifaceted and why does it present a greater degree of diversity than was the case with the IT devices and applications that have been supported up to now? To solve this problem we must first look for the causes of this variance. A glance at the very heterogeneous and highly diversified landscape of mobile devices quickly reveals the factors that are primarily responsible for these difficulties: A very wide variety of applications and devices: Service Desk staff and administrators need to deal with a huge conglomerate of different end devices and applications. This is exacerbated by the fact that very few companies and users have introduced some form of standardization for mobile devices and applications. Most IT employees find themselves confronted with a mix of Android and ios devices as well as some Windows Phone devices and highly diverse hardware. The transformation of the workplace: The traditional workplace with its permanently installed PC for one user is increasingly giving way to a more topical paradigm. It s changing more and more to a work environment. Mobility inevitably results in a multidevice work environment that can quickly become a challenge for the Service Desk. For example, Service Desk staff need to know immediately which type of device a user is using when they contact them with a problem (such as my app isn t working again! ). A modern ITSM system must be able to meet this requirement. Merging of business and private boundaries: End users are increasingly using their private smartphones and tablets in company networks. This means that they also contact the Service Desk if they have a problem with these private devices. What should IT professionals do in this situation? The first thing they must do is quickly and clearly identify whether the device in question is an end device that belongs to the company or whether it is a private device that belongs to the user. The ITSM solution in use must have a good and comprehensive inventory aspect. These three central points clearly demonstrate how the growing mobility of workers and the associated diversity of devices and applications in company environments are definitely increasing the number of calls made to the Service Desk. In general, however, this is usually the one area of an IT department that is understaffed and where all requests are handled by only one or two employees. It is not possible to give these IT specialists more work to do as they simply cannot cope with any more and the option of taking on more staff is not usually up for discussion in most companies. Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 7

8 Critical and Unresolved: License Management in the Mobile Work Environment It is not only the mobile devices themselves that are presenting IT teams and Service Desks with new tasks and associated new problems. Along with the mobile devices, a completely new approach to purchasing and using software on these devices is also finding its way into the IT landscapes of companies. Apps are no longer installed on users PCs via carefully regulated software distributions. Instead, users now install the apps that they need or at least, think they need themselves (mostly from the app stores of operating system suppliers such as Apple or Google). This software chaos will inevitably remind long-serving IT professionals of the time when PCs were first introduced in companies. This proliferation was already a major problem back then. To restore order to the various networks and systems, the necessary service and management tools had to be developed and put into operation. What Do You Use to Manage the Licenses on your Mobile Devices? Nothing I don t know License management solution Enterprise App Store Include costs for apps in travel expenses Apple Volume Purchase Program (VPP) License vouchers 6 % 5 % 5 % 13 % 15 % 25 % 30 % An important part of this problem, and one that is unfortunately all too often criminally neglected by users, is the issue of licensing. Questions concerning licensing frequently remain unanswered, especially where apps, which are purchased and installed directly by the users on their devices, are concerned. The participants in this ITSM survey therefore also had to provide details of the technologies and solutions that are used in their companies to ensure that licenses are also managed correctly on mobile devices. The result was sobering and shows that greater mobility must also have an impact on license management. Over 50 percent of those polled do not use a license management system for mobile devices or were unable to say if and how this problem is solved in their company. Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 8

9 The Matrix42 Approach: The Solution Is Simplicity Matrix42 specialists are able to build on many years of experience in the areas of IT Service Management, Compliance and Mobility. In recent years, they have managed to identify the impact that the rapid expansion of user mobility and the use of many different end devices has already had and still has on these areas thanks to the many discussions conducted with companies from various sectors and the extensive customer projects they have been involved in. To summarize simply, these new working practices have an enormous influence on the entire area of IT Service Management. Mobility is the major topic for all companies and one that is bringing a new level of complexity to the Service Desk. IT managers who wish to tackle this complexity need to seamlessly integrate these mobility solutions into their existing ITSM tools. Matrix42 can help out here. Our smart solutions are designed to manage the increasingly complex choice of mobile devices in companies. IT SERVICE MANAGEMENT IN THE AGE OF THE CLOUD AND MOBILITY SUPPORT FOR MOBILE WORKING PRACTICES WORKSPACE 4.0 WORKSPACE 3.0 WORKSPACE 1.0 WORKSPACE 2.0 ONE WORKSPACE IT Service and Infrastructure Management for personal clouds Office/desk PC/laptop Multi-device work environment Devices/apps/date/ identities/it services Tied to a certain place Device-centered User-centered Service-oriented 1. Revolution (IT) 2. Revolution (PC) 3. Revolution (Mobility) 4. Revolution (Cloud) Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 9

10 Conclusion: Using Mobile ITSM to Counter the Rapid Growth in Mobility The survey carried out by Matrix42 at this year s CeBIT exhibition has brought the following fact to light: The rapid growth in mobility, which has already revolutionized the IT world of private users, is also affecting the world of professional users in companies. The survey also clearly shows that only a very few companies and IT organizations are already using ITSM solutions and software to manage their mobile end devices and successfully weather this storm: IT organizations and companies have a problem! The number of tickets will also inevitably increase along with the number of questions from users concerning how to solve problems specifically related to mobile devices and applications. The survey also showed that although the majority of IT professionals are well aware of the problem, German companies are not sufficiently equipped at present to successfully support the growing mobility trend at their Service Desks. Particularly when it comes to the requirements of the survey respondents, who clearly identify data protection and the separation of private and business data and applications as being the greatest challenges facing workspace management in the age of all-embracing mobility, it is clear that only intelligent ITSM solutions can help. In light of these problems, IT managers must invest in solutions that actively support Service Desk staff and administrators and directly alleviate the vast majority of these complex problems. The complexity that mobility is bringing to the Service Desk cannot be solved by introducing an even more complex IT Service Management system. Simplicity is the best solution here! If German companies want to weather this mobility storm successfully, then they must invest in automated tools for their Service Desks. This is the only way to ensure that employees, who in practice have neither the resources nor the time to fully deal with all aspects of the new technology, are properly supported in their work. Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 10

11 Appendix: Survey Implementation and Demography The Matrix42 survey entitled Mobile ITSM 2014 was conducted at the CeBIT trade show in March A total of 1,509 people were interviewed. 74 percent of those surveyed were recruited from small and mediumsized companies with fewer than 1,000 employees. In the survey, the participants answered a total of eight multiple choice and weighted questions on mobile ITSM. How Many Employees Are Employed in your Company? < 500 employees 64 % 500 1,000 employees 10 % 1,000 5,000 employees 13 % 5,000 10,000 employees 3 % > 10,000 employees 10 % Mobile Devices Conquer Companies: Mobile ITSM Is More Important than Ever! 11

12 Disclaimer This documentation is protected by copyright. All rights are reserved by Matrix42 AG. Any other use, in particular, distribution to third parties, storage in a data system, dissemination, processing, performance, and presentation is strictly prohibited. This applies to the entire document as well as to parts thereof. Subject to change without notice. Other company, trademark and product names, which are not expressly listed here, are trademarks or registered trademarks of their respective owners and are subject to trademark protection. Matrix42 is a registered trademark of Matrix42 AG. Matrix42 AG Elbinger Strasse Frankfurt am Main Germany Tel.: +49 (0) Fax: +49 (0) info@matrix42.de Follow us

Crossing the Shadow IT chasm

Crossing the Shadow IT chasm Crossing the Shadow IT chasm The CIO s guide to avoiding IT irrelevance 1 2 3 4 Beating Shadow IT replacing the corporate IT stick with the BYO carrot BYOD starts and finishes with understanding your users!

More information

EMPOWERING THE DYNAMIC WORKPLACE

EMPOWERING THE DYNAMIC WORKPLACE EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile

More information

A Matrix42 Special Report on Desktop Virtualization

A Matrix42 Special Report on Desktop Virtualization A Matrix42 Special Report on Desktop Virtualization Management of Virtual Desktops Seen as Key to Successful Adoption www.matrix42.com 2000 2011 Matrix42 AG This documentation is protected by copyright.

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Components. Key features

Components. Key features BlackBerry Enterprise Service 10 What is it? BlackBerry Enterprise Service 10 helps you manage BlackBerry smartphones and BlackBerry PlayBook tablets, as well as ios devices and Android devices, all from

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

The Challenges Posed by BYOD.

The Challenges Posed by BYOD. The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Sage U.S. SMB Survey on Mobile Devices 2014 Summary report

Sage U.S. SMB Survey on Mobile Devices 2014 Summary report Sage U.S. SMB Survey on Mobile Devices 2014 Summary report Sage survey of U. S. SMB company usage of mobile technology Page 1 of 7 Introduction The shift of small and medium-size businesses from using

More information

ENTERPRISE MOBILITY IN GERMANY 2015

ENTERPRISE MOBILITY IN GERMANY 2015 IDC Multi Client Project Executive Brief Sponsored by Matrix42 From Consumerization to "Mobile First" Mobility Strategies in German Companies ENTERPRISE MOBILITY IN GERMANY 2015 Contents introduction 01

More information

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

MAM + MDM = BMS. (Bada$$ Mobile Strategy) MAM + MDM = BMS (Bada$$ Mobile Strategy) Table of Contents 3 Introduction 4 What is Mobile Device Management? 5 What is Mobile Application Management? 6 Why Should You Use Both MDM and MAM? 7 MAM Lifecycle

More information

An ICS White Paper. Mobile Device Management for the Agile Enterprise

An ICS White Paper. Mobile Device Management for the Agile Enterprise Mobile Device Management for the Agile Enterprise December 2012 Copyright 2012 ICS Nett, Inc. All rights reserved. This document contains proprietary and confidential information of ICS Nett. No part of

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

The all-in-one Unified Communications solution for SMBs.

The all-in-one Unified Communications solution for SMBs. OpenScape Business The all-in-one Unified Communications solution for SMBs. Improve your performance and take your business to the next level with Unified Communications. Amplifying opportunities The success

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Columbus Mobile The Integrator

Columbus Mobile The Integrator Columbus Mobile The Integrator «IT-Administrator» article in the column «Test Center» In the light of the increased utilization of mobile devices in the company, the management and security of these devices

More information

M a as3 6 0 fo r M o bile D evice s

M a as3 6 0 fo r M o bile D evice s by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile

More information

MULTIPLE PERSPECTIVES PROVIDED

MULTIPLE PERSPECTIVES PROVIDED MULTIPLE PERSPECTIVES PROVIDED In this year s study, we benefit from having multiple ways of looking at our collected responses to help us draw insights and implications for you and your fellow IT decisionmakers

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series

Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series Series Seven Simple steps For Mobile Device Management (MDM) Mobile device management (MDM) has become a necessity across the globe due to the ever expanding and developing world of technology; Technavio

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Protecting Content and Securing the Organization Through Smarter Endpoint Choices Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

Mobile Device Inventory the first step in enterprise mobile management

Mobile Device Inventory the first step in enterprise mobile management Mobile Device Inventory the first step in enterprise mobile management EXECUTIVE SUMMARY As phones and tablets overtake PCs as the most-often used means of connecting to company data and apps, organizations

More information

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. May 30, 2013 We are a software company

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

WHITEPAPER BYOD BRING YOUR OWN DEVICE. As private smartphones, tablet PCs & Co. result in a change in technology in the workplace.

WHITEPAPER BYOD BRING YOUR OWN DEVICE. As private smartphones, tablet PCs & Co. result in a change in technology in the workplace. WHITEPAPER BYOD BRING YOUR OWN DEVICE As private smartphones, tablet PCs & Co. result in a change in technology in the workplace. EXECUTIVE SUMMARY The Trend towards using private Smartphones, Tablet PCs

More information

Designing Enterprise Mobility

Designing Enterprise Mobility Designing Enterprise Mobility Cortado Corporate Server One Solution for All Enterprise Mobility Challenges Advanced Mobile Device Management Intelligent Mobile Application Management Professional File

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy

Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy A Custom Technology Adoption Profile Commissioned By Sybase/SAP Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy July 2012 Forrester Surveys Show Surging Demand For Consumerization

More information

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

CHOOSING CLIENT PLATFORMS IN THE PC+ ERA

CHOOSING CLIENT PLATFORMS IN THE PC+ ERA David Chappell July 2013 CHOOSING CLIENT PLATFORMS IN THE PC+ ERA A PERSPECTIVE FOR ISVS Sponsored by Microsoft Corporation Copyright 2013 Chappell & Associates Whatever market you re in, it s crystal

More information

Peer Research Report Insights on the Current State of BYOD

Peer Research Report Insights on the Current State of BYOD october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling BYOD in Government Agencies with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your agency s wireless network About This White Paper This

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

Compatibility Matrix. BES12 Cloud. December 14, 2015

Compatibility Matrix. BES12 Cloud. December 14, 2015 Compatibility Matrix BES12 Cloud December 14, 2015 Published: 2015-12-14 SWD-20151214144314895 Contents Introduction... 4 Legend... 4 Browser... 4 BlackBerry Cloud Connector...5 Operating system...5 Microsoft

More information

Your Company Data, Their Personal Device What Could Go Wrong?

Your Company Data, Their Personal Device What Could Go Wrong? Your Company Data, Their Personal Device What Could Go Wrong? Top 5 Myths about Mobile Security By Barbara Hudson, Senior Product Marketing Manager Employee use of smartphones and tablets to access corporate

More information

December 2, 2011 Consumerization Drives Smartphone Proliferation by Ted Schadler for Content & Collaboration Professionals

December 2, 2011 Consumerization Drives Smartphone Proliferation by Ted Schadler for Content & Collaboration Professionals December 2, 2011 Consumerization Drives Smartphone Proliferation by Ted Schadler for Content & Collaboration Professionals Making Leaders Successful Every Day December 2, 2011 Consumerization Drives Smartphone

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change

More information

Compatibility Matrix. BES12 Cloud. July 20, 2016

Compatibility Matrix. BES12 Cloud. July 20, 2016 Compatibility Matrix BES12 Cloud July 20, 2016 Published: 2016-07-20 SWD-20160719104452880 Contents Introduction... 4 Legend... 4 Browser...5 BlackBerry Connectivity Node... 6 Operating system...6 Microsoft

More information

Enterprise solution comparison chart

Enterprise solution comparison chart Enterprise solution comparison chart This quick reference compares supported devices and features across,, and Server. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

RESEARCH NOTE. Workplace Service. Hot Vendors in Video Conferencing, 2015

RESEARCH NOTE. Workplace Service. Hot Vendors in Video Conferencing, 2015 June 11, 2015 Author: David Mario Smith Hot Vendors in Video Conferencing, 2015 Summary: Videoconferencing is at an inflection point: emerging software-based offerings are disrupting traditional hardware

More information

Designing Enterprise Mobility

Designing Enterprise Mobility Designing Enterprise Mobility Cortado Corporate Server M Work beyond your desk, simply & efficiently Productivity: Work on the go just as easily as from a desktop PC Usability: Mobile access to corporate

More information

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform

More information

Desktop Transformation: A Model Case for the Mobile Era

Desktop Transformation: A Model Case for the Mobile Era TECH BRIEF Desktop Transformation: A Landscape Transformed Over the past quarter of a century, we have witnessed two revolutions that have profoundly changed the way companies around the globe do business,

More information

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving

More information

Consumerization Survey Report The Consumerization of IT

Consumerization Survey Report The Consumerization of IT Securing Your Journey to the Cloud Consumerization Survey Report The Consumerization of IT An increasing number of organizations are taking a strategic approach to Consumerization. Learn what they are

More information

5 Steps to Creating an Enterprise Mobile App Strategy

5 Steps to Creating an Enterprise Mobile App Strategy 5 Steps to Creating an Enterprise Mobile App Strategy The world around us is increasingly going mobile! The adoption of smart phones and tablets continues to grow in both the consumer and enterprise spaces.

More information

Practical Enterprise Mobility

Practical Enterprise Mobility Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business

More information

Welcome to the era of the anywhere worker

Welcome to the era of the anywhere worker Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening

More information

NEC CLOUD STORAGE. Demo Guide

NEC CLOUD STORAGE. Demo Guide NEC CLOUD STORAGE Demo Guide 2014 1 INTRODUCTION... 4 1.1 GOALS OF THIS DOCUMENT... 4 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 4 2 INTRODUCTION TO NEC CLOUD STORAGE... 5 2.1 WHAT IS NEEDED TO USE CLOUD

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

Maximize Productivity through Mobile-Optimized Collaboration MAXIMIZE PRODUCTIVITY THROUGH MOBILE-OPTIMIZED COLLABORATION.

Maximize Productivity through Mobile-Optimized Collaboration MAXIMIZE PRODUCTIVITY THROUGH MOBILE-OPTIMIZED COLLABORATION. 1 MAXIMIZE PRODUCTIVITY THROUGH MOBILE-OPTIMIZED COLLABORATION Whitepaper 2 Maximize Productivity through Mobile-Optimized Collaboration Taking care of business in the 21st century means tapping into the

More information

The Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions

The Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions The Mobile Enterprise: Employee Self Service Deepali Majumder, Senior Consultant, Wipro Mobility Solutions Table of contents 03... Technology is shaping demand 03... The Mobile Employee 04... Why is a

More information

Global Enterprise Mobile Operating Trends. For Field Service Management. www.clicksoftware.com

Global Enterprise Mobile Operating Trends. For Field Service Management. www.clicksoftware.com Global Enterprise Mobile Operating Trends www.clicksoftware.com Introduction Since 2008, ClickSoftware has been collating data supplied by customers looking at the choices that are being made in terms

More information

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution. Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution Global July 2012 Contents Section Slide Numbers Executive Summary 4 Market

More information

Securing Enterprise Mobility for Greater Competitive Advantage

Securing Enterprise Mobility for Greater Competitive Advantage SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise

More information

The Changing Role of the CIO. An IDC InfoBrief, sponsored by Samsung Canada March 2014

The Changing Role of the CIO. An IDC InfoBrief, sponsored by Samsung Canada March 2014 An IDC InfoBrief, sponsored by Samsung Canada March 2014 The Changing Role of the CIO What s most important today? 60% of Top IT Executives identify Improving Staff Productivity as their biggest IT priority

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Outstanding! professional services. Our software provides YOu with satisfied customers.

Outstanding! professional services. Our software provides YOu with satisfied customers. Impressive in terms of efficiency. Easy to use. We use the 360 customer management of GEDYS IntraWare to work together optimally as a team, throughout the company in sales, marketing and service. Outstanding!

More information

Ben Hall Technical Pre-Sales Manager

Ben Hall Technical Pre-Sales Manager Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality

More information

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management. 1 FUTURE FOCUS What s Coming in Enterprise Mobility Management Whitepaper 2 Future Focus: What s Coming in Enterprise Mobility Management (EMM) There s far more power in modern smartphones and tablets

More information

Mastering the Mobile Revolution with Total User Management

Mastering the Mobile Revolution with Total User Management LANDESK White Paper Mastering the Mobile Revolution with Total User Management ITIL-based mobile service management with LANDESK Service Desk 7.6 makes mobile devices a force for productivity on both sides

More information

Mastering the Mobile Revolution with Total User Management

Mastering the Mobile Revolution with Total User Management LANDesk White Paper Mastering the Mobile Revolution with Total User Management ITIL-based mobile service management with LANDesk Service Desk 7.6 makes mobile devices a force for productivity on both sides

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Enterprise Mobility and Solutions to Top 5 Most Asked Questions

Enterprise Mobility and Solutions to Top 5 Most Asked Questions Enterprise Mobility and Communications Seth Robinson, Director of Technology Analysis CompTIA The Evolution of Endpoint Devices Public Cloud e.g. Salesforce, Dropbox, or AWS-hosted systems Mobile web Standard

More information

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION Executive Summary Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Page 2. Most Of The Information Workforce Now Works Remotely

Page 2. Most Of The Information Workforce Now Works Remotely The workplace landscape is changing rapidly as people walk into the office with the expectations and sometimes the tools they carry from home. The requirements for flexibility rise even higher as employees

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

The Smart Disaster Recovery Strategy for Your Workforce: Cloud-Hosted Desktops WHITE PAPER

The Smart Disaster Recovery Strategy for Your Workforce: Cloud-Hosted Desktops WHITE PAPER WHITE PAPER Table of Contents Executive Summary... 3 Unlikely Seems More Likely Than Ever... 3 Physical Desktop DR Isn t Practical.... 4 Cloud-hosted Desktops: Insurance for Workforce Continuity... 4 Typical

More information

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!

More information

When Computers really become Personal

When Computers really become Personal When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation

More information

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling Enterprise BYOD with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your organization s wireless network About This White Paper This white

More information

Compatibility Matrix BES12. September 16, 2015

Compatibility Matrix BES12. September 16, 2015 Compatibility Matrix BES12 September 16, 2015 Published: 2015-09-16 SWD-20150916153710116 Contents Introduction... 4 Legend...5 BES12 server... 6 Operating system...6 Database server...6 Browser... 8 Mobile

More information

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This

More information

Key Trends in Enterprise Mobility. Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com

Key Trends in Enterprise Mobility. Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com Key Trends in Enterprise Mobility Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com Evolving from a PC/Notebook World to Smartphone/Tablet/Hybrid World 2 2 Mobility Is Now Much More Than Just

More information

INTRODUCTION. We hope you enjoy this report from TrackVia. Sincerely, Walker Fenton, SVP Product TrackVia, Inc.

INTRODUCTION. We hope you enjoy this report from TrackVia. Sincerely, Walker Fenton, SVP Product TrackVia, Inc. INTRODUCTION Modern workers are killing spreadsheets. And it s not like they are reverting to paper and pencil. Ironic, isn t it? Spreadsheets started the PC movement. Going back as far as the early 1980s,

More information

Nomad Vault: a 100% secure virtual private network accessible via thumb drive

Nomad Vault: a 100% secure virtual private network accessible via thumb drive Nomad Vault: a 100% secure virtual private network accessible via thumb drive Nomad Vault: securely save, share and transfer your data, anywhere you go How can you prevent losing everything when your laptop

More information

10 THOUGHTS ON EVALUATING A FIELD SERVICE AUTOMATION SOLUTION

10 THOUGHTS ON EVALUATING A FIELD SERVICE AUTOMATION SOLUTION WHITE PAPER 10 THOUGHTS ON EVALUATING A FIELD SERVICE AUTOMATION SOLUTION INTRODUCTION The availability, low cost and ubiquity of mobile devices and mobile networks has fostered a revolution in how field

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

The Maximum Security Marriage:

The Maximum Security Marriage: The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

SAP White Paper Enterprise Mobility

SAP White Paper Enterprise Mobility SAP White Paper Enterprise Mobility Mobile Content and Document Management Best Practices and Decision Checklist Enterprise-Grade Solutions Give IT Much-Needed Security and Control Over Company Content

More information

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing

More information