The Mobilisation of Workspace Services
|
|
- Liliana Oliver
- 8 years ago
- Views:
Transcription
1 The Mobilisation of Workspace Services
2 Summary Catalyst The consumerization and ubiquitous availability of smartphones and tablets are having a major impact on employees expectations of enterprise IT. How to support users who expect to access the tools of their trade anytime and anywhere, on the most convenient devices, is exercising the minds of enterprise CIOs across all sectors. Mobility and service delivery have moved to the top of the workspace agenda. Ovum view The importance of bring your own device (BYOD) is not so much that it s a strategy that enterprises need to decide whether to support or not, but that it s primarily a behaviour that is influencing both the expectations of employees in how they access and use IT and the expectations of lines of business in how they improve existing internal processes or add new customer-facing processes. Ovum s BYOD Employee Mobility Survey 2014 highlights the fact that BYOD behaviour is a fact of life for organizations everywhere: it is happening whether they like it or not. The role of IT has to evolve with it. IT needs to adapt to employee behaviour and enable new ways of working, rather than act as a central command and control operation, blocking innovation and alienating employees. Managed services providers can help manage and secure these new ways of working and the flexibility they allow for an increasingly mobile workforce. They should also help enterprises develop the app stores they need to deliver the enterprise-grade equivalents of cloud-based consumer apps. Key messages BYOD is a key end-user behaviour that is shaping employees expectations of how enterprise IT should work. Mobility is influencing all parts of the workforce, not just those whose jobs are peripatetic. Mobility must be part of a blended workspace strategy part of continuum of services that deliver the right functions for the right job. The service desk has a key role to play in delivering the user experience shaped by consumer IT expectations. While much of the focus in end-user services has been on supporting devices, supporting the apps life-cycle should be central to workspace services. BYOD shapes your end users expectations It s a behaviour In the past several years, a new acronym has entered the IT lexicon: BYOD bring your own device. For Ovum, BYOD is a behaviour. It derives from the way people want to work. A behaviour that means they want to use the same personal devices they use to access their personal messaging, e- mail, and social networks to access similar work-based services. That behaviour is one that means the workspace is not a fixed location occupied eight hours a day. It s a virtual space that can be 2
3 % respondents who own a smartphone accessed anytime, anywhere, and from a variety of devices. It s inherently mobile and acknowledges that in many enterprises a large part of the workforce works remotely for at least some of their time. That s why suppliers such as Getronics increasingly talk about an extended portfolio of workspace services that includes mobility in terms of both devices and applications, rather than the deskside support and end-user services of old. That BYOD is growing is not in doubt. According to Ovum s BYOD Employee Mobility Survey 2014: The overall rate of BYOD is up from 56.8% in 2013 to 69.2% in 2014, a significant increase. This behaviour is a fact of life for organizations everywhere, regardless of their stance toward it: it is happening whether they like it or not. The online survey of more than 5,000 individuals found that 69.2% of full-time employees access corporate data from a personally owned smartphone or tablet, and yet, among those who bring [their] own smartphone, for example, 26.8% are doing so directly against stated corporate policy and 21.7% are doing so in an unmanaged fashion. While support for mobility is desirable and seen as a productivity enabler, many organizations are still immature and slow to adopt policies and strategies that enable them to support the ICT demands and requirements of their business users. Employee behaviour is evolving, with new apps and devices being used across all areas of their organizations, and the role of IT has to evolve with it. IT needs to adapt to employee behaviour and enable new ways of working, rather than act as a central command and control operation. The trend towards mobility and the use of smartphones and tablets both inside and outside the workplace is already impacting many business processes. From the private to the public sector, industries are digitizing and offering multi-channel access to customer-facing services. Not surprisingly, many enterprises recognize that mobility also offers opportunities to do things differently in a lot of internal business processes. However, Ovum s BYOD Employee Mobility Survey 2014 highlighted that the level of access to corporate applications on personal smartphones is still relatively limited, with and calendar the most widely used tools. Fewer than 20% of those who use their own smartphones at work say that they have access to everything that they need, while over a quarter say that they don t have officially supported access to anything. Figure 1: What do employees use their smartphones for at work? 50% 45.7% 40% 30% 20% 21.2% 20.6% 19.8% 25.6% 10% 7.4% 0% N = 4,424 I have access to / calendar I have access to the corporate directory I have access to a limited range of work tools and content I have full access to all the work tools and content that I need I'm not sure exactly what access I have I don't have official access to any work tools or content Source: Ovum Employee Mobility Survey
4 While not all BYOD behaviours are appropriate to the world of enterprise IT, enterprises recognize mobility s potential to change business processes, provide flexibility to their employees, and improve productivity. Many also recognize that they need help to exploit these opportunities. Many IT organizations lack the skills to support and manage the multiple device types and operating systems represented by smartphones and tablets. Microsoft Windows on PCs and laptops is relatively easy in comparison, in spite of its legacy variants and application compatibility issues. And how do you go from developing applications in.net and J2EE to developing apps for ios and Android? So what should enterprises look for in assessing service providers to help them with their evolving workspace and mobility needs? Not surprisingly, service providers from telecom carriers to traditional systems integrators and IT outsourcers also see mobility as a big opportunity and suddenly it dominates their end-user services strategies. There are two main types of service offerings around mobility: Manage and secure devices and apps in the overall context of enterprise IT. Deliver a portfolio of services across the mobile applications life-cycle. Some providers focus on one or the other; a smaller number have varying degrees of capability in both. Mobility must be part of a seamless, integrated end-user experience Managing mobility as part of the end-user service A number of SIs and outsourcers are working with enterprise mobility management (EMM) tools, mobile applications management (MAM) tools, and Identity Services Engines (ISE) to manage and secure mobile stacks from the apps down to the operating system. Some of the largest SIs inevitably use their sister software divisions toolsets, some of the large offshore service providers have built proprietary toolsets, but the majority of service providers end up integrating best of breed tools from the leading EMM and MAM vendors. The key issue is not which tools suppliers use (although proprietary toolsets can entail messy transitions for the customer), but the effectiveness with which they can be integrated within the overall context of the end-user service. This is a multi-vendor world and service providers have to be able to support the main smartphone and tablet operating systems. As Ovum s BYOD Employee Mobility Survey 2014 confirms, ios and Android dominate the mobility landscape, though Microsoft Windows is growing. Such a landscape doesn t sit well with IT operations teams that have spent most of their time locking down Windows desktops and images. It also means that as they look to third parties to fill the skills gap, they need to ensure that service providers have demonstrable expertise and references for the two dominant consumer smartphone and tablet operating systems, if they re to retain employee satisfaction and if they re to stand any chance of applying rigor to managing the BYOD-influenced behaviour associated with mobile usage. 4
5 Figure 2: Smartphone preferences What type of smartphone OS would you most like to use for work, regardless of what you actually use? 0.3% 4.5% 7.2% 12.0% Android ios Windows Phone 51.7% BlackBerry 24.3% Other I have no idea N = 5,187 Source: Ovum Employee Mobility Survey 2014 Security is clearly a key element in mobility management as it is for the rest of IT. In a recent Ovum survey of 200 CIOs across Europe and North America, security was second only to cost reduction in terms of current IT priorities (Ovum Business Trends: Cloud Services Survey 2014). Mobility presents its own challenges to IT security, especially where enterprises are looking to offer more than just simple access to and calendar applications. Portable devices are far more likely to be lost, stolen, temporarily mislaid or borrowed than their office-bound counterparts. Service providers should be able to provision security software remotely, partition and protect corporate data and applications separately from personal data and apps, and remotely wipe smartphones and tablets in the event of loss or theft. This presupposes that the enterprise has undertaken its responsibility to implement governance policies and agreements that allow service providers to wipe or re-configure users personal devices if they have a BYOD policy. For corporate-owned devices, acceptance of such governance policies should be a condition of use of the device. The other key security aspect associated with mobility is identity and access management (IAM). IAM services including provisioning and user management, identity management, self-service registration and password resets, identity synchronization, federated identity management (FIM), and single signon (SSO) offer the main ways to allow secure access to corporate applications and data from mobile devices. However, as Ovum s security analyst Andy Kellet has pointed out: Few organizations have completed enterprise-wide IAM deployment projects... many have silos of identity that cover only the key areas of need, often driven by data protection and regulatory compliance demands. In short, enterprises looking for a comprehensive workspace service should pay close attention to the provider s ability to integrate and consolidate disparate IAM solutions and procedures precisely the situation that encourages BYODers to bypass corporate resources in favor of DIY consumer solutions for accessing and sharing data. Mobility should be part of a blended workspace strategy With all the hype around mobility, it s worth remembering that smartphones and tablets are typically complementary devices they re not usually the user s primary corporate computing device. Most 5
6 knowledge workers, executives, and office-based staff in most vertical industries still prefer to use desktop and laptop PCs for spreadsheets, documents, mail, and increasingly unified communications. Nor are laptops, tablets, and smartphones the tools of choice for all roles in the typical enterprise. A screen, keyboard, mouse, and headset are likely to be the preferred devices for telesales, customer relationship management, or even financial trading employees. While BYOD is prevalent in many enterprises, often unmanaged and effectively operating as a shadow mobility strategy, other enterprises prefer a more controlled approach to supporting mobility, allowing employees to choose from a catalog of options designed for a specific job role (or persona) and requirements. There are peripatetic jobs and roles for which tablets, for example, are eminently more suitable than a laptop on the retail-sales floor, doing the rounds of a hospital ward, running through pre-flight checks on the airplane flight deck. But these are roles where accessing information, checking, logging, and comparing data, not content creation, are the primary tasks for which the device is required and the enterprise-owned tablet is a tool of the trade. Meanwhile, for many, even the majority in Ovum s BYOD survey, smartphones and tablets are for inbetween times: the commute to or from work, the wait at the airport, the train journey, catching up on in front of the TV, and for those communications functions they just seem to do better than their deskbound equivalents. Figure 3: Laptops are still the preferred form factor If you had the choice, which of these device types would you like to use at work? 50% 40% 39.8% 30% 20% 10% 13.4% 14.6% 11.2% 4.6% 2.2% 6.2% 8.0% 0% N = 5,187 Source: Ovum Employee Mobility Survey 2014 Respondents largely indicate a preference for larger form factors when it comes to daily working: tablets and smartphones are not replacing PCs, but are being used in a complementary fashion. Almost 25% [of respondents] indicate that they would like to use at least two types of device on a daily basis. The upshot for any enterprise assessing the different workspace services providers offerings is that workspace services must cater for multiple roles, ways of working, and authorization levels. Consequently, any mobility strategy should be seen as part of a blended workspace strategy. Ideally, that blended strategy should enable seamless access to the tools and resources appropriate to the end-user s job, anytime and anywhere. Most importantly, it extends to data too. If IT is to enable 6
7 end-users to create and access data on different devices, then it has to enable synchronization across multiple devices. The most effective way to do this is to de-couple data and functionality from the physical devices on which they run and that typically means a virtualized environment delivered from the cloud. For many organizations, a combination of centrally managed thin-client, virtual desktop, and secure, cloud-based delivery of virtual desktops, images, applications, and storage can provide the basis for the seamless sharing and synchronization of data. It also enables centralized management and maintenance of desktop and device images, applications, and data protection. Data is protected in the safety of the data center, rather than being left at risk on the device. Getronics workspace services offerings, for example, are arranged around a three-tier model: A cloud-based Workspace-as-a-Service (WaaS) offering, which offers access to all core enterprise workspace services via a secure portal and is thus accessible for BYOD users on personal devices. A hybrid model for enterprises that have a more complex application mix and requirements, based on a custom architectural blue-print for the customer. The hybrid model integrates the building blocks of on-premise, hosted, cloud, and hybrid onpremise/cloud deployment in a custom managed workspace environment. The virtualized cloud-based architecture makes it Getronics preferred platform for supporting mobile applications and data. A transformational managed services approach, where Getronics takes over the dayto-day management of the customer s existing workspace environment and manages the transition to Getronics standard tools and processes to improve end-user satisfaction and optimize costs, while working on the longer-term innovation and improvement of the workspace environment. Integration is the key to managing, securing, and optimizing the multiple services centered on the different user workspace environments required by the different roles or persona that need to be supported within an enterprise. Services must cater for voice, video, IP telephony, mobility, onpremise desktops, application development, app stores, SaaS delivery of commercial applications, and a whole raft of services that need to be delivered to workspace users, underpinned by security and managed services. The answer is not all in the cloud. The answer cannot ignore integration with legacy applications and transition to a multi-dimensional workspace. The answer must address security, compliance, and regulatory requirements as they pertain to the workspace environment and the end-user s mode and place of work. The service desk brings it all together The service desk is the communications center that provides the central point of contact between IT, its users, partners, and lines of business. It s a communications center, not a call center or just a helpdesk. In a mobile world where work goes on in an extended virtual workspace, not bound by office hours, the service desk must consequently become a truly multi-channel communications center. Mobile users, generation Y, or let s face it, just about all of us in the developed world, have become used to self-help and self-service as a first port of call for assistance. If we want to know how to do something, we Google it; if we need a password reset, we do it online; we read FAQs and use social networks for advice. The service desk has to become fully multi-channel and embrace the self-service 7
8 needs of its customers if it s to deliver satisfaction to those customers. Self-service isn t just about reducing costs, it s about improving productivity and satisfaction. Traditional end-user services have also always included an element of deskside support an engineer goes out to the user to replace a keyboard, add memory to a PC, or fix a LAN connection, for example. But in the world of mobility, users need somewhere to go to get that laptop upgraded, the tablet fixed, or help deleting personal files from their corporate smartphone. There s consequently a growing trend for service providers to provide kiosks or drop-in centers to complement traditional deskside support, or indeed to replace desktop support as enterprises increasingly turn to hot-desking in place of every office worker having a fixed workplace. Exploiting Mobility Perhaps the biggest changes that service providers are seeking to address in the world of mobility are: Front-office digital transformation helping enterprises exploit the opportunities to develop new revenue-generating processes enabled by mobile technology. Business process improvement enabling end-users to access enterprise or line-ofbusiness applications and data from their smartphones and tablets. There are plenty examples of both, from the online banking services and apps that every large retail bank has deployed in the UK in response to challenger banks and new born-on-the web financial services, to citizens access to government digital services. Some of the projects that Getronics has recently worked on illustrate how the expansion of workspace services to embrace mobility has led on to the design and development of customer-facing mobile applications as well as the digitization of in the field processes: Getronics helped international airports to develop a way-finding app to help customers find their way around its airports. Subsequent enhancements included integration with airport parking services and the ability to push messages about flight times, locations, and other passenger information to customers. The vendor has developed mobile field process apps for the public sector, enabling social services professionals to enter data and case-work information using tablets, when visiting clients in their homes. It created a similar app for a major car producer to enable staff to undertake on-site dealer audits. It has enabled training services providers to deliver training at the point of need via users smart devices, with signature-based records and all related managed content. The skills and capabilities required to develop new mobile applications or modify existing applications for mobile access and usage are equally applicable to the enterprise s customers as they are to its internal users. As Ovum s BYOD Employee Mobility Survey 2014 indicates, employees want to use their smartphones and tablets for more than just responding to and checking their calendars. There are clear advantages to using smartphones and tablets to access enterprise applications and data, especially for employees whose job involves them being on the shop-floor, in the hospital wards, or in the field. It isn t just for the executives or even driven by just the executives. 8
9 Enterprises are also keen to address the customer-facing side of their businesses to bring them into the 21 st century with apps that deliver services and a customer experience that differentiates them from their competitors. Figure 4: Managing the full mobile applications life-cycle Source: Ovum If enterprises are truly to embrace mobility as part of their workspace strategy, they must select service providers that can deliver enterprise-grade support for mobility; that deliver syncing, data backup, and sharing between devices within a secure enterprise-grade framework; and help enterprises mobilize the applications their users need to be productive wherever they need their mobile workspace. The service providers ability to create, manage, and maintain corporatesanctioned apps stores is finally looking as though it has a purpose. Not all service providers can offer such capabilities, but there are obvious benefits to looking to service providers that can support a holistic mobile applications life-cycle approach, that helps enterprises design, build, maintain, and enhance mobile applications, but also offers hosted delivery capabilities from secure local cloud facilities. Appendix Methodology This report is based on the Ovum BYOD Employee Mobility Survey The online survey elicited responses from almost 5,200 employees across 19 geographic markets. 9
10 Author Ian Brown, Senior Analyst, Ovum IT Services Copyright notice and disclaimer The contents of this product are protected by international copyright laws, database rights and other intellectual property rights. The owner of these rights is Informa Telecoms and Media Limited, our affiliates or other third party licensors. All product and company names and logos contained within or appearing on this product are the trademarks, service marks or trading names of their respective owners, including Informa Telecoms and Media Limited. This product may not be copied, reproduced, distributed or transmitted in any form or by any means without the prior permission of Informa Telecoms and Media Limited. Whilst reasonable efforts have been made to ensure that the information and content of this product was correct as at the date of first publication, neither Informa Telecoms and Media Limited nor any person engaged or employed by Informa Telecoms and Media Limited accepts any liability for any errors, omissions or other inaccuracies. Readers should independently verify any facts and figures as no liability can be accepted in this regard - readers assume full responsibility and risk accordingly for their use of such information and content. Any views and/or opinions expressed in this product by individual authors or contributors are their personal views and/or opinions and do not necessarily reflect the views and/or opinions of Informa Telecoms and Media Limited. 10
11 CONTACT US INTERNATIONAL OFFICES Beijing Dubai Hong Kong Hyderabad Johannesburg London Melbourne New York San Francisco Sao Paulo Tokyo 11
Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15
Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Excerpt prepared for Egnyte, Inc. Publication Date: 28 Aug 2014 Product code: IT0021-000018 Richard Edwards Summary Catalyst
More informationOn the Radar: Pulse Secure
Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure
More informationFinancial services perspectives on the role and real impact of cloud
Financial services perspectives on the role and real impact of cloud Executive Summary Ovum has recently concluded an independent and in-depth survey of 400 senior CIOs within financial services institutions
More informationHow To Use Syncplicity Panorama On A Mobile Device
On the Radar: Syncplicity Panorama New mobile content access tools for modern business work styles Publication Date: 11 Mar 2015 Product code: IT0021-000064 Richard Edwards Summary Catalyst The typical
More informationAddressing Enterprise Needs with a Software Defined Network Platform
Addressing Enterprise Needs with a Software Defined Network Platform Dynamic, customizable approach meets customer demand Date: December 2015 Author: Mike Sapien Ovum view Enterprise customers have virtualized
More informationPublic Sector Enterprises and Cloud Computing: Realizing Efficiencies
Public Sector Enterprises and Cloud Computing: Realizing Efficiencies Summary Catalyst Cloud technology, and its suitability for public services, continues to be a subject that polarizes CIOs. For some,
More informationFinancial Institutions and the cloud: moving from BAU to business transformation
Financial Institutions and the cloud: moving from BAU to business transformation Summary Catalyst The role of cloud technology among banks and insurers has been hotly debated over the last 5 years, creating
More informationWinning with Emerging CRM Channels. An Ovum White Paper
Winning with Emerging CRM Channels An Ovum White Paper Introduction If there has been one constant over the past five years, it is the shift in how consumers interact not just with each other, but how
More informationSWOT Assessment: BMC Remedy v9
SWOT Assessment: BMC Remedy v9 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 17 Aug 2015 Product code: IT0022-000489 Adam Holtby Summary Catalyst BMC Software is an
More informationOn the Radar: CipherCloud
Cloud access security delivered on enterprise gateways Publication Date: 18 Feb 2015 Product code: IT0022-000305 Rik Turner Summary Catalyst CipherCloud develops cloud visibility and security technology
More informationEnterprise Content Management: The Suite Perspective
Enterprise Content Management: The Suite Perspective Publication Date: 04 Dec 2015 Product code: IT0014-003079 Sue Clarke Summary Catalyst The Ovum Decision Matrix: Selecting an Enterprise Content Management
More informationSWOT Assessment: BeyondTrust Privileged Identity Management Portfolio
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett
More informationRe-architecting Legacy Systems is the Keystone for Transformation
Re-architecting Legacy Systems is the Keystone for Transformation Legacy modernization lays the groundwork for the modern enterprise An Ovum White Paper Contents Executive summary... Introduction... Key
More informationHP s revitalized workforce optimization suite is worth a fresh look
HP s revitalized workforce optimization suite is worth a fresh look Publication Date: 27 Jul 2015 Product code: IT0020-000139 Keith Dawson Ovum view Summary When contact center buyers look to acquire workforce
More information2015 Trends to Watch: Higher Education
2015 Trends to Watch: Higher Education Leveraging IT to benefit the institutional mission Publication Date: 05 Nov 2014 Product code: IT0008-000217 Navneet Johal Summary Catalyst The higher education industry
More informationThe Future of Payments 2015: Financial Institutions. The Payments Value Chain is Driven by Customers
The Future of Payments 2015: Financial Institutions The Payments Value Chain is Driven by Customers 1 Catalyst Payments Are at a Crossroads The payments market is changing. From cash to checks, to charge
More informationHybrid WAN Services emerging as a viable network option
Hybrid WAN Services emerging as a viable network option Customers now going beyond MPLS-based services Date: December 2015 Author: Mike Sapien Summary In a nutshell Business customers have relied on MPLS-based
More information2015 Global Payments Insight: Bill Pay Services. With big change comes big opportunity
2015 Global Payments Insight: Bill Pay Services With big change comes big opportunity Catalyst Payments are at a crossroads The payments market is changing. From cash to checks, to charge and credit cards,
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationSWOT Assessment: Alfresco, Alfresco One, v5.0
SWOT Assessment: Alfresco, Alfresco One, v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: May 5 th, 2015 Product code: IT0014-003012 Sue Clarke Summary Catalyst When
More informationEnterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
More informationRethinking Cloud Content Collaboration in Financial Services
Rethinking Cloud Content Collaboration in Financial Services Executive Summary The financial services sector generally prefers to take a risk-averse approach to new technology trends, with the need for
More informationWeb Application Firewalls: The TCO Question
Web Application Firewalls: The TCO Question Ovum looks into total cost of ownership for WAFs Rik Turner Summary Catalyst Ovum has carried out a series of interviews with companies in North America, Europe,
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationOn the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934.
Applying machine learning to integrating Big Data Publication Date: Sept. 2014 Product code: IT0014-002934 Tony Baer Summary Catalyst Traditional data integration approaches may not scale for Big Data.
More informationCase Study: Vitamix. Improving strategic business integration using IT service management practices and technology
Improving strategic business integration using IT service management practices and technology Publication Date: 17 Sep 2014 Product code: IT0022-000180 Adam Holtby Summary Catalyst For Vitamix, a key driver
More informationSWOT Assessment: CoreMedia, CoreMedia Platform
SWOT Assessment: CoreMedia, CoreMedia Platform Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 12 May 2016 Product code: IT0014-003122 Sue Clarke Summary Catalyst Organizations
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationOn the Radar: ForgeRock
Identity management for B2C and the Internet of Things Publication Date: 03 Dec 2015 Product code: IT0022-000500 Rik Turner Summary Catalyst ForgeRock develops identity and access management (IAM) technology
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationMulti-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
More informationOvum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16
Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16 Publication Date: 29 Jul 2015 Product code: IT0022-000410 Roy Illsley Summary Catalyst The role and purpose
More informationInternet Exchange Between IT and Business Requirements
Mobile Content Becomes a Key Chris Marsh, Principal Analyst, cmarsh@yankeegroup.com Highlights Mobility has reached a critical mass in the workplace. Fifty- seven percent of all employees are using a smartphone
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationWhat Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationDRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions
DRIVING ENTERPRISE MOBILITY Enterprise Mobility Solutions from Computacenter CONTENTS 03 04 05 06 09 10 The Growth of Mobility Seizing Opportunities Overcoming Adversity Computacenter Mobility Solutions
More informationMulti-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
More informationMaking analytics a first-class healthcare citizen: lessons from Oracle customers
Making analytics a first-class healthcare citizen: lessons from Oracle customers Publication Date: 21 Nov 2014 Product code: IT0011-000335 Charlotte Davies Ovum view Summary Technology is being increasingly
More informationThe Critical Role for Cloud in the Transformation of Retail Banks
The Critical Role for Cloud in the Transformation of Retail Banks Kieran Hines, Practice Leader, Financial Services Technology Executive summary The merits of cloud technology in retail banking have been
More informationUnified Communications. The Technologies, Features & Benefits
Unified Communications The Technologies, Features & Benefits Unified Communications 2 Table of Contents Executive Summary 2 Introduction 3 What s Trending? 4 Workforce Mobility 4 Desktop Virtualisation
More informationHow To Protect Your Employees From Being Hacked By A Corporate Firewall
The case for supporting mobile users with secure remote access Your employees are mobile and your remote support strategy needs to be too - but manage the security risks of remote access tools. A study
More informationSpeeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationEnterprise mobility trends 2015 and beyond
Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources
More informationProductive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
More informationBT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
More informationOn the Radar: JReport
Embedded reporting and analytics Publication Date: April 30 th, 2015 Product code: IT0014-003010 Surya Mukherjee Summary Catalyst Jinfonet Software, through its reporting and dashboarding applications,
More informationTime better spent. Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business
Time better spent Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business Welcome to What would it mean to your organisation if your people were able
More informationThe Australian Business Communications Market - A Telsyte Report
The Road to Cloud UC and Collaboration How Australian businesses can benefit from emerging collaboration technologies A Telsyte report commissioned by NEC Australia Contents Introduction 3 The Australian
More informationHow To Rank Customer Analytics Vendors
Ovum Decision Matrix: Selecting a Customer Analytics Solution for Telcos, 2015 16 Publication Date: 10 Sep 2015 Product code: IT0012-000135 Adaora Okeleke Summary Catalyst Telcos quest for a competitive
More informationNEC Cloud Collaboration A simple four-step process to your ideal, cloud-based unified communications and collaboration solution.
NEC Cloud Collaboration A simple four-step process to your ideal, cloud-based unified communications and collaboration solution. NEC Australia au.nec.com Communication and collaboration. Your way. Modern
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationONLINE SERVICES. Business and ICT Service Delivery Redefined
ONLINE SERVICES Business and ICT Service Delivery Redefined RULES AND ROLES Even ten years ago, the rules and roles which governed the provision of ICT business services were very different. Business demands
More informationOn the Radar: Apperian MAM
Mobile application management and enterprise app store Publication Date: 12 May 2015 Product code: IT0021-000082 Richard Absalom Summary Catalyst There is a massive opportunity for enterprises to develop,
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationAcronis 2002-2014 BRING YOUR OWN DEVICE
Acronis 2002-2014 BRING YOUR OWN DEVICE Introduction With over a billion smartphones and tablets at arms length, a majority of your global workforce already possesses the technology needed to better connect
More informationNew Choices in Windows * Device Management
White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationWhen Computers really become Personal
When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation
More informationA Mobile Architecture, Not Just a Mobile App
A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile
More informationAIMING HIGHER: CREATE A MOBILE- FIRST BUSINESS STRATEGY
A HARVARD BUSINESS REVIEW ANALYTIC SERVICES REPORT AIMING HIGHER: CREATE A MOBILE- FIRST BUSINESS STRATEGY Copyright 2015 Harvard Business School Publishing. sponsored by AIMING HIGHER: CREATE A MOBILE-FIRST
More information2011 Forrester Research, Inc. Reproduction Prohibited
1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile
More informationExtending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change
More informationLMS and Student Success at Greenville College: A Case Study
LMS and Student Success at Greenville College: A Case Study Overcoming hurdles to improve student retention Publication Date: 23 May 2014 Product code: IT0008-000200 Navneet Johal SUMMARY Catalyst Confusion
More informationOracle Documents Cloud Service. Secure Collaboration for the Digital Workplace
Oracle Documents Cloud Service Secure Collaboration for the Digital Workplace Dawn of the Digital Business Today s organizations need agile information systems to fully embrace the digital experience.
More information2016 Global Payments Insight Survey: Merchants and Retailers. Changing the merchant experience
2016 Global Payments Insight Survey: Merchants and Retailers Changing the merchant experience 1 Catalyst Payment players need to rethink roles and relationships The payments industry has always been an
More informationRealising possibilities in the cloud: The need for a trusted broker
Realising possibilities in the cloud: The need for a trusted broker Sponsored by BT and Cisco Camille Mendler Summary Catalyst This report draws on a custom study of the cloud experiences and plans of
More informationCloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document
Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationBRING YOUR OWN DEVICE
WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.
More informationMobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda
Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationEnterprise Mobility Management
Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by
More informationMulti-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
More informationOvum Decision Matrix: Selecting a Customer Interaction Analytics Vendor, 2014 15
Ovum Decision Matrix: Selecting a Customer Interaction Analytics Vendor, 2014 15 Publication Date: 15 Sep 2014 Product code: IT0020-000050 Aphrodite Brinsmead Summary Catalyst Contact centers are more
More informationHow To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
More informationHow To Make Money From Your Desktop Virtualisation
Shaping the future of end user services Desktop Virtualisation Seize opportunities before others see them Remember the not-too-distant past?» Traditional thin client systems struggled to gain wide acceptance,
More informationSpecial Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationCA Service Management Solutions 14.1
CA Service Management Solutions 14.1 CA Technologies Publication Date: 06 Apr 2016 Product code: IT0022-000623 Adam Holtby Summary Catalyst IT functions are subject not only to the enterprise-wide mandate
More informationThe transformation of client device and the rise of cloud computing
The transformation of client device and the rise of cloud computing 客 戶 端 設 備 的 轉 化 和 雲 端 運 算 的 崛 起 Jason Lui HP Inc. Agenda 1. Some Definition & Industry Trends 2. Trend for Client end in Cloud Computing
More informationDESKTOP VIRTUALIZATION
May 2012 DESKTOP VIRTUALIZATION Future of Smart Secure Workspaces By Sahana Subramanya Happiest Minds, Workspace and Mobility Practice PURPOSE OF THE DOCUMENT The purpose of this document is to provide
More informationLogicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device
Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More informationHow To Choose Between The Different Options For Cisco Unified Communications And Collaboration Solutions
Cisco Unified Communications: New Deployment Models for Communications and Collaboration What You Will Learn According to a new survey by Forrester Research, 7 out of 10 enterprises are investing in collaboration
More informationIT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
More informationOn the Radar: Alation harnesses crowdsourcing and machine learning to speed data access
On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access Summary Catalyst As organizations widen their net and analyze more data sources, it becomes all too easy for business
More informationMy Experience. Serve Users in a Way that Serves the Business.
Infrastructure Services the way we do it My Experience Serve Users in a Way that Serves the Business. A Smarter Strategy for Empowering Users IT has entered a new era, and CIOs need to perform a delicate
More informationKey Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
More informationComUnity. Move your organization s telephony from servers to service
ComUnity Move your organization s telephony from servers to service ComUnity brings you Telephony over IP, delivered in the cloud. You reduce costs and infrastructure, but improve communication throughout
More informationSecure Data Sharing in the Enterprise
Secure Data Sharing in the Enterprise 2 Follow-me data and productivity for users with security and manageability for IT Productivity today depends on the ability of workers to access and share their data
More informationDeploying an Enterprise-Ready Content Sync-and-Share Solution
Intel IT Content Sync-and-Share Solutions September 2013 Deploying an Enterprise-Ready Content Sync-and-Share Solution Executive Overview Intel IT is deploying an enterprise-ready content sync-and-share
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationEMBRACING SECURE BYOD
EMBRACING SECURE BYOD Acronis 2002-2014 Introduction The Bring Your Own Device (BYOD) movement has evolved from a buzzword and a trend to a full-fledged corporate phenomenon. Tablets and smartphones have
More information