1 From the experts: Managing mobility for the enterprise Key insights around Enterprise Mobility Management Vodafone Power to you
2 The human factor Your people are out there using their own devices already. You can let people do it, or you can do it with them. Bring Your Own Everything or BYOx isn t here because businesses got together and thought it would be a good idea, it s happened because users wanted to bring their own devices and applications to work. No company can sit under a rock and say, this doesn t apply to me. This is happening. It has to be managed strategically. Richard Price, Head of Global Security Portfolio, Vodafone
3 Introduction Mobility is vital and it has to be managed strategically An enterprise has to be clear about what it wants mobility to achieve. The key drivers have to be understood: cost reduction, agility, customer responsiveness, increased productivity they are all goals that should be defined in terms of what mobility can offer. Enterprise Mobility Management (EMM) used to be seen as a set of tools which could track devices and either lock them or wipe them if they were lost. However the landscape has become more complex with different organisations at varying stages of maturity when it comes to mobility. Now, EMM can be used to make sense of a changed landscape, and deliver a strategic process which is both reactive and transformative. It delivers the flexibility and clarity that an organisation needs to find the approach that suits it best, and then to manage and evolve it over time. Richard Price stresses the need to understand that there is no one way to approach EMM. There are a range of different models so it is important to understand why you are doing what you are doing, as a lot of businesses get flummoxed by the vast array of ways you can do this. An organisation of any scale is going to employ more than one model of mobility management, for example you can enable more mobile executives or sales teams to use the device of their choice, while offering less mobile employees a more controlled company device. In today s digital world, managing the flow of information in a secure way has become a challenge and there are no boundaries between the office and home, as we re able to do almost everything through our mobile devices. Therefore, it is important to have a strong mobility strategy in place in order to protect against security attacks. Security is a shared responsibility as it s linked to personal behaviours, with 80% of security breaches due to accidental human error 1. This means we all need to play our role and incorporate security in our day-to-day activities information security breaches study, Department for Business and Innovation, 2014
4 Our insights are based on input provided by a range of experts across verticals who throw a spotlight on the importance of strategic thinking about EMM and, specifically, its security implications. They are: Richard Price Head of Global Security Portfolio, Vodafone Stuart Osborne Chief Security Officer, BAE Systems Plc John Bree Managing Director, Deutsche Bank Jenny Kalenderidis UK & IR RSA Security Division of EMC Richard Knowlton Director of Group Security, Vodafone Barry Coatesworth Chief Information Security Officer & Industry Advisor Retail Sector
5 Managing the inevitable Managing the inevitable An enterprise mobility strategy has to start with opportunities: enabling BYOx (Bring Your Own devices, applications, technology etc.) means you attract and retain the talent you need. It also ensures your employees are more productive, happier, and agile than ever before, and that they can work anywhere and anytime to generate revenue and build a strong brand reputation globally. Allowing employees the ability to switch between personal applications and those being used for business purposes doesn t necessarily undermine productivity. It has been thought that being able to balance both work and personal priorities throughout the day makes people happier, which makes them more productive and loyal 1. 83% of workers reported to have higher productivity levels when working from home due to BYOx and flexible working. 2 Mobile devices are now a natural part of our lives and a new generation of digital natives are entering the workplace who take it for granted that they will be able to use their own devices. If employees can t bring their own everything then research shows that it s likely that, on average, Generation Y (born between ) will leave the organisation after 2 years if their demands aren t met 3. Therefore, it is thought that finding the right talent will become harder for enterprises that aren t truly mobile. 83% of workers reported to have higher productivity levels when working from home due to BYOx and flexible working. 2 1 A good discussion of the neuroscience behind this conclusion can be found in The Organized Mind: Thinking Straight in the Age of Information Overload by Daniel J. Levitin (2014) 2 Vodafone Global Enterprise ICT decision maker research Gallup, 2014
6 Good strategy is based on realism and honesty Good strategy is based on realism and honesty Your people are your biggest asset their talent, experience, connections, ideas, innovative thinking, sheer determination to get the job done brilliantly is what generates revenue but in a mobile world they are also your weakest link. Jenny Kalenderidis Stuart Osborne points out that we need to be honest about people, we all make mistakes that s because the world is very complex and, well, things happen. John Bree agrees, and adds that, even though you have different generations of people in organisations that have different views of how you share information and what you share, you ve got to start with the premise that, the majority of people are honest. Strategic thinking is all about balancing opportunities with risks. It s easy to focus too much on risk which, in the end, paralyses action through fear of the unknown. Jenny Kalenderidis stresses that mobility is an amazing opportunity, and that thinking about risk should be seen as a positive way of delivering mobility that works. Jenny is clear about the approach enterprises should take and says that you need a good understanding of risk so you can manage it. Be realistic about what is happening inside your business and what might come at you from outside, and then create a plan that protects your assets, but also takes into account that breaches in your defences will happen at some point. Jenny s experience shows how important crisis management is and that it s about having a plan so you can manage the inevitable, once something happens be honest, be quick, get out in front of the incident. Enterprise mobility comes with risk. You need to think about the kind of company you want to be, and organise it so that you can create and sustain a relationship of trust within your company and with your customers and suppliers. Reputation is vital to achieve that. You need a robust risk management strategy and it needs to be external facing as well as internally focused. Jenny Kalenderidis
7 Enabling mobility mitigating risk Enabling mobility mitigating risk Managing mobility is as much about managing people and what they do as it is about technology. The point is to ensure the right behaviours based on robust policies, good security technology and constant vigilance. As Barry Coatesworth says, In God we trust; everyone else we monitor. It s important that you create a good infrastructure and have policies that are suited to your specific needs that take into account all the different devices and cloud-based services or online contact points that your people will bring to work. However, creating policies isn t enough, they have to be communicated and understood as well as followed, and they have to keep up to date with the devices and services that your people are using. Creating and implementing the correct polies isn t just a job for an IT department or IT professionals, it s an enterprise-wide effort that extends from the C-level down to each individual with a smartphone in their hand. Everyone has to understand what can be done and what can t, and be trusted to follow the rules. Richard Knowlton stresses that trust doesn t exist without relationships between people who are working every day to protect their organisations. It s also crucial to understand that your partners within your supply chain are also an important factor in mobility management. Third party suppliers can often be used as entry points into your own systems or people. If their policies aren t as robust as yours, then your policies are not robust at all. John Bree points out that in the financial industry trust is everything, which is why they actively examine all vendors because, we have to know who they are and what their reputation is and do it right through the supply chain.
8 Enabling mobility mitigating risk Enabling mobility mitigating risk Employees want the flexibility to use their favourite operating systems and applications and are prepared to counter official policies to do so, with 51% of people aged 21 to 32 stating that they would contravene company policies restricting use of own devices, cloud storage and wearable technologies for work. 1 Richard Price is clear about the need for good strategic thinking about mobility, it s a positive thing. It needs to be managed and if you manage it right you ll get what you want out of it, but you need to think about security and what people are after what you can lose. The weakest link is the people using all those devices so managing the way they use and approach their devices is very important. Security is moving up the scale of importance at board level with C-level executives regularly reading about their peers experiencing headline-grabbing breaches and they don t want to be put in that position. It s their reputation and the reputation of their business that s on the line. At Vodafone we want security to be an enabler that not only protects your reputation but enhances it by delivering mobility through excellent enterprise management, says Richard Price. Security isn t just another cost centre, it s a positive part of creating an infrastructure that delivers agility, efficiency and productivity and can help reduce costs whilst increasing revenue. It needs to be part of the DNA of your enterprise mobility solution. 1 Millennial branding, 2014
9 Stuart Osborne stresses a simple point which shows how security is not just on the downside of mobility, it enables organisations to be more confident and to focus on doing their work. Vodafone s approach transcends what Richard Knowlton calls old-style thinking, which sees security as an obstacle to innovation and agility. By making security part of the strategy from the start, rather than thinking about it later, will speed a business s move to a more mobile workforce and, therefore, a more agile presence in fast moving markets. Enabling mobility mitigating risk
10 The future of Enterprise Mobility Management The future of Enterprise Mobility Management Vodafone s strategic offering It s clear that EMM is a vital part of any organisation s strategy, especially as mobility is a major trend that all organisations need to face and turn into their advantage. We do a lot of research with our customers to understand what the different models are, what the business cases are and what the risks are, so we have a good consulting practice that can help customers decide what s appropriate and where in their businesses, and how to roll it out. How you deploy it is very important, you ve got to get it right, says Richard Price. We have a very comprehensive set of tools that s growing all the time the Enterprise Mobility Management proposition provides a wide range of tools and services that we can selectively apply depending customer need in different parts of their organisations. We can give you the chance to step back and think about the strategic benefits of mobility and all its security implications in a holistic way. Richard Price stresses that it s a partnership we can help you at whatever stage you re at, from building a strategy to helping with the technical, implementation and management. We can help you achieve a truly connected workforce that s able to use multiple devices, operating systems, enterprise content, and applications securely. We can help you reduce complexity and enable you to set a consistent and granular mobility strategy that matches your business needs. We can help you to manage costs and embrace change so you can become a Ready Business a business that is more agile, responsive and innovative. To find out more please contact your account manager or visit enterprise.vodafone.com
www.pwc.com PwC Advisory Oracle practice 2012 How to drive innovation and business growth Leveraging emerging technology for sustainable growth 1 Heart of the matter Top growth driver today is innovation
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES The Digital Dividend: First-Mover Advantage Sponsored by SPONSOR S PERSPECTIVE ANTHONY RECINE SENIOR VICE PRESIDENT AND CHIEF MARKETING OFFICER VERIZON
New Ways Of Working Managing the open workforce CGMA REPORT Proud Imperial Sponsor: CGMA powered by the AICPA and CIMA Two of the world s most prestigious accounting bodies, AICPA and CIMA, have formed
CONSUMERLAB BUSINESS USERS GO MOBILE A study of enterprise mobility transformation An Ericsson ConsumerLab Insight Summary Report December 2014 ERICSSON CONSUMERLAB GAMING IN THE NETWORKED SOCIETY 1 contents
Introduction.... 1 Emerging Trends and Technologies... 3 The Changing Landscape... 4 The Impact of New Technologies... 8 Cloud... 9 Mobile... 10 Social Media... 13 Big Data... 16 Technology Challenges...
TELSTRA CYBER SECURITY REPORT 2014 Security insights, trends and impact to Australian organisations EXECUTIVE SUMMARY The internet presents a world of social connectivity, economic growth and endless opportunities
THE CIO AS CHIEF INNOVATION OFFICER: HOW CLOUD IS CHANGING THE CIO ROLE By Tom Fisher, Senior Vice President and Global Commercial CIO, Oracle 2014 W W W. OU T S O U R C IN G - CEN T E R. C O M Table of
A HARVARD BUSINESS REVIEW ANALYTIC SERVICES REPORT CLOUD COMPUTING COMES OF AGE Copyright 2015 Harvard Business School Publishing. sponsored by SPONSOR STATEMENT For business leaders, speed is the primary
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
Exploring Strategic Risk 300 executives around the world say their view of strategic risk is changing Contents 3 Executive summary 5 Strategic risk emerges as a key focus for businesses around the world
Non-life insurers are being left behind by the rapid changes in customer expectations. How can digital innovation help them to engage more closely with customers and what untapped commercial opportunities
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES How the Cloud Looks from the Top: Achieving Competitive Advantage In the Age of Cloud Computing Sponsored by Length of Time Using Cloud Computing Figure
State of Privacy Report 2015 SYMANTEC / STATE OF PRIVACY REPORT 2015 01 Contents Introduction 02 01 The Depth of Security Concern 05 02 The Data Trust Gap 19 03 Where Does The Responsibility Lie? 27 04
ACE PARTNERS IN CZECH REPUBLIC, FRANCE, GERMANY, ITALY, POLAND, SPAIN, SWEDEN, SWITZERLAND, THE NETHERLANDS AND UNITED KINGDOM AUTONOMOUS TEAMS WATCH OUR MOVIE 2015 ABOUT ACE ACE Allied Consultants Europe
John G. Stumpf, Chairman, President & CEO The Vision & Values of Wells Fargo 2 Regardless of our growing size, scope and reach, our common vision and distinct values form the fabric that holds us together
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Meeting the Cyber Risk Challenge Sponsored by ABOUT ZURICH INSURANCE GROUP Zurich Insurance Group (Zurich) is a leading multi-line insurance provider
THE FUTURE OF INSURANCE IT INFRASTRUCTURE A SURVEY OF GLOBAL INSURANCE LEADERS This is an authorised reprint of an independently researched and executed report granted by Celent exclusively to Wipro Technologies.
ISO 9001 It s in the detail Your implementation guide ISO 9001 - Quality Management Background ISO 9001 is the world s most popular quality management system standard and is all about keeping customers
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
Identity and access management as a driver for business growth February 2013 Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still
MITSloan MANAGEMENT DIGITAL TRANSFORMATION: A ROADMAP FOR BILLION-DOLLAR ORGANIZATIONS FINDINGS FROM PHASE 1 OF THE DIGITAL TRANSFORMATION STUDY CONDUCTED BY THE MIT CENTER FOR DIGITAL BUSINESS AND CAPGEMINI
Rob Davis Everyone wants a good process. Our businesses would be more profitable if we had them. But do we know what a good process is? Would we recognized one if we saw it? And how do we ensure we can
Thought Leadership SERIES AUGUST 2011 Unlocking the Power of Mobile Device Management Mobile device management (MDM) is about more than technology it s also about skillful strategic resource management.
We ve never told our in-depth story like this before: looking at the history, lessons learnt and the challenges faced on our Big Data journey. Lorraine Stone EXCLUSIVE INTERVIEW A BEHIND THE SCENES LOOK
WHITE PAPER RICHARD S. WELLINS, PH.D., SR. VICE PRESIDENT AUDREY B. SMITH, PH.D., SR. VICE PRESIDENT, EXECUTIVE SOLUTIONS SCOTT ERKER, PH.D., SR. VICE PRESIDENT, SELECTION SOLUTIONS WHITE PAPER NINE BEST
Your complete guide to Business VoIP Telephony Hosted VoIP for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 VoIP today 3 What is Hosted VoIP? 4 How does Hosted VoIP work? 4 Is Hosted VoIP
CIC Guide: Continuous Delivery Realization Enterprise DevOps realities and a path towards Continuous Delivery A Creative Intellect Consulting Executive Summary Report IT as a competitive advantage is an
PERSONAL HEALTH BUDGETS GUIDE Developing a local peer network Author: Jo Fitzgerald, peoplehub with thanks to Andrew Tyson, Rita Brewis, Trudy Reynolds and the national personal health budgets peer network.