The Pillars of a Next-Generation Enterprise Mobility Solution
|
|
|
- Maria Parsons
- 9 years ago
- Views:
Transcription
1 White Paper The Pillars of a Next-Generation Enterprise Mobility Solution Prepared by Ari Banerjee, Principal Analyst, Service Provider IT Sarah Wallace, Analyst Heavy Reading on behalf of September 2014
2 Executive Summary As smart devices become more ubiquitous, consumer behavior has now translated to the corporate environment, and enterprise customers are now asking that their employees have access to company information anytime, anywhere. This is in part because of employees' demands, but also, from a production standpoint, because enterprises want to be able to provide services in any environment or enable their employees to be productive on the move. Today, the notion of a mobile enterprise is equated to increased productivity, enhanced efficiency and thus cost savings. So of course, communications service providers are seeing increasing demand from their customers for mobile enterprise solutions. Enterprise customers represent "bulk" sales, covering multiple subscribers in a single sale. This is an attractive opportunity for service providers, which are eager to increase their ARPU. This is the underlying motivation for any small to midsize business (SMB) or enterprise-class offering. However, making a mistake in terms of product or vendor choice can have a devastating impact. Flawlessly accommodating the demands of a mobile enterprise is easier said than done, as service providers are grappling with dated, legacy systems and lack expertise in areas such as device security and niche application management. Service providers are looking for a comprehensive enterprise mobility solution provider that will enable them to overcome such hurdles and provide enhanced services. Enterprises have high expectations when it comes to enterprise mobility. Service providers must have capabilities such as device and application management in place, ensure a highly secure mobile environment and give enterprise customers peace of mind as they allow employees to bring their own devices to work or download non-work-related applications. In order to provide such capabilities, service providers must have pillars in their operations such as embedded advanced analytics, which will enable real-time actionable insight as it allows for a more granular look at an enterprise customer's applications, network and data. Service providers must also have a more modular approach to mobile services that allows for the independent development of different mobile areas (such as device and applications) which will, in the end, enable greater agility in serving enterprise customers. It is also essential that service providers provide a flexible environment that is easily able to roll out new mobile applications to an enterprise as their needs quickly change. In order for the industry to provide a more robust and flexible mobile enterprise ecosystem, the key requirements are that service providers have a more innovative yet secure environment that will easily allow for the management of mobile services without jeopardizing the enterprise customer's valued network or proprietary corporate information. Service providers must select a solution provider that will keep them up to date on modern-day device and application management. For example, today's service provider should be able to offer their enterprise customers such capabilities as app wrapping for policy and application management, and device management that prevents jailbreaking. Additionally, a next-generation enterprise mobility solution must easily integrate with a service provider's existing solutions. This will enable both the service provider and the end user to have a seamless, real-time mobile experience, which will promote efficiency and cost savings in the long run. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 2
3 Drivers for Enterprise Mobility More and more, communications service providers are finding that their business customers are asking for services to support or enhance mobility, to allow for a more flexible work environment that enables productivity on the move. This demand for mobility grows every day, alongside the increased penetration of smart devices, increased use of mobile broadband and increased expectation of anytime, anywhere access to customer information. Productivity on the Move Increased mobility means an enterprise customer's employees will be able to work and access their organization's applications no matter where they are, and from any device. Heavy Reading recently conducted a survey of 61 unique service providers worldwide, examining respondents' attitudes, perceptions and plans for how to better serve their enterprise and SMB customers. Survey respondents indicate that enterprises and SMBs most want mobility application services such as videoconferencing, field workforce automation, integrated business process automation and document editing and sharing (Figure 1). Figure 1: What Types of Mobility Application Services Are Enterprises & SMBs Asking Your Company For? Source: Heavy Reading Field workforce automation increases the effectiveness of the mobile workforce by delivering integrated forecasting, scheduling, dispatch and reporting. These solutions are designed to create an efficient mobile workforce by transforming the way in which field technicians process orders, by taking business processes to the service site and allowing them to complete work on time. Integrated business process automation is the strategy a business uses to automate processes in order to contain costs. It consists of integrating applications, restructuring labor resources and using software applications throughout the organization. Document workflow automation HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 3
4 also simplifies collaboration and improves employee efficiency by automatically directing documents and business content to the right place at the right time with notifications. These are all prime examples of how service providers can enhance their enterprise customers' productivity and operations by enabling increased mobility. Digital Lifestyle Translates From Consumer to Corporate As previously mentioned, customer behaviors are changing, and customers are seeking a digital lifestyle. This means providing services bundled in an ecosystem across many devices, along with a digital content landscape that should ideally offer subscribers virtually unlimited choice. Consumer habits have brought this demand for a digital lifestyle into the corporate environment. Service providers from around the globe attest that enterprise customers are now behaving like consumers, and this is one of the main drivers behind the demand for increased mobility. Leading examples of these lifestyle demands are employees' requesting to be able to bring their own device (BYOD) or choose their own device (CYOD). Enterprise customers are getting to the point where they have no choice but to meet these needs of their employees, but supporting various platforms (i.e., Apple and Android) is not easy, and service providers currently lack the expertise, and thus find the task daunting. When looking for an enterprise mobility solution, service providers must work with a vendor that will support the rapidly changing needs of their enterprise customers and allow for quick implementation of new products and services. The reason is that consumer needs are changing at breakneck speed, and as the consumer lifestyle now translates into the corporate world, the expectations of the two environments are now rapidly changing, but in parallel. Service providers must also work with a vendor that will help them with risk protection in areas such as identity, device loss, corporate data loss, authentication, network threats, etc. Cost Enterprise customers also see increased mobility as a critical mechanism to save money through improved productivity. The aforementioned use cases of videoconferencing, field workforce automation, integrated business process automation and document editing and sharing help employees such as sales or field workers become more efficient. For example, sales employees that spend a lot of time traveling or field workers who are offsite will be able to update their work data instantly, rather than having to wait to get back to a desk. The use of tablets by field workers is becoming quite common, giving them immediate access to their companies' applications. However, in order for these mobile initiatives to be successful and really increase productivity, the applications themselves must be properly managed, or the initiatives may be moot. By offering enterprise services that enable increased mobility and productivity, service providers will find that cost savings on their end will create cost savings for the end user as well, increasing customer satisfaction and customer loyalty. Time to Market There is no doubt that service providers face the increasing challenge of sharing the market with over-the-top (OTT) players. Not only are service providers seeing their traditional voice revenues shrinking due to OTT players, but services such as SMS are taking a hit as well. OTT players are able to circumvent the service provider network HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 4
5 by offering free communications services via a user's WiFi connection, and they are not burdened with dated, legacy systems. Traditional OTT providers such as Google, Skype and Facebook have always been a threat, but small app-based players such as WhatsApp [now part of Facebook] and Nimbus are increasingly present. This market environment creates greater pressure for service providers to rapidly introduce their own new technologies and services in order to survive. In the past, service providers' dated, legacy systems were their excuse for slow time to market. Another Heavy Reading survey asked 60 service providers worldwide, "What is the top competitive challenge for your company?" The top answer, with 76% of respondents, was slow time to market with product launches and changes to plans. This shows that service providers are well aware that time to market is a competitive challenge. In the age of mobility, service providers now have the ability to deliver services faster via mobile apps that can be released or updated more easily. However, in order to remain relevant in today's digital world, service providers also need to capitalize on the real-time intelligence and customer insight that can be enabled through the use of advanced analytics. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 5
6 Enterprise Mobility 'Must Haves' As enterprises ask for more mobility, they are becoming more selective in the service providers they choose. The following are key "must haves" to differentiate service providers' enterprise mobility solutions. Embedded Advanced Analytics Traditional, static business intelligence solutions no longer apply to service providers' modern-day needs. Enterprise mobility solutions must have embedded advanced analytics that can perform tasks such as pull data from existing CRM and self-service portals to enable data mining and reporting, and ultimately create actionable insight. Data pulled from these systems, or from the resource management layer itself, provide insight into areas such as customer usage patterns, trends of service consumption and changing demands, and planning of resources such as applications. Advanced analytics closely aligned with service providers' IT systems should enable enterprises to optimize or configure mobile services, predict and prevent failures, and provide more customized services depending on an enterprise customer's needs or even offer virtual profile exchange with third parties to enhance their position in the value chain. Heavy Reading recently conducted a survey of 65 unique service providers worldwide that examined their attitudes, perceptions and plans for their enterprise and SMB customers. When asked what kinds of requests they were getting from business customers regarding the consumerization of IT, most respondents pointed to having separate price plans for personal and business use, along with the ability to disable certain services when a user switches from business to personal mode (Figure 2). Figure 2: What Requests Does Your Company Get From Business Customers Regarding the Consumerization of IT? Source: Heavy Reading These capabilities along with the other responses, such as reporting can all be enabled by the use of embedded advanced analytics, which will allow for more HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 6
7 granular usage of both customer and network data. Service providers that use advanced analytics will have a distinct edge in providing enterprise mobility services. Solution Modularity Modularity in design is an approach that subdivides a system into smaller parts (modules) that can be independently created and then used in different systems to drive multiple functions. For a service provider's enterprise mobility solution, the advantage of modularity is that the solution can be divided into functions such as application or device management (which allows for more flexibility), but these functions are still integrated on the back end and are relating to one another. So even though modules are independent of one another, they can still communicate with each other, which makes it easier for service providers to develop, test, deploy and maintain services for their customers. The advantage of this approach versus a monolithic one is that each module can be managed independently, making the overall solution architecture more flexible and making integration with third-party applications easier, without the requirement of integrating with all the other solution functions. A modular approach will create more flexibility for both the service provider and enterprise customer when enabling mobile services. Detecting & Reporting Jailbroken Devices Many smartphone, tablet and game console makers include a layer of digital rights management (DRM) software on their products. This DRM exists to limit the software you can run on it and is simply there for security reasons. However, many device owners prefer to jailbreak (or hack) their device so that they may bypass the DRM restrictions and run unauthorized software or make tweaks to their operating system. iphone hackers first coined the term "jailbreaking," in reference to breaking the phone out of Apple's itunes "jail." The term has since been (somewhat erroneously) used in a more general sense to refer to similar hacks made to other platforms such as Android, where it's also known as "rooting." In any case, regardless of what you call it, the basic concept is the same: Once a user jailbreaks a phone or tablet, the device can be altered and unofficial apps or console emulators can be installed. This can be very dangerous, as many applications today are malware in disguise. This can also be a threat in terms of a virus or malicious application that may fish for information and infiltrate a company's proprietary information. Just one compromised device can lead to a massive security breach. Since jailbroken devices have zero security, this can allow hackers to obtain access to corporate networks (since many company phones have VPN capabilities) and hackers can gain access to company data such as s, passwords and address books. Service providers that intend to provide comprehensive mobile service to its enterprise customers must be able to ensure the detecting and reporting of jailbroken devices. App Wrapping & Policy Enforcement One of the most important elements in providing mobile service to enterprise customers are the mobile applications themselves. These applications are crucial in enabling easy access and mobility to employees, thus enhancing their work experience and enabling efficiency. The key to making the use of these applications successful, however, will be proper management. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 7
8 The two primary methods of managing and securing mobile apps are software development kits (SDKs) and app wrapping. Only some vendors are able to do app wrapping; most require SDK integration of an app to leverage centralized policy management. App wrapping is the process of applying a policy-based management layer to a mobile app without requiring any changes to the underlying application. App wrapping allows a mobile application management administrator to set specific policy elements such as user authentication or file sharing that can be applied to an application or group of applications. In the enterprise, app wrapping allows an administrator to take an application, associate extra security and management features with it, and re-deploy it as a single, containerized program in an enterprise app store. App wrapping may also aid in the separating of personal and corporate data at the app level, so the granularity of app wrapping makes it well suited to a BYOD environment. The main difference between an SDK and app wrapping is that an SDK must be included while the application is being developed, whereas app wrapping can happen after an application is developed and allows business customers to easily modify and secure third-party apps. Heavy Reading believes that app wrapping, thanks to this flexibility, is better than a policy SDK approach. One of the other key benefits of app wrapping is that the app developer does not have to be an expert in security; they can leverage the expertise of the industry leaders to provide that layer. A service provider offering a flexible mobility suite will allow for both methods, or at least have app wrapping capability. Differentiating From OTT Competition Service providers are in a vulnerable position as they try to compete with OTT players that are well established in serving business customers and offer ready-to-use applications in an SaaS/cloud model, as well as pre-integrated apps on mobile devices and disruptive pricing models. OTT cloud service providers such as Amazon Web Services, Rackspace, Google, etc., are the market leaders in the cloud space and continue to provide tough competition to service providers. There are certain attributes that service providers believe they can provide better than their OTT competitors. For example, their closeness to the network enables them to provide 24/7 support and network-enabled failover between locations and network ownership, as well as the ability to bundle connectivity services with cloud services. This bundling may help reduce cost, which service providers believe will help them to differentiate their enterprise offerings from the competition. Service providers are also able to integrate services in a single application (i.e., messaging and video) with secured data, which gives them an advantage. And as the trend accelerates toward the Internet of Things in which an array of devices will have their own IP addresses the role of service providers becomes more relevant in terms of connection and device management. As more and more OTT players come on the scene every day, it is crucial that service providers highlight their strengths and distinguish themselves from such competition. Their proximity to the network and the enterprise customer's user history and data help them to provide more customer-specific service and support. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 8
9 Next-Generation Enterprise Mobility Solutions Service providers must ensure that their vendor's next-generation mobile enterprise solution enables the following capabilities. Includes Device & Application Management A service provider's enterprise mobility solution should also allow for mobile device management (MDM) especially in the era of BYOD and CYOD. In terms of enterprise mobility, MDM means the management of smartphones, tablets and laptops in the workplace. The goal of proper MDM is to optimize the functionality and security of mobile devices within the enterprise, while simultaneously protecting an enterprise's network and proprietary data. MDM software enables the distribution of applications, data and configuration settings and patches for all the company's devices, and allows an administrator to oversee the devices (as easily from their desktop computer) and monitor the enterprise's users. MDM tools should include application management, file synchronization and sharing, data security tools, and support for either corporate-owned or personal devices. Application management is critical for enterprise mobility and can enable automatic policies through techniques such as app wrapping. Application management also enables functions such as application planning, which can allow for the assignment of certain applications to certain groups of employees, and determine which applications are being downloaded, corporate or personal. Being able to differentiate and steer when apps are downloaded helps optimize bandwidth and bolsters security. And, of course, the ability to detect failure in the application layer helps ensure that the customer's application environment is stable and reliable. Enables Flexibility A next-generation mobile enterprise solution must allow service providers to have a flexible environment. Service providers must be able to meet enterprise customers' changing needs by allowing for quick rollout of new mobile applications or quickly customize enterprise services to accommodate their customer's needs. After new services are rolled out, service providers must be able to quickly confirm whether the services are successful, and then either alter or stop them. In order to remain relevant, service providers must be able to do all of this in real time. A next-generation mobile enterprise solution vendor must enable service providers to quickly make informed decisions based on the customer data collected in the network, application or service layer. These types of flexible capabilities will be enabled through the use of embedded advanced analytics. And since there is also strong demand among service providers for strategic solution partners, being able to easily integrate with these partners will enable them to provide more services to their enterprise customers and remain innovative. Overall, service providers are looking for a solution that both enables flexibility within their own operations and easily interfaces with other providers. Device Security & Jailbreaking Detection The era of BYOD and CYOD makes companies' mobile strategies much more complex, as they now have a multitude of devices and platforms, making their networks and applications more susceptible to security risks. Device attacks are becoming HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 9
10 more common, and the smaller memory of mobile devices makes security more difficult than a PC environment: Virus scanning on mobile devices has constraints, security functions such as administrative updates can be difficult, and connectivity and bandwidth can be issues as well. Service providers must pick a solution that will enable mobile threat protection and enable comprehensive device security policies. As with other types of attacks, the ultimate target is usually the network, rather than the device itself. For example, if an attacker can gain complete (root or admin) access to an employee's device, they will have access to all of the sensitive data on the device, which poses the worst risk to the enterprise. This allows an easy back door for attacks to get into the corporate network, which can wreak havoc. This is one of the biggest challenges that enterprises face as they allow BYOD and CYOD. A next-generation enterprise mobility solution provider must enable service providers to offer such security, as it is now a standard and essential requirement. Doesn't Compromise Operations/Easily Integrates Obviously, the ideal solution for any service provider, no matter what the task, would be one that does not compromise operations and easily integrates with existing systems to give the service provider and its customers a seamless experience, regardless of any changes behind the scenes. In the case of a next-generation mobile enterprise solution, it should easily integrate with a service provider's billing and customer care systems, and it should also be easily managed, both from the service provider and business customer perspective. Remote monitoring and over-the-air management of remote devices is a critical feature, as a poor interface and/or lack of a centralized management console will, in the end, provide a poor customer experience. In today's competitive telecom environment, service providers must aim to enhance the customer experience, not degrade it. The solution vendor will have to enable a seamless implementation and integration for both the service provider and end customer. Policy Enforcement via App Wrapping App wrapping is the process of applying a policy-based management layer to a mobile app without requiring any changes to the underlying application. This means that a specific set of policy elements can be applied automatically, which allows for heightened security. Apps can be wrapped with policies to enhance it with various security capabilities such as encryption, authentication, VPN connection or geo-location. This will allow service providers to differentiate their solutions for enterprise customers by protecting data in transit via app proxy by driving corporate apps through the corporate VPN, but leaving personal traffic on the user's data plan. Users have no idea that their application has been wrapped but on an administrative level for corporate apps it adds more security, priority and added peace of mind. When choosing a next-generation mobile enterprise vendor, service providers should look for a solution provider that will offer policy enforcement via app wrapping. Heavy Reading believes this approach to policy management is more flexible, and this flexibility will allow for continual security to an enterprise customer's devices and network. A more static model, such as an SDK, will take longer to update and not be as agile for both the service provider and the enterprise customer. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 10
11 Highly Secure As service providers offer enterprise mobility services and enable capabilities such as BYOD and CYOD, one of the biggest concerns for all parties involved is security. Security is especially a concern when employees download third-party apps that may cause issues on enterprise networks. Figure 3 drawn from the same survey as Figure 2 shows that service providers see security as the biggest problem in supporting their business customers' BYOD initiatives. And as device security is complex, service providers may look to experts to help them in areas such as malware detection, app reputation, and performance and reputation analysis, as all of these will help in heightening enterprise security. Figure 3: What Key Problems Do You Envision in Supporting Your Business Customers BYOD Initiatives? Source: Heavy Reading So, a next-generation mobile enterprise solution provider will have to enable high security for both the device and application layers and engender confidence in service providers as they offer new mobile services. BYOD/CYOD initiatives are very appealing in terms of cost savings and productivity, but both enterprise customers and service providers still have many concerns in providing or enabling such services. A next-generation enterprise mobility solution provider will have to ensure that all aspects of their solution are highly secure to both the end user and service provider. This will help solidify the service provider's trust with its enterprise customers and also ensure regulatory compliance by securing customer and transaction data. Enables Multi-Tenancy Multi-tenancy means the ability to utilize the same software/hardware to serve a number of tenants. A next-generation mobile enterprise solution must enable multitenancy, so that a service provider's application can serve multiple customers and ultimately provide the ability for tenants to customize some parts of the application, such as user interface color or certain business rules. In the end, multi-tenancy can be economical for both the service provider and their enterprise customers, because software development and maintenance costs are shared. In terms of operational efficiency, with a multi-tenancy architecture, the provider only has to make updates once. And with cloud computing models, multi-tenancy architecture has been virtualized and includes remote access. It is crucial that service providers have this ability, and that their solution provider deems it just as important. This will be key in enabling the service provider to handle growth in the future as well. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 11
12 Vendor Profile Symantec Symantec's Mobility Suite is a next-generation mobile management solution that service providers may use to enable anytime, anywhere productivity for their enterprise customers. Symantec Mobility Suite is designed to make mobility manageable and secure and integrate mobile device management (MDM), mobile application management (MAM) and threat protection into one centrally-controlled console. By targeting mobile security at multiple layers, Mobility Suite enables enterprises to embrace BYOD and CYOD policies without compromising security or infringing on user privacy. Through its unique app wrapping technology, Mobility Suite applies a security and policy management layer around mobile apps and content, while enabling a clear separation of enterprise and personal data on the device. Because it does not require source code changes or an SDK, administrators can wrap an app in a matter of minutes, accelerating the time to deployment. To further reduce IT overhead, Mobility Suite allows end users to choose new mobile apps and content from an intuitive enterprise "app store," which enables self-service support of mobile application and computing needs. Figure 4: Symantec Mobility Suite An Integrated, Modular Solution for Multiple Use Cases Source: Symantec Symantec's modular approach allows companies to deploy MAM or Threat Protection in conjunction with an existing MDM solution or without one, giving enterprises optimal protection and flexibility. The MDM module offers broad mobile platform support, including ios, Android, Samsung SAFE and Windows Phone, allowing companies to support a greater range of user-chosen devices. By deploying Symantec's Mobility Threat Protection, end users and enterprises can gain greater visibility into app use HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 12
13 and their device impact. Leveraging Norton Mobile Insight and Symantec's Security Technology and Response (STAR) experts, companies can secure personal and corporate-owned Android devices without the fear of compromised information. Symantec Mobility Suite is designed to address all the critical aspects of enterprise mobility, including: Device Management: Mobility Suite includes comprehensive and scalable MDM, providing visibility and control over ios, Android and Windows Phone smartphones and tablets. Users can enroll devices in their enterprise environment, configure and update device settings over the air, and protect their mobile devices with certificatebased security. Enterprises can prevent non-compliant devices (such as jailbroken/ rooted devices, or devices missing required apps) from connecting to corporate assets, helping ensure compliance to internal and external security requirements. Application Management: Corporate apps and data are protected using a technology that wraps a layer of security and policy management around mobile apps, without any source code changes or SDK embedding. This powerful technology provides granular control of corporate apps and data with comprehensive per-app policies for connectivity, authentication, encryption, data access and document/ data sharing. Enterprise App Store: The enterprise app store lets system administrators/it easily distribute and manage in-house or third-party apps to employees and other authorized users. Employees, contractors and partners can view only the apps they are authorized to use based upon their roles. Users can rate and review apps, while administrators can get reports on app downloads. Secure Productivity Apps: Mobility Suite includes Symantec Secure and Symantec Secure Web, which allows IT to accelerate mobile productivity with a protected mobile workspace. Secure , a Microsoft Exchange ActiveSync-based app, allows secure syncing and storage of corporate . Secure Web, a secure Web browser, provides safe access to internal Web-based applications and content. The Symantec Sealed marketplace, an ecosystem of secured third-party mobile apps, provides wrapped apps for document editing, file sync and share, note taking and more. With this secured ecosystem, content cannot transverse to an unsecured domain (i.e., personal ), unless specifically permitted in the ITmanaged profile. Content Management: Mobility Suite's mission is to make it easier for enterprises to distribute files and manage content on end-users mobile devices. Employees and partners have a common place to get critical documents where and when they need them. Documents and multimedia content can be distributed in different file formats, and appropriate corporate security policies can be applied at a per-file level. In addition, content can be updated and revoked seamlessly, easily supporting the dynamic nature of every organization. Threat Protection: Mobility Suite provides protection against malicious threats and unauthorized access to sensitive corporate information. Leveraging technology, research and intelligence from Norton Mobile Insight and Symantec STAR experts, the suite protects Android devices from privacy and performance risks, mobile malware and fraudulent websites. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 13
14 Conclusion As the consumer digital lifestyle translates into the corporate setting, enterprise customers are expecting and demanding ease of access and mobility. Service providers are well aware of this demand and are more than willing to accommodate their enterprise customers, as they need to make up for revenue losses in more traditional services. However, there are many hurdles that prevent service providers from enabling enterprise mobility, such as dated back-office systems and lack of expertise in areas such as security or application and device management. Service providers must look to a next-generation enterprise mobility solution provider that will enable a flexible and innovative, yet secure environment that will easily allow for the rollout of new mobile applications and services without jeopardizing the enterprise customer's valued network or proprietary corporate information. They must select a solution provider that uses modern, agile techniques such as app wrapping for policy and application management, and device management that can preemptively prevent jailbreaking or the compromise of the corporate device. These capabilities, paired with the use of embedded advanced analytics to enable real-time actionable insight, are imperative traits for a next-generation enterprise mobility solution, providing the end user with a seamless, real-time mobile experience that will promote efficiency and cost savings in the long run. In Heavy Reading's opinion, Symantec Mobility Suite is very well aligned with our vision of a next-generation mobile enterprise solution for service providers. Symantec's solution provides App Management, Device Management and Threat Protection modules to give service providers choice in deploying the right solution for their needs. The Symantec Mobility Suite is available as a hosted solution that allows the delivery of advanced application, device control and multi-tenant administration from service provider-branded portals. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 14
15 About Symantec Symantec Corporation (Nasdaq: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia. HEAVY READING SEPTEMBER 2014 WHITE PAPER THE PILLARS OF A NEXT-GENERATION ENTERPRISE MOBILITY SOLUTION 15
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
CSPs Must Keep Up With the Changing Needs of Business Customers
White Paper CSPs Must Keep Up With the Changing Needs of Business Customers Prepared by Ari Banerjee Senior Analyst, Heavy Reading Sarah Wallace Analyst, Heavy Reading www.heavyreading.com on behalf of
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Securing Mobile App Data - Comparing Containers and App Wrappers
WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this
EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
IT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Security and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
A CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Android for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment
I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise
W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Codeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform [email protected] https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
MSP Relevance. MSP Relevance. the Era of Cloud Computing. the Era of Cloud Computing. Brought to You By: A Channel Company White White Paper Paper
A Channel Company White White Paper Paper MSP Relevance MSP Relevance How How MSPs MSPs Can Can Stay Stay Relevant Relevant in in the Era of Cloud Computing the Era of Cloud Computing Brought to You By:
IBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
Cortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
Building a BYOD Strategy For Education
A CBTS White Paper Building a BYOD Strategy For Education Chris Burns Marketing Director, CBTS 8/1/2012 www.cbts.cinbell.com Overview the BYOD Trend in Education Bring Your Own Device (BYOD) is one of
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
Optimizing the Mobile Cloud Era Through Agility and Automation
Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
The flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
BENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
CA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
At the Heart of Connected Manufacturing
www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
Top 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Protecting Android Mobile Devices from Known Threats
Protecting Android Mobile Devices from Known Threats Android OS A Popular Target for Hacks White Paper Zero Trust Mobile Security An Introduction to the BETTER Mobile Security Platform BETTER at work.
When Computers really become Personal
When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation
The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
My Experience. Serve Users in a Way that Serves the Business.
Infrastructure Services the way we do it My Experience Serve Users in a Way that Serves the Business. A Smarter Strategy for Empowering Users IT has entered a new era, and CIOs need to perform a delicate
Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series
Series Seven Simple steps For Mobile Device Management (MDM) Mobile device management (MDM) has become a necessity across the globe due to the ever expanding and developing world of technology; Technavio
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Business Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2
Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace
Five Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
