Mobile Enterprise Management: Sunbelt Rentals Case Study
|
|
|
- Helena Atkinson
- 10 years ago
- Views:
Transcription
1 Research Report: Best Practices Mobile Enterprise Management: Sunbelt Rentals Case Study How Mobile Phones and Tablets Change Sales Practices and Open Up Opportunities, Both Internally and Externally Charles Brett Vice President and Principal Analyst Edited by R Ray Wang April 17, 2012 Produced exclusively for Constellation Research Clients 1
2 Table of Contents Purpose and Intent... 3 Executive Summary... 3 Behind Sunbelt Rental's Mobile Strategy... 4 Introducing and then Managing iphones and ipads in an Enterprise... 4 Actionable Advice: Follow These 7 Steps to Success Related Research Disclosures Analyst Bio: Charles Brett About Constellation Research
3 Purpose and Intent Sunbelt Rentals decided in 2009 to introduce iphones to its sales force. Though there were initial device management challenges, those have now been overcome so much so that the decision to add ipads incurred only a minimal extra effort. This is not a conventional Bring Your Own Device (BYOD) case study, but it is one where Sunbelt Rentals demonstrates how it overcame initial obstacles and yet accepted BYOD principles. This case study is the fourth in a series in which different user organizations talk about their objectives and experiences. Through these, Constellation Research clients discover what others had to find out for themselves. Executive Summary In this report, Sunbelt Rentals' Director of Enterprise Architecture Dean Moore discusses the introduction of smart devices (specifically iphones and ipads) to Sunbelt Rentals' sales force, the management capabilities it discovered it needed, and the impact that a Mobile Enterprise Management (MEM) application made. He also talks about Sunbelt Rentals attitude towards mobile devices, some unexpected benefits emerging from its mobile strategy, as well as employee and customer reactions. Besides talking through their decision processes and selection criteria, Mr. Moore describes the lessons learned and best practices Sunbelt Rentals encountered or introduced. 3
4 Behind Sunbelt Rentals Mobile Strategy Dean Moore is the Director of Enterprise Architecture at Sunbelt Rentals, Inc. (Sunbelt), which is headquartered in Fort Mill, South Carolina. Mr. Moore has been with Sunbelt for over 12 years and served in other roles with the company such as Manager of Technical Services, Director of Technical Services and Director of Application Integration. Mr. Moore has more than 20 years of IT experience in both technical services and application development. Prior to joining Sunbelt Rentals, Mr. Moore served as the Manager of Network Services at Book of the Month Club, Inc., a Time Warner company, for 6 years. Before that, he held various IT positions at Information Services Group, RDS and EDS. At Sunbelt, among his other duties, he is responsible for the company's mobile device initiatives, first in introducing this to the sales force and then extending it to all field personnel. He has overseen the evolution from different generations of iphones and the introduction of ipads. Introducing and then Managing iphones and ipads in an Enterprise Dean Moore, Director of Enterprise Architecture, Sunbelt Rentals "Sunbelt Rentals is a wholly-owned subsidiary of Ashtead Group plc and is one of the largest equipment rental companies in the U.S We are based in Fort Mill, S.C. and we serve the needs of a wide variety of customers from commercial, residential, municipal and specialized service industries to weekend do-it-yourselfers. We do this via a network of nearly 400+ locations in 35. "Our aim is to provide a superior level of customer service. This is what led us in 2009 into the world of smart devices like the iphone (and, later, the ipad) as an initiative to improve both the customer experience and how our employees work internally and externally. "Before 2009 we had traditional processes. Our sales people would go out to visit job sites to find out what that site might need in the way of equipment that we could rent. Though we experimented with BlackBerries and Nextel devices, neither had provided a field sustainable solution that addressed five particular problems: Ensuring availability. Sales people need to know what equipment is available at any time, and where. Accessing the latest pricing. Our rates vary frequently and sales reps relied on paper price sheets. 4
5 Providing immediacy of response. In our pre-iphone world, a sales rep would take details of what a site might need, leave the site to find a phone somewhere quiet, and then call into a local Sunbelt office to ask someone there to look up what was available and at what price and then have to go back to the site with the details. Booking. Making the reservation or, at least, generating a quotation that the site manager could then authorize (thus avoiding a second site visit after a call back to the local office to make the reservation). Improving the quality of user experience. With both BlackBerries and the Nextel pilot we were not really assisting the sales rep, which is what we wanted to do. Our experience was that we needed to do much more if we were to help. "A related challenge, and cost, was our price lists. The truth is that by the time a price list was printed and distributed to all sales reps, it was likely out of date another justification for the sales rep to call into his local office to find out what was the most up-to-date price. Of course, this semi-manual process came at a cost in sales rep time, in office support, in printing, in distribution, etc." Sunbelt Adopts the iphone in 2009 "In 2009 we rolled out a strategic new application to our sales force. A principle objective was to increase visibility to sales reps of both the availability of our fleet and the related real-time rates because this would differentiate us from our competitors. We had developed our own application to run on iphones and it was deployed initially to some 1200 people for whom Sunbelt purchased the iphones. "Not long after deploying we realized that we did not have sufficient tools to manage these iphones in a way that did not create more work. For example, if we wanted to wipe a device (because it was lost or stolen or a sales rep left the company) we could do this via Microsoft Exchange but only if the device had an address associated with it. As it happened, our application used a Sunbelt proprietary login method, which did not require each device to have an address. "Remember this was 2009 and the iphone was running ios 3, which did not possess the management capabilities that were subsequently introduced in ios 4 and extended in ios 5. Instead we chose to work with Apple to try to create an early management environment that suited our requirements. But this was difficult, primarily because ios 3 really was not enterprise ready. "You might ask, Why then did you choose the iphone? The answer is simple. It was because of the user experience. For the first time we felt we were seeing a device which users might enjoy using, rather than a company-mandated device which (usually) was less than a pleasure to use. For many years I had been looking for a tactical mobile device one which they would want to have with them all the time and which would be a pleasure to use, including in front of customers. The iphone was the first device which seemed to satisfy our vision though it was 5
6 a difficult time to undertake such an investment, as we were entering a steep decline in construction-related spending. Nevertheless, we persevered because we saw the investment as being of strategic importance in differentiating ourselves from our competition. "Looking back we took on more than we expected. While the iphone with our app met our experience expectations, we did not have the management infrastructure in place. For example, we ordered 1200 iphones which all arrived here at our headquarters at the same time. We then had to unbox them, manually authorize each one and load our ios environment and profiles before considering how to distribute them to 1200 people located across the U.S. This turned into a major logistical exercise that lasted approximately 2 1/2 months, even though we had five people from AT&T helping us in the initial unboxing and authorizing. "Apple did try to help us. I was invited to speak at its WWDC about enterprise applications for ios in 2009 (which seemed to be somewhat new as a concept to Apple). Together with our purchase and the contacts made at WWDC we liaised closely with Apple about what was needed for the enterprise space. Two developments changed our thinking: Arrival of ios 4. For the first time this included a mobile device management framework. Contact with AirWatch. I had made contact with this company at the WWDC and it was ready with a mobile enterprise management tool that took advantage of ios 4's new capabilities as soon as ios 4 was available. (It was one of the relatively few companies with which Apple partnered before the release of ios 4)." Acquiring a Mobile Device Management Environment "With ios 3, everything we did was done manually. We had had experience of BlackBerries and more importantly of the BlackBerry Enterprise Server, which did provide enterprise device management. We had nothing nearly similar at this time and that was why everything in retrospect seemed so cumbersome. "With the arrival of ios 4 and a small number of other vendor companies with which Apple had partnered in advance, we decided to look at AirWatch, MobileIron and Sybase. From our analysis we preferred the first for one particular reason: its DNA seemed to fit our needs. Let me explain. AirWatch was young and hungry but above all willing to work with us directly to extend its initial product to handle the specialty Sunbelt login and other requirements that I mentioned earlier. This uses the employee's own ID and a passcode. We use this everywhere, across all sorts of devices, and not all employees have (or need) Sunbelt addresses. The difficulty is that this does not cooperate with Active Directory or ActiveSync and which are by far and away the most common ways of coordinating with remote or mobile devices. "AirWatch was willing to architect and build a call-out to the Sunbelt security model, which we had previously written in.net and thus exploit the necessary credentials. Within a couple of days we had a working solution which enabled us to manage every one of the iphones that, for example, our drivers keep with them because these guys do not have accounts or 6
7 Active Directory accounts. They do not use our computers. The iphone became the mechanism for how we locate them and then schedule deliveries. This impressed us for two reasons: AirWatch treated us as a partner. We were not just another customer where we had to accept however the product worked. We could now manage all our iphones Over The Air (OTA). The AirWatch software now provided us with the tools we needed for remote enterprise mobile device management yet within the Sunbelt secure architecture. "It also mirrored how Sunbelt works internally. For 90 percent of our customers, our web site is sufficient for their needs. But for a small number of significant customers, we go out of our way to adapt or change our systems to make it easier for that customer to work with us and our systems. This is what we regard as a true partnership." Mobile Enterprise Management in Practice "Today we run AirWatch in-house as an application residing on our own systems. It has changed how we work with mobile devices. As I said before, when we bought the original iphones they were all shipped to headquarters and then authorized. "Today it is totally different. When we buy a new iphone or ipad, now that we are deploying these, we have this shipped direct to the user. Separately, we send out instructions with the details of a particular URL that the device should access. When the user has both, he starts the device, goes to the URL, and fills in his or her name and employee ID by connecting over the air. Once connected, then the AirWatch processes take over for complete configuration of the device, implementation of security and loading of all relevant Sunbelt applications. This is all done OTA without the user needing to know any of the details. When finished, the user is ready to work. "There was one wrinkle, however. When we started with AirWatch we had already deployed hundreds of iphones which had used a very different agreement and configuration process. We took advantage of an opportunity to upgrade the original iphone 3GSs to the newer (iphone) 4 hardware to implement an important Sunbelt policy change as well as introduce AirWatch as our mobile management software. "When users received their new iphone 4s they also received the web address to enroll and enable the OTA processes. A key component of this process was, and continues to be, that the enrollment process asks the user if he or she will accept the device being managed remotely? As soon as the user agrees to this policy, then the enrollment/configuration commences. The important aspect is that we have the user's agreement. This was like a line in the sand. For the 3GS devices it was difficult to introduce these to remote management, because all had been manual beforehand. But with the new iphone 4 roll out, Sunbelt now possessed the user's agreement." 7
8 BYOD Considerations and an Unexpected Benefit "All these are Sunbelt-purchased devices. As such their use can be shaped or determined by Sunbelt. But that is not our approach. "Instead, we take an approach which is more like Bring Your Own Device than the traditional IT must micro-manage everything,' which had been true of BlackBerries and is true for devices like our PCs. Our view is that the more that users like and use their iphones, the more they will also use them for work. "To that end we put no restrictions (other than not doing anything illegal and enforcing the use of a pin to enter the device) on how users use their iphones. They can download games; they can install learning apps or sports apps or whatever music and entertainment they want. We encourage their families to participate, on the basis that if the kids like it then our employee will look on the device less as a 'work tool' and more as a natural extension of his or her life, of which a part is working for Sunbelt. This changes mindsets; we are our own proof. "We even offer our own internal app site where anyone can download our Sunbelt apps if they have enrolled with the AirWatch device management application (you never know when a non-salesperson may run into an opportunity to help the business). "The age of IT restricting users is over. Yes you have to be smart and you must act to secure the enterprise information assets, and we do (using the AirWatch technology). Our view is that you cannot dictate what people do all the time with a modern smart device. Hence we have an open-use policy, rather than one which restricts. "With such freedom we have discovered that an attitudinal change occurs, one we had not expected. Given such freedom to make these devices their own, our people start to exploit what suits each person. They then take responsibility, because so much of their life is on the iphone (home as well as work). "In turn this means not only do they keep the Sunbelt device with them, but they look after it much better than they tend to look after other enterprise-owned equipment. Given that the iphone is fairly delicate and that our people are going into outdoor construction sites, which are not renowned for their friendliness to electronics, we expected a fairly high damage rate. This has not proved to be the case. Instead, the damage rate (as well as loss rates) is lower than any other equivalent enterprise-owned device, even in spite of the harsh deployment environment. To us this is amazing. But it also makes sense: offer people responsibility and most will be responsible. Tell or instruct them what to do and the results are often not so beneficial. "Yes, there are some people who do bring their own device to work. We can handle these without a problem. Really the only difference is when a BYOD device owner leaves. We cannot wipe their personal data and apps but the assent to their device being managed (obtained when they enrolled with AirWatch) means we can remove the Sunbelt apps, , configuration and other enterprise aspects and schedule this (again using the AirWatch 8
9 capabilities) for the time and on the day of termination of employment. For a Sunbelt-owned device, we can entirely wipe the device remotely at the appropriate time and day, if that is what is appropriate. "In effect, therefore, we do not try to manage a double environment one being the user's personal one and the other being the Sunbelt one. We regard these as one, though we can tell which are BYOD and which are Sunbelt devices, which does make the management of mobile devices so much easier." Employee and Customer Reactions "Our experience thus far is that our employees love this and what it enables. We have now taken our approach further and started to introduce in 2012 ipads. "The reasoning behind this was that we introduced a new custom CRM application. Today our analysis is that: The iphone is a tactical device. A cellphone, even one as smart as the iphone, is something you do not leave home or the office without it is always with you. The ipad is strategic. This is primarily because there is so much more space to work with but also that it opens up new possibilities. It will most often be near you (in your car, your truck, in the office) but not always. "Our CRM uses the ipad to make the most of Microsoft Dynamics. On an ipad our sales reps can see the details of existing customers and also potential ones. In addition, they can clearly view their sales territories as well as work out how best to visit and even schedule multiple customers in a given geographical area. "This was rolled out in January to 1200 sales reps. In contrast to the initial 1200 iphones, when we introduced these, it took a couple weeks rather than 2 1/2 months with much less effort at the center. The ipads went directly to the sales reps. Separately, we sent the enrollment URL to connect to, and the AirWatch software did the rest. "I thought this was going to involve a substantial amount of preparation at the center beforehand. I was wrong. The sales reps do have addresses, which delivered the enrollment URL and the rest was pretty much already in place. "One of the best aspects of mobile device management is that when you have your policies and device management infrastructure in place, subsequent changes are much less difficult. In addition, the latest ios 5 enables us to push the necessary Sunbelt applications to each device. Now we can specify that Sunbelt requires an application for specific roles or job functions. "The result is that that sales reps now have with the ipad an instant-on device that enables them to do more research on customers, or us to provide them with the additional detail that 9
10 we think is relevant. We could do this on the iphone, but it needs awkward navigation. In contrast the ipad reduces navigation. "As for customers, they love our approach too. They see Sunbelt as being immediately responsive, rather than having to go through the traditional, semi-manual processes. We think we are in a win/win position. Furthermore, more often than not the person who is in the job trailer and who can provide the necessary quotation detail wins the bid. "Even when times were looking at their toughest in 2008/2009, we invested. That this is paying off with more sales and improved customer satisfaction." Lessons Learned and Best Practices "Looking back, I wish we had had the AirWatch application in That first introduction of iphones was so much harder than it would be today. On the other hand, I have to be realistic: ios 3 did not have the enterprise depth we needed, and probably AirWatch would not have had it either. But that is the past. "My first, second and third best practices should all happen upfront: Plan out your provisioning profiles. This requires thinking ahead as to how you wish your device to be configured and what capabilities you enable or inhibit. Decide what operational policies you wish to observe. Within all good enterprise mobile device management you have to formulate and then express the policies for the automation of much of the management function drives off these policies. Define your security. Mobile devices open up possibilities, but that is not an excuse to let corporate security standards relax mobility demands at least as tight security if the enterprise is to protect its assets. "If the first two require effort, the latter presents a conundrum. On the one hand you want to protect the enterprise and its data, but on the other hand you want to enable users to experiment as well as exploit the power and facilities that come in an ipad or iphone. It is when they do the latter that unexpected productivity and results arrive. Talking with many in IT, it is clear to me that many are uncomfortable with enabling of experimentation or even open-use. My own view is that IT has to accept mobile devices as an enabler for employees to do their jobs, which is the approach we have adopted at Sunbelt. "A lesson we are still learning is about hosting should we run something like the AirWatch application in-house (as we do) or should AirWatch run it for us in its cloud. When we started with AirWatch our natural (IT) preference was to bring it in-house and have control (and, if I am honest, because this is the way we had always done it). Now that we have it here, it seems easier to continue in this way. That said, and with the passage of time, I am not sure I would make the same decision today if we were starting out. Hosting it with the specialists is inherently easier and simpler, and is one less aspect to worry about in-house. To put it 10
11 another way, when all of IT was connected to the same copper within an enterprise it made sense to keep this internal. But mobiles are mobile; they are not on the same copper and so a change of thinking may be appropriate. "This is a difficult decision. But I ask myself, 'is running a mobile enterprise management application a core activity for Sunbelt?' Like accounting or CRM, I do not think it is even if mobile devices and what they can do for Sunbelt are definitely strategic and at the core of improving our ways of doing more business." Actionable Advice: Follow These 7 Steps to Success Mr. Moore describes how mobile devices have changed attitudes in Sunbelt Rentals. Though not a traditional BYOD organization, the Sunbelt Rentals attitude to mobile devices is refreshing and has produced positive results. The most unlikely is that what were thought to be delicate devices are treated with greater respect when they become part of the employee's private life and not just an enterprise tool. Taking the input from Mr. Moore and combining it with other Constellation Research experiences and findings, we recommend these seven steps to improve your enterprise's ability to succeed with the new mobility and its associated facets: 1. Accept that mobility is here to stay. Enterprises can try to resist mobility. It might work, but more likely will be futile. Better results will arrive if enterprises signal acceptance early and adapt to encourage use of mobile devices. 2. Open your enterprise's mindset and think about what mobility can improve. As Sunbelt Rentals demonstrates, mobile devices can deliver impressive benefits in sales and other areas once an organization encourages innovation and thinking outside the traditional box (and this applies, possibly, to IT even more than operations or lines of business). 3. Assess how urgently action to address mobility is required. You may think you do not face a mobility tidal wave. Find out whether you do. Constellation Research offers a Mobility Action/Urgency Questionnaire and supporting approach if you need evidence. 4. Adopt a mobility management approach that automates as well as secures the enterprise's assets. Measure mobility in terms of numbers of devices (not employees) remembering that some employees will have more than two smart devices: smartphone, tablet and laptop. Insist that mobile management solutions include high degrees of enterprise-quality security, self support, automation as well as an internal app store (so that not everything has to go through the Apple itunes App Store, Android Market, etc.) 5. Look for quick wins to accelerate acceptance of enterprise-imposed constraints. Constraints on how employees use their devices with enterprise IT are inevitable. 11
12 Reduce resistance by identifying quick and straightforward wins where the employee with his or her device feels empowered. 6. Consider mobility to be a strategic business opportunity. Mobility beyond simple phone functions opens up information and delivery options. The more open the enterprise mind, the greater the payback. 7. Remember to be friendly. In the past, IT has prescribed policies and proscribed activities because it could do so (it owned the technology). That will no longer work and may even be a reason to consider making another, more employee-friendly department responsible for the management of mobility (albeit within an IT-designed envelope). A related consideration do not assume that traditional systems management tools apply to mobility; most are inflexible and better suited to datacenters than employees. 12
13 Related Research Lopez, Maribel. Research Report, Mobile Is the Business, Not Just the Strategy. Constellation Research, Inc. July 27, Brett, Charles. Quark, MDM: When is a Smartphone a Tablet, or a PC? What Does it Mean and for Whom? Constellation Research, Inc. August 22, Brett, Charles. Quark, MDM: When is a Smartphone a Tablet, or a PC? What Does it Mean and for Whom? Constellation Research, Inc. August 22, Brett, Charles. Research Report, Directions: IT Must Not Avoid Taking its Tablets. Constellation Research, Inc. August 29, Brett, Charles. Blog, MoDM, MADM and MEM: Re-Categorizing the Software for Managing Mobile Devices in the Enterprise. Constellation Research, Inc. September 18, Brett, Charles. Research Report, MoDM, MADM and MEM: What Should You Expect for Managing Mobile Devices. Constellation Research, Inc. October 3, Brett, Charles. Blog, Mobile Devices, Mobile Driven Architecture (MDA) and Model Driven Development (MDD). Constellation Research, Inc. October 3, Brett, Charles. Blog, The 3 Variants of Mobile Enterprise Management (MEM) Need Careful Examination. Constellation Research, Inc. October 23, Brett, Charles. Blog, Why Windows on Tablets Makes Enterprise Sense. Constellation Research, Inc. November 6, Brett, Charles. Quark, The Truth About Smart Devices. What IT Really Needs to Know. Constellation Research, Inc. November 14, Brett, Charles. Blog, Will Mobility Management Break Away from IT? Constellation Research, Inc. December 16, Brett, Charles. Research Report, Market Overview: MoDM, MADM and MEM: Report 2 of 3 Managing Mobile Devices in the Enterprise. Constellation Research, Inc. December 21, Brett, Charles. Blog, The Costs of Failing to Exploit Mobility, as Illustrated by How Often Iberia Misses the Plane. Constellation Research, Inc. January 2, Brett, Charles. Blog, Practical Segmentation of Mobile App Development for Smart Devices. Constellation Research, Inc. January 9,
14 Brett, Charles. Blog, MPV- Multiple Persona Virtualization, Mobiles and Android. Constellation Research, Inc. February 8, Brett, Charles. Blog, Laptops Are a Misnomr; Mobility Is Changing What and How We Do it, at Work, at Home and in Between. Constellation Research, Inc. February 10, Brett, Charles. Blog, Relative Mobile Market Numbers, with Desktops Included as Well. Constellation Research, Inc. February 16, Brett, Charles. Blog, Combine Mobile Tech Solar Electricity Generation and Empower the Powerless. Constellation Research. Constellation Research, Inc. February 16, Brett, Charles. Blog, Mobile Enterprise Business Errors (Unintended) #2: a Bank Nearly Gives Away its Private Client Customer List to Apple. Constellation Research, Inc. February 19, Disclosures Your trust is important to us, and as such, we believe in being open and transparent about our financial relationships. With our client s permission, we publish a list on our website. 14
15 Analyst Bio: Charles Brett Mobile and Infrastructure Strategist for Enterprises, Blended with CoIT Charles Brett is currently Vice President and Principal Analyst at Constellation Research, Inc. For more than 25 years Charles has focused on delivering common sense to the application of technologies, especially software ones, in organizations of all sizes around the world. Expertise Charles initial focus at Constellation is on mobility management in the enterprise including Mobile Device Management (MDM) and Bring Your Own Device (BYOD). He has consulted and worked with users and vendors on high-performance, low-cost processing including organization-specific, cloud-like computing, event processing/complex event processing (especially when combined with GPS), enterprise architecture including automating the discovery and management of applications, plus integration of diverse systems, virtualization, and how to cut costs and electronic publishing. He has an ongoing interest in automated metering for the electricity, gas and water industries. Specific sectors of interest and experience include finance (especially systems supporting wholesale finance), telecommunications and energy and its conservation. Media Influence Previously, Charles was the Editorial Director of MIDDLEWARESPECTRA (now published as INSIGHT-SPECTRA), a Journal focusing on the use of software, especially integration with its multiplicity of middleware technologies. Charles has been a regular at multiple industry conferences and has written for numerous publications including The Times of London and the Financial Times. He was the General Chair in 2005 of the bi-annual High Performance Systems Workshop. He is also the author of Explaining itunes, iphones and ipads for Windows Users, (2011) and The 5 Axes of Business Application Integration, (2004). Education Charles has an MA and BA in Modern History from the University of Oxford. Charles can be reached at [email protected] or on Twitter 15
16 About Constellation Research Constellation Research is a specialty research and advisory firm that serves business leaders who seek to unleash the power of emerging and disruptive technologies. Our research analysts start by understanding the business objective, applying real world experience and insights, and then incorporating disruptive technologies and innovative business models as appropriate. We cater to board of directors, c-suite executives, and line of business leaders looking for an edge in business model and technology innovation. We help our clients combine the disruptive and traditional technologies in solving the tough business problems. Most importantly, our research outputs always provide an insightful buy-side point of view. We look forward to serving you with Insight, Inspiration, and Impact. We re business leader and business value focused. Constellation differentiates itself in the market in two ways by: 1. Focusing on the boardroom and C-suite point of view. Constellation s research addresses the needs of boards, CEOs, CFOs, CIOs, CMOs, CHROs, CPOs, CSCOs, and COOs. 2. Addressing the business problem first. Research starts by addressing business value and then applying where disruptive and emerging technologies may play a role. Organizational Highlights Founded and headquartered in the San Francisco Bay Area, United States, in Named Institute of Industry Analyst Relations (IIAR) New Analyst Firm of the Year in Serving over 100 buy-side and sell-side clients around the globe. Growing firm with 31 members including 14 research analysts and futurists, 5 sales professionals, 5 professional staff, and 7 industry recognized board of advisors. Experienced research team with an average of 21 years of practitioner, management, and industry experience. Creators of the Constellation Supernova Awards - the industry's first and largest recognition of innovators, pioneers, and teams who apply emerging and disruptive technology to drive business value. Organizers of the Constellation Connected Enterprise - an innovation summit and best practices knowledge sharing retreat for business leaders. Website: Contact: [email protected] Sales: [email protected] Unauthorized reproduction or distribution in whole or in part in any form, including photocopying, faxing, image scanning, ing, digitization, or making available for electronic downloading is prohibited without written permission from Constellation Research, Inc. Prior to photocopying, scanning, and digitizing items for internal or personal use, please contact Constellation Research, Inc. All trade names, trademarks, or registered trademarks are trade names, trademarks, or registered trademarks of their respective owners. Information contained in this publication has been compiled from sources believed to be reliable, but the accuracy of this information is not guaranteed. Constellation Research, Inc. disclaims all warranties and conditions with regard to the content, express or implied, including warranties of merchantability and fitness for a particular purpose, nor assumes any legal liability for the accuracy, completeness, or usefulness of any information contained herein. Any reference to a commercial product, process, or service does not imply or constitute an endorsement of the same by Constellation Research, Inc. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold or distributed with the understanding that Constellation Research, Inc. is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. Constellation Research, Inc. assumes no liability for how this information is used or applied nor makes any express warranties on outcomes. (Modified from the Declaration of Principles jointly adopted by the American Bar Association and a Committee of Publishers and Associations.) Andalucia Belfast Boston Brussels Chicago Colorado Springs Denver Geneva Irvine London Los Angeles Madrid New York Pune Sacramento San Francisco Santa Fe Santa Monica Salt Lake City Sedona South Portland Sydney Tel Aviv Tokyo Toronto Washington D.C. 16
Powering Global Client Collaboration with Secure File Sharing
Case Study: Global Advertising Agency Powering Global Client Collaboration with Secure File Sharing How a Leading Ad Agency Used Egnyte Adaptive Enterprise File Services to Work with Clients By Alan Lepofsky
HCM Best Practices Prepare Bank for Utilization of True Analytics
Case Study: INTRUST Bank HCM Best Practices Prepare Bank for Utilization of True Analytics HCM Transformation to Prepare Bank for True Analytics By Holger Mueller Vice President and Principal Analyst Content
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Cloud-Based HCM Replaces Homemade Solution
Case Study: Bluewolf Cloud-Based HCM Replaces Homemade Solution How a Fast-Growing Consulting Firm Successfully Implemented FinancialForce HCM By Holger Mueller Vice President and Principal Analyst Content
Five Years in the Cloud with Workday
Case Study: Chiquita Brands and McKee Foods Five Years in the Cloud with Workday Best Practices from Two Early Cloud HCM Pioneers: Chiquita Brands and McKee Foods By R Ray Wang Principal Analyst and Chairman
Generating leads with Meraki's Systems Manager. Partner Training"
Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution
How Delta Uses Microsoft Dynamics and Avanade to Create Next- Generation Customer Experiences
Case Study: Delta Air Lines How Delta Uses Microsoft Dynamics and Avanade to Create Next- Generation Customer Experiences Deeper Insights Provide More Personalized Customer Experiences via Mobile, In-Flight
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
Five Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
Imperva Skyfence Secures Office 365 Access for Mobile Employees at Metro Bank
C A S E ST U D Y Imperva Skyfence Secures Office 365 Access for Mobile Employees at Metro Bank Metro Bank Ramps Up Employee Productivity and Collaboration with Secure Access to Office 365 Apps About Metro
SANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
The Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
The Cloud for Productivity and Mobility
The Cloud for Productivity and Mobility A Guide for Small and Midsize Business As mobile work becomes the norm, turn to cloud-based solutions to extend productivity, collaboration, and business management
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
The Myths & Truths of Enterprise Mobile Printing: 9 ways PrintMe Mobile sets the truth and your IT department free.
The True Story 9 ways of Mobile PrintMe Printing Mobile & sets The the Enterprise: truth and 10 Dimensions your IT department of Compatibility free. The Bring-Your-Own-Device (BYOD) transition brings many
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
GETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
Your BYOD Strategy Checklist
Your BYOD Strategy Checklist A 5-STEP GUIDE TO CREATE A BRING YOUR OWN DEVICE STRATEGY FOR YOUR ORGANIZATION [email protected] @SHOWPAD WWW.SHOWPAD.COM Pieterjan Bouten is an IT entrepreneur and Co-Founder/CEO
11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER
The BYOD Opportunity Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER Table of Contents Abstract.... 3 Introduction.... 3 A New Approach to BYOD... 3 Positive Results....
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Secure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move [email protected] 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
When Computers really become Personal
When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.
There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
Managing Mobility. 10 top tips for Enterprise Mobility Management
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Device Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
Standard Bank. Case Study
Standard Bank Case Study A move to a new London landmark headquarters built to the latest environmental standards triggered an IT revolution for a top international bank. Today, Standard Bank is reaping
Practical Enterprise Mobility
Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business
Access Tropical Cloud Desktop from Any Device
Access Tropical Cloud Desktop from Any Device Tropical Business Solutions White Paper Contents What is Tropical Cloud Desktop?... 3 Information you are going to need... 3 How to connect to the Tropical
ELAVON EXPERIENCES WITH THE ORACLE SALES CLOUD
RESEARCH NOTE May 2014 ELAVON EXPERIENCES WITH THE ORACLE SALES CLOUD THE BOTTOM LINE The shift in computing towards the cloud and away from being within the four walls of an organization creates an opportunity
How To Use Uniflow
One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
The Rise of Mobile Access to Your ERP Data. An Epicor White Paper
The Rise of Mobile Access to Your ERP Data An Epicor White Paper Abstract Mobile user access to ERP and other back office systems has become a core requirement as organizations seek operational efficiency
BENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
IT Provider Expands SMB Business, Gives Customers More Flexibility with Server Solution
Partner Solution Case Study IT Provider Expands SMB Business, Gives Customers More Flexibility with Server Solution Overview Country or Region: Germany Industry: Professional services IT services Partner
Bring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Louis Gudema: Founder and President of Revenue + Associates
The Interview Series - Presented by SmartFunnel Interviews of Sales + Marketing Industry Leaders Louis Gudema: Founder and President of Revenue + Associates PETER: Hello folks this is Peter Fillmore speaking.
Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities
Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials
Fuel Company Uses Online Tools to Energize Employee Communications, Drive Mobility Online Tools
Microsoft Office 365 Customer Solution Case Study Fuel Company Uses Online Tools to Energize Employee Communications, Drive Mobility Online Tools Overview Country or Region: Australia Industry: Other services
Field Service Management in the Cloud
Field Service Management in the Cloud The Rise of Cloud Applications for Mission-Critical Tasks ORACLE WHITE PAPER DECEMBER 2014 Introduction Since the introduction of cloud applications for customer relationship
The 9 Pillars of Enterprise Mobility
The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align
SANS Mobility/BYOD Security Survey
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Working smarter, with Business Technology
Northwind The Northwind Guide to Working smarter, with Business Technology Working Smarter Working smarter is good for all of us. New technology offers many options for working smarter, but which are the
Hoster Improves Remote Access, Increases Revenues with Virtualized Desktop Solution
Customer Solution Case Study Hoster Improves Remote Access, Increases Revenues with Virtualized Desktop Solution Overview Country or Region: United States Industry: Hosting Customer Profile ngenx delivers
Mobilizing Your CRM. Whitepaper. August 2011. Exploring the Benefits and Considerations. Copyright 2009-2011 CWR Mobility B.V.
Customer Support Program Page 1 of 16 Version 1.3 August 2011 Mobilizing Your CRM Exploring the Benefits and Considerations Whitepaper Copyright 2009-2011 B.V. Mobilizing Your CRM: Exploring the Benefits
Build Your Mobile Strategy Not Just Your Mobile Apps
Mobile Cloud Service Build Your Mobile Strategy Not Just Your Mobile Apps Copyright 2015 Oracle Corporation. All Rights Reserved. What is is it? Oracle Mobile Cloud Service provides everything you need
Mobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
WHITE PAPER Comparing the Total Cost of Ownership of SME On- Premises Business Management Applications and SAP Business By Design
WHITE PAPER Comparing the Total Cost of Ownership of SME On- Premises Business Management Applications and SAP Business By Design Sponsored by: SAP David Bradshaw January 2010 Global Headquarters: 5 Speen
Special Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps
September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint
STREAMLINING COMPUTER DELIVERY PROCESSES USING 1E SHOPPING AND SCCM
CASE STUDY FROM THE FACTORY TO THE USER: STREAMLINING COMPUTER DELIVERY PROCESSES USING 1E SHOPPING AND SCCM By Gene Acker SCCM Architect, Project Manager, and Administrator We all come to rely on manufacturers.
IT Executive and CEO Survey
Mobile Consumerization Trends & Perceptions IT Executive and CEO Survey FINAL REPORT COMPARISONS: WAVES 1 AND 2 PREPARED FOR: TREND MICRO, INC. BY: DECISIVE ANALYTICS, LLC Cheryl Harris, Ph.D. Chief Research
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com
Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
BRING YOUR OWN DEVICE
WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
