The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

Similar documents
Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobility Management 2012

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert

Enterprise Mobility Best Practices 2017 Analysts Predictions

Managing Mobility in the BYOD Era:

Total Enterprise Mobility. Norbert Elek

Embracing Complete BYOD Security with MDM and NAC

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Insert Partner logo here. Financial Mobility Balancing Security and Success

IT Resource Management & Mobile Data Protection vs. User Empowerment

Unified Windows Device Management in the Enterprise

Total Enterprise Mobility

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

IT Self Service and BYOD Markku A Suistola

ForeScout MDM Enterprise

BEST PRACTICES IN BYOD

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT

MAM - Mobile Application Management

The ForeScout Difference

Securing Healthcare Data on Mobile Devices

Securing Enterprise Mobility for Greater Competitive Advantage

Mobile Encrypted Messaging: A Perfect Complement to MDM

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

Mobile Security Market Trends and Best Practices. 24 May 2013

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

What We Do: Simplify Enterprise Mobility

How To Manage A Mobile Device Management (Mdm) Solution

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

A CIO s Guide To Mobility Management

How To Support Bring Your Own Device (Byod)

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Apps to the Future: Predicting Enterprise Mobility in 2015

BYOD Management : Geo-fence

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Healthcare Buyers Guide: Mobile Device Management

UNB s Mobility Strategy

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile and BYOD Strategy

Enterprise Mobility Management 2011

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

CHOOSING AN MDM PLATFORM

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Mobile Madness or BYOD Security?

AirWatch Solution Overview

Secure, Centralized, Simple

A Comprehensive Review of Self-Service Data Visualization in MicroStrategy. Vijay Anand January 28, 2014

The Holistic Guide to BYOD in Your Business Jazib Frahim

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Design, Develop and Deploy Mobile Apps

Deep Dive BYOD, COPE & MDM

Cyber Security. John Leek Chief Strategist

Sophos Mobile Control

IT Enterprise Services

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

MDM Mobile Device Management

MDM and beyond: Rethinking mobile security in a BYOD world

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

Lot 3 Service Specification MANAGED MOBILE SERVICE

A guide to enterprise mobile device management.

Mobility, Security Concerns, and Avoidance

Mobile Device Management for CFAES

How To Write A Mobile Device Policy

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

IT Resource Management vs. User Empowerment

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Android for Work powered by SOTI

Tom Schauer TrustCC cell

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Symantec Mobile Management 7.2

Productive and Secure Enterprise Mobility with Cisco and Citrix

Secure Mobile Solutions

Symantec Mobile Management Suite

Moving Beyond the Basics: Key Considerations for Successful Adoption of a Mobile Platform

How To Secure Your Mobile Devices

Enterprise Mobility Management

Cisco Mobile Collaboration Management Service

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success

RFI Template for Enterprise MDM Solutions

A Guide to MAM and Planning for BYOD Security in the Enterprise

ipass Unlimited 1. Introduction 2. Challenges and Trends

Mobility Solutions for Plant Personnel

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

BYOD (Bring Your Own Device)

Choosing an MDM Platform

Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Transcription:

The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group 1

Today s Agenda State of Enterprise Mobility Management (EMM) The Rise of Bring Your Own Device (BYOD) Cloud-Enabled Social Mobile Enterprise Leveraging the Cloud for Mobility Intelligence EMM Strategy Recommendations 2

Andrew Borg Research Director Mobility Center of Excellence AberdeenGroup 2011

Research Review Intersection of Two Self-Assessment Research Methods PACE Model: behavioral assessment Pressures pain-points and drivers Actions strategies and tactics Capabilities processes and skill sets Enablers technologies and services Maturity Class: performance metrics: Top 20% - Best-in-Class Middle 50% - Industry Average Trailing 30% - Laggard Results are Verified: Survey follow-ups, end-user interviews 4 AberdeenGroup 2012 Not For Distribution

Mobility Pain Points Executive and employee demands to leverage mobility s productivity gains to broader organization 46% Need to become more operationally efficient 30% Increasing capabilities and complexities of new devices 24% 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 5 AberdeenGroup 2012 Not For Distribution

Mobility Strategies Ensure all mobile devices with enterprise access are compliant with corporate standards 44% Support a heterogeneous (vs. homogeneous) mix of mobile device platforms 29% Control the mobile software applications ('apps') that have corporate data access 19% 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 6 AberdeenGroup 2012 Not For Distribution

The EMM Lifecycle Provisioning Performance management Operations and support Compliance and security Expense management Decommissioning Device Refresh Cycle Effort 1 2 3 4 5 6 Time 7 AberdeenGroup 2012 Not For Distribution

Best-in-Class Defined Employees with Secure Mobile Access to Company Network 10% 41% 94% 7% Lost or Stolen Devices Never Recovered 9% 13% Best-in-Class Industry Average Laggard 10% 1-Year Change in Speed of Decision-Making 4% - 4% -20% 0% 20% 40% 60% 80% 100% Percentage, n=431 Source: Aberdeen Group, May 2012 8 AberdeenGroup 2012 Not For Distribution

Best-in-Class Point the Way Process Decommission process for lost, stolen, or outmoded devices Security policy for full lifecycle of all compliant devices BYOD policy established for corporate use of Organization Organization IT controls all mobile access to company assets Heteregeneous mobile device support DLP procedures protect corporate data on employee devices Corporate profiles on employee devices secure corporate assets 9 AberdeenGroup 2012 Not For Distribution

Best-in-Class Point the Way Knowledge Internal expertise developed on targeted mobile platforms Regular assessment of security risks Mobile collaboration tools utilized Performance Track number of lost or stolen devices successfully decomissioned Track uptime of organization s Wi-Fi network Track level of mobile access to network and data provided to each employee 10 AberdeenGroup 2012 Not For Distribution

Key Technologies Remote mobile device lock and wipe (erase all data) 40% 55% 60% Employee-selected mobile applications ('apps') 40% 38% 52% In-house developed mobile applications ('apps') 29% 45% 42% Self-service web portal for support and procurement 13% 26% 45% Mobile versions of enterprise software (ERP, CRM, SFA, etc) 22% 35% 31% Best-in-Class Industry Average Enterprise mobile application store ('app store') 11% 25% 31% Laggard 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 11 AberdeenGroup 2012 Not For Distribution

Smartphone Vs. Tablet Security Security Capabilities Smartphones Best-in- Class All Others Best-in- Class Tablets All Others Δ Bestin-Class Tablets Mobile user authentication 75% 65% 59% 52% 25% Policies for user logon password strength enforced 74% 60% 56% 44% 30% Data encryption over wireless connections 65% 56% 44% 39% 38% VPN for mobile devices 64% 51% 48% 43% 31% Mobile device remote lock and wipe 64% 53% 38% 35% 49% Secure and compliant mobile file sharing via cloud 45% 27% 36% 22% 33% Data Loss Prevention (DLP) 41% 29% 28% 25% 45% Application version control (e.g. blacklist / whitelist) 38% 30% 26% 25% 40% N = 431 Source: Aberdeen Group, May 2012 12 AberdeenGroup 2012 Not For Distribution

Performance Gains Rate their workforce as "extremely productive" 15% 28% 12% 12 mo. change in employee adherence to mobile policies - 2% 5% 10% Best-in-Class Industry Average Laggard 12 mo. change in workforce productivity 4% 8% - 3% -5% 0% 5% 10% 15% 20% 25% 30% Percent of Respondents, n=237 Source: Aberdeen Group, May 2012 13 AberdeenGroup 2012 Not For Distribution

BYOD is a Global Phenom 100% 90% 18% 15% 24% 15% 80% 70% 60% 32% 33% 27% 41% No 50% 40% 30% 20% 50% 53% 49% 44% Yes, but from an approved company list only Yes, any device 10% 0% GLOBAL USA EMEA APAC n = 472 Source: Aberdeen Group, May 2012 14 AberdeenGroup 2012 Not For Distribution

Poll Question Why has your organization chosen to implement a Bring Your Own Device (BYOD) Program? a) To accommodate the demand of employees b) Employees gain additional productivity c) The business reduces costs by not paying for devices 15

Why BYOD? To accommodate the demands of employees 52% 56% 65% Employees gain additional productivity The business reduces costs by not paying for devices 46% 48% 46% 49% 62% 56% Best-in-Class Industry Average Laggard 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 16 AberdeenGroup 2012 Not For Distribution

Industry Point of View Device/OS platform diversity Core MDM best practices continue to drive adoption Apps & Docs are key requirements for evolving mobile strategy Large enterprises need scalable solutions after initial pilots 17

Tweet Break @MobileAberdeen @MaaS360 Hashtags: #SoMoClo #MaaS360Webinar 18 AberdeenGroup 2012 Not For Distribution

Social Mobile Cloud Social business Have Initiatives or Intend to Adopt 65% 82% Mobility 80% 77% Cloud 69% 64% None of the above 3% 11% Best-in-Class All Others 0% 20% 40% 60% 80% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 19 AberdeenGroup 2012 Not For Distribution

Mobile is Social 1% 5% Use Social Networks 54% 41% Yes, frequently Yes, occasionally Not yet, but planning to No Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 20 AberdeenGroup 2012 Not For Distribution

Percent of respondents, n=431 Social Business Strategy 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 21% 7% 72% Best-in-Class 26% 21% 52% Industry Average 43% 15% 43% Laggard An ad hoc approach - at each employee's discretion Part of a planned social media strategy, not necessarily compliant with company IT policy Part of a planned social media strategy, secure and compliant with company IT policy Source: Aberdeen Group, May 2012 21 AberdeenGroup 2012 Not For Distribution

Poll Question EMM Hosting Plans for Next 12 Months: a) A solution provider hosts our EMM in the cloud b) A solution provider hosts our EMM on their premises c) A solution provider hosts our EMM on their premises and manages it for us d) We host our EMM on our premises, and a solution provider manages it for us e) We host and manage our EMM on our premises 22

Where is the Growth? A solution provider hosts our EMM solution in the public cloud (cloud SaaS), and we manage it remotely ourselves 12% 19% GROWTH RATE: 155% A solution provider hosts our EMM solution on their premises, and we manage it remotely ourselves (hosted Software-as-a-Service - SaaS) 13% 16% 122% A solution provider hosts and manages our EMM solution remotely on their premises (as a remote managed service) or in the cloud 16% 14% 90% We host and a solution provider manages our EMM solution behind our firewall (as an on-premise managed service) 16% 11% 69% We host and manage our own EMM solution behind our firewall 46% 18% 40% Current Planned 0% 20% 40% 60% 80% Source: Aberdeen Group, May 2012 23 AberdeenGroup 2012 Not For Distribution

Device-Centric Post-Device APPS USER ACCESS MANAGEMENT DEVICE DATA STORAGE FIREWALL DATA TRANSMISSION MOBILE ECOSYSTEM MANAGEMENT DATA CONTEXT DATA CENTER DATA STORAGE APPS 24 AberdeenGroup 2012 Not For Distribution

Instant Enterprise Mobility Management Agility of the cloud for the pace of change in mobility Fast deployment Simple provisioning processes Intuitive user interface Effortless scalability Instantly turn up devices, users, apps Start small and easily expand up Automatic upgrades Continuous updates available instantly No ongoing maintenance Unmatched affordability Zero infrastructure needed Pay as you go subscription model Enterprise Mobility Management Platform 25

Social Mobile Intelligence Moving beyond the delivery model Create value differently than just speed and ease of use Leveraging the network effect of data collection Devices Each new user adds data to the engine Improves the service for all customers Benchmark against peers based on data across the platform Actions Mobile Cloud Apps Policy Docs Big Data Analytics for Enterprise Mobility 26

EMM Community Analytics Best practices and benchmarking 27

Key Takeaways: Dive into EMM Start with MDM If your organization can't recover the contents, or lock or wipe the data from a lost, stolen, or compromised device, then it better be entirely certain that there's no confidential or protected data on it first. Track them before you lose them Lost or stolen mobile devices that cannot be recovered are your organization's single largest mobile security and compliance vulnerability. Use MDM to take control of all rogue devices. Mobile Application Management (MAM) A MAM solution enables the organization to deploy, monitor, and enforce policy for both corporate-developed and publicly available apps. Tablets have an insecurity complex Apply to tablets the same rigor and IT service management principles that are used to support netbooks and smartphones. 28 AberdeenGroup 2012 Not For Distribution

AberdeenGroup 2011 Twitter: @MobileAberdeen

Wrap Up Questions or follow-up? nflorio@fiberlink.com andrew.borg@aberdeen.com Upcoming Webinars (Registration Link in Chat Window) Embracing BYOD with MDM and NAC Thursday, June 7 th @ 2:00 PM Eastern Past Webinars (http://links.maas360.com/webinars) Android in the Enterprise: Piecing Together Fragmentation BYOD: Striking a Balance Employee Privacy and IT Governance Best Practices for Implementing a BYOD Program Plus lots of How-To content on our website Mobile Device Management Best Practices http://links.maas360.com/mdm Mobile Device Management Glossary http://links.maas360.com/mdm_glossary 30

MaaS360: Comprehensive EMM from the Cloud Get Started Now! Visualize the entire mobile computing environment Manage users, devices, apps, and expenses across the enterprise Secure corporate data and enforce compliance Free 30-day Trial: www.maas360.com/trial/ 31