The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group 1
Today s Agenda State of Enterprise Mobility Management (EMM) The Rise of Bring Your Own Device (BYOD) Cloud-Enabled Social Mobile Enterprise Leveraging the Cloud for Mobility Intelligence EMM Strategy Recommendations 2
Andrew Borg Research Director Mobility Center of Excellence AberdeenGroup 2011
Research Review Intersection of Two Self-Assessment Research Methods PACE Model: behavioral assessment Pressures pain-points and drivers Actions strategies and tactics Capabilities processes and skill sets Enablers technologies and services Maturity Class: performance metrics: Top 20% - Best-in-Class Middle 50% - Industry Average Trailing 30% - Laggard Results are Verified: Survey follow-ups, end-user interviews 4 AberdeenGroup 2012 Not For Distribution
Mobility Pain Points Executive and employee demands to leverage mobility s productivity gains to broader organization 46% Need to become more operationally efficient 30% Increasing capabilities and complexities of new devices 24% 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 5 AberdeenGroup 2012 Not For Distribution
Mobility Strategies Ensure all mobile devices with enterprise access are compliant with corporate standards 44% Support a heterogeneous (vs. homogeneous) mix of mobile device platforms 29% Control the mobile software applications ('apps') that have corporate data access 19% 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 6 AberdeenGroup 2012 Not For Distribution
The EMM Lifecycle Provisioning Performance management Operations and support Compliance and security Expense management Decommissioning Device Refresh Cycle Effort 1 2 3 4 5 6 Time 7 AberdeenGroup 2012 Not For Distribution
Best-in-Class Defined Employees with Secure Mobile Access to Company Network 10% 41% 94% 7% Lost or Stolen Devices Never Recovered 9% 13% Best-in-Class Industry Average Laggard 10% 1-Year Change in Speed of Decision-Making 4% - 4% -20% 0% 20% 40% 60% 80% 100% Percentage, n=431 Source: Aberdeen Group, May 2012 8 AberdeenGroup 2012 Not For Distribution
Best-in-Class Point the Way Process Decommission process for lost, stolen, or outmoded devices Security policy for full lifecycle of all compliant devices BYOD policy established for corporate use of Organization Organization IT controls all mobile access to company assets Heteregeneous mobile device support DLP procedures protect corporate data on employee devices Corporate profiles on employee devices secure corporate assets 9 AberdeenGroup 2012 Not For Distribution
Best-in-Class Point the Way Knowledge Internal expertise developed on targeted mobile platforms Regular assessment of security risks Mobile collaboration tools utilized Performance Track number of lost or stolen devices successfully decomissioned Track uptime of organization s Wi-Fi network Track level of mobile access to network and data provided to each employee 10 AberdeenGroup 2012 Not For Distribution
Key Technologies Remote mobile device lock and wipe (erase all data) 40% 55% 60% Employee-selected mobile applications ('apps') 40% 38% 52% In-house developed mobile applications ('apps') 29% 45% 42% Self-service web portal for support and procurement 13% 26% 45% Mobile versions of enterprise software (ERP, CRM, SFA, etc) 22% 35% 31% Best-in-Class Industry Average Enterprise mobile application store ('app store') 11% 25% 31% Laggard 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 11 AberdeenGroup 2012 Not For Distribution
Smartphone Vs. Tablet Security Security Capabilities Smartphones Best-in- Class All Others Best-in- Class Tablets All Others Δ Bestin-Class Tablets Mobile user authentication 75% 65% 59% 52% 25% Policies for user logon password strength enforced 74% 60% 56% 44% 30% Data encryption over wireless connections 65% 56% 44% 39% 38% VPN for mobile devices 64% 51% 48% 43% 31% Mobile device remote lock and wipe 64% 53% 38% 35% 49% Secure and compliant mobile file sharing via cloud 45% 27% 36% 22% 33% Data Loss Prevention (DLP) 41% 29% 28% 25% 45% Application version control (e.g. blacklist / whitelist) 38% 30% 26% 25% 40% N = 431 Source: Aberdeen Group, May 2012 12 AberdeenGroup 2012 Not For Distribution
Performance Gains Rate their workforce as "extremely productive" 15% 28% 12% 12 mo. change in employee adherence to mobile policies - 2% 5% 10% Best-in-Class Industry Average Laggard 12 mo. change in workforce productivity 4% 8% - 3% -5% 0% 5% 10% 15% 20% 25% 30% Percent of Respondents, n=237 Source: Aberdeen Group, May 2012 13 AberdeenGroup 2012 Not For Distribution
BYOD is a Global Phenom 100% 90% 18% 15% 24% 15% 80% 70% 60% 32% 33% 27% 41% No 50% 40% 30% 20% 50% 53% 49% 44% Yes, but from an approved company list only Yes, any device 10% 0% GLOBAL USA EMEA APAC n = 472 Source: Aberdeen Group, May 2012 14 AberdeenGroup 2012 Not For Distribution
Poll Question Why has your organization chosen to implement a Bring Your Own Device (BYOD) Program? a) To accommodate the demand of employees b) Employees gain additional productivity c) The business reduces costs by not paying for devices 15
Why BYOD? To accommodate the demands of employees 52% 56% 65% Employees gain additional productivity The business reduces costs by not paying for devices 46% 48% 46% 49% 62% 56% Best-in-Class Industry Average Laggard 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 16 AberdeenGroup 2012 Not For Distribution
Industry Point of View Device/OS platform diversity Core MDM best practices continue to drive adoption Apps & Docs are key requirements for evolving mobile strategy Large enterprises need scalable solutions after initial pilots 17
Tweet Break @MobileAberdeen @MaaS360 Hashtags: #SoMoClo #MaaS360Webinar 18 AberdeenGroup 2012 Not For Distribution
Social Mobile Cloud Social business Have Initiatives or Intend to Adopt 65% 82% Mobility 80% 77% Cloud 69% 64% None of the above 3% 11% Best-in-Class All Others 0% 20% 40% 60% 80% Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 19 AberdeenGroup 2012 Not For Distribution
Mobile is Social 1% 5% Use Social Networks 54% 41% Yes, frequently Yes, occasionally Not yet, but planning to No Percent of Respondents, n=431 Source: Aberdeen Group, May 2012 20 AberdeenGroup 2012 Not For Distribution
Percent of respondents, n=431 Social Business Strategy 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 21% 7% 72% Best-in-Class 26% 21% 52% Industry Average 43% 15% 43% Laggard An ad hoc approach - at each employee's discretion Part of a planned social media strategy, not necessarily compliant with company IT policy Part of a planned social media strategy, secure and compliant with company IT policy Source: Aberdeen Group, May 2012 21 AberdeenGroup 2012 Not For Distribution
Poll Question EMM Hosting Plans for Next 12 Months: a) A solution provider hosts our EMM in the cloud b) A solution provider hosts our EMM on their premises c) A solution provider hosts our EMM on their premises and manages it for us d) We host our EMM on our premises, and a solution provider manages it for us e) We host and manage our EMM on our premises 22
Where is the Growth? A solution provider hosts our EMM solution in the public cloud (cloud SaaS), and we manage it remotely ourselves 12% 19% GROWTH RATE: 155% A solution provider hosts our EMM solution on their premises, and we manage it remotely ourselves (hosted Software-as-a-Service - SaaS) 13% 16% 122% A solution provider hosts and manages our EMM solution remotely on their premises (as a remote managed service) or in the cloud 16% 14% 90% We host and a solution provider manages our EMM solution behind our firewall (as an on-premise managed service) 16% 11% 69% We host and manage our own EMM solution behind our firewall 46% 18% 40% Current Planned 0% 20% 40% 60% 80% Source: Aberdeen Group, May 2012 23 AberdeenGroup 2012 Not For Distribution
Device-Centric Post-Device APPS USER ACCESS MANAGEMENT DEVICE DATA STORAGE FIREWALL DATA TRANSMISSION MOBILE ECOSYSTEM MANAGEMENT DATA CONTEXT DATA CENTER DATA STORAGE APPS 24 AberdeenGroup 2012 Not For Distribution
Instant Enterprise Mobility Management Agility of the cloud for the pace of change in mobility Fast deployment Simple provisioning processes Intuitive user interface Effortless scalability Instantly turn up devices, users, apps Start small and easily expand up Automatic upgrades Continuous updates available instantly No ongoing maintenance Unmatched affordability Zero infrastructure needed Pay as you go subscription model Enterprise Mobility Management Platform 25
Social Mobile Intelligence Moving beyond the delivery model Create value differently than just speed and ease of use Leveraging the network effect of data collection Devices Each new user adds data to the engine Improves the service for all customers Benchmark against peers based on data across the platform Actions Mobile Cloud Apps Policy Docs Big Data Analytics for Enterprise Mobility 26
EMM Community Analytics Best practices and benchmarking 27
Key Takeaways: Dive into EMM Start with MDM If your organization can't recover the contents, or lock or wipe the data from a lost, stolen, or compromised device, then it better be entirely certain that there's no confidential or protected data on it first. Track them before you lose them Lost or stolen mobile devices that cannot be recovered are your organization's single largest mobile security and compliance vulnerability. Use MDM to take control of all rogue devices. Mobile Application Management (MAM) A MAM solution enables the organization to deploy, monitor, and enforce policy for both corporate-developed and publicly available apps. Tablets have an insecurity complex Apply to tablets the same rigor and IT service management principles that are used to support netbooks and smartphones. 28 AberdeenGroup 2012 Not For Distribution
AberdeenGroup 2011 Twitter: @MobileAberdeen
Wrap Up Questions or follow-up? nflorio@fiberlink.com andrew.borg@aberdeen.com Upcoming Webinars (Registration Link in Chat Window) Embracing BYOD with MDM and NAC Thursday, June 7 th @ 2:00 PM Eastern Past Webinars (http://links.maas360.com/webinars) Android in the Enterprise: Piecing Together Fragmentation BYOD: Striking a Balance Employee Privacy and IT Governance Best Practices for Implementing a BYOD Program Plus lots of How-To content on our website Mobile Device Management Best Practices http://links.maas360.com/mdm Mobile Device Management Glossary http://links.maas360.com/mdm_glossary 30
MaaS360: Comprehensive EMM from the Cloud Get Started Now! Visualize the entire mobile computing environment Manage users, devices, apps, and expenses across the enterprise Secure corporate data and enforce compliance Free 30-day Trial: www.maas360.com/trial/ 31