#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA
BYOD Agenda What is BYOD? Why BYOD? Challenges What makes up a BYOD program? The MicroStrategy Platform Solution Platform Development Security Monitoring Value Q&A #mstrworld 2
What is BYOD? Defining the Mobile Trend
What is BYOD? One Possible Definition! An alternative strategy that allows employees, business partners and other users to use a personally selected and purchased client device to execute enterprise applications and access data. It typically spans smartphones and tablets, but the strategy may also be used for PCs. It may or may not include a subsidy.! Gartner (Bring Your Own Device: The Facts and the Future, April 2013) Image Source: rainkingonline.com #mstrworld 4
What is BYOD? A brief history References to BYOD as early at 2005! In 2009, companies like Intel began embracing the trend and establishing programs realizing benefits from cost savings to greater productivity! Since the early smartphone, BYOD has been an emerging trend due to the improvement of network and data capabilities, the consumer demand for mobile and the convenience of using personal devices at work! Primarily a consumer-driven trend, but as companies consider the benefits, the enterprise demand is growing! Predictions are that 38% of companies expect to stop providing devices to workers by 2016 (Hunting and Harvesting in a Digital World: The 2013 CIO Agenda) #mstrworld 5
Why BYOD? Option or Inevitability?
Why BYOD? Users Driving BYOD Image Source: BYOD Insights 2013: A Cisco Partner Network Study (March 2013) 62% of U.S. employees who use their own smartphone for work do so everyday 92% of U.S. employees who use their smartphones for work did so this week #mstrworld 7
Why BYOD? Benefits of Consumerization Source: Avanade Research & Insights Global Survey: Consumerization of IT (January 2012) #mstrworld 8
Why BYOD? Potential Savings #mstrworld 9
BYOD Challenges Recognising the risks
BYOD Challenges Barriers to Adoption Source: Insights on the Current State of BYOD in the Enterprise, Intel s IT Manager Survey (October 2012) #mstrworld 11
BYOD Challenges Privacy Concerns Source: MobileIron (June 2013) 44% of employees think their companies can see information on their devices, but don t know what that means.! 41% think their employers can t see any information at all.!! 15% are unsure about what their employers can and can t see #mstrworld 12
BYOD Challenges Device Protection Stuff happens and it is not always in our control. #mstrworld 13
BYOD Challenges Data Protection % of Users with Password-protected Phones Image Source: BYOD Insights 2013: A Cisco Partner Network Study (March 2013) Nearly 40% of BYODers don t protect their phones with a password. 52% reported accessing unsecured wi-fi networks with their devices #mstrworld 14
BYOD Challenges Hidden Costs #mstrworld 15
What makes up a BYOD Program? Putting together the pieces 16
What makes up a BYOD program? BYOD Policy #mstrworld 17
What makes up a BYOD program? Recommendations 1. Look for opportunities throughout the entire workforce where mobility could drive substantial innovation 2. Assess where your organization sits versus others in your industry. Even if you don't plan to embrace BYOD, you need to set expectations for your leadership 3. Decide on how many forms of BYOD you will support 4. Determine when, how, and how much you will subsidize business use of personal devices. 5. Establish clear policies for BYOD qualification, service expectations and the employee's assumed risk 6. Invest in technologies to separate enterprise and personal applications and data 7. Establish user self-support and third-party support options 8. Specify what platforms will be supported and how! Gartner #mstrworld 18
What makes up a BYOD program? What we want to avoid #mstrworld 19
What makes up a BYOD program? Establishing a strategy #mstrworld 20
What makes up a BYOD program? Integration with MDM Mobile Device Management (MDM) is software to help organizations manage devices connecting into their systems. It secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises.! Some examples of MDM providers are: Airwatch, MobiDM, MobileIron, and Tangoe, among others.! The MicroStrategy App can easily be recompiled an rebranded for distribution via MDM solutions.! MicroStrategy does not support or certify specific MDM s, but we integrate with MDM solutions. #mstrworld 21
What makes up a BYOD program? MDM Issues Mobile-device management (MDM) is considered to be a heavy-handed approach! More and more IT professionals have told us that they don't want to manage employee-owned devices.! Technologies such as MDM diminish the user experience, which remains the single biggest barrier to adoption.! Forrester It s not the DEVICES that need managing; it s the APPS that hold the company s data and enable employees to be more productive #mstrworld 22
What makes up a BYOD program? MicroStrategy as an MAM Mobile Applications Management (MAM) is a solution which provides the ability to: control the provisioning, updating and removal of mobile applications via an enterprise app store, monitor application performance and usage, and remotely wipe data from managed applications. Core features of mobile application management systems include: MicroStrategy acts as an MAM solution for platform enterprise applications, providing security and monitoring of the applications built within the platform without the need for app wrapping. #mstrworld 23
MicroStrategy Mobile Apps Enabling Your Mobile Workforce
MicroStrategy Mobile Apps Develop enterprise apps code-free to support your business Human Resources General Mgmt Sales Force Hiring Bonuses Training Mgmt Time-off request Expense approval T&E tracking Salary Review Employee info Hot desk locator Carbon emissions Product sales Partner sales Corporate events Facilities Lead tracking T&E tracking Customer info Churn rate Quotas Pipeline Services #mstrworld 25
MicroStrategy Mobile Apps Beautiful and durable mobile apps in one tenth of time, at a fraction of the cost Fast Durable Beautiful Mobile Dev Environment Mobile App Server Mobile! App Click-to-Configure No Coding Required Pre-built Infrastructure Secure Scalable Performant Native Mobile App ios & Android Phones & Tablets #mstrworld 26
MicroStrategy Mobile Apps 1000s of hours of custom code at your fingertips Pre-built Widgets Drag-n-Drop Canvas Beautiful Cross-platform Apps Analytics & Visualizations 1. Insert a widget 2. Set location, size, color 3. Set properties 4. Save Done Transactions Multimedia #mstrworld 27
MicroStrategy Mobile Security Securing Your Data End-to-End
MicroStrategy Mobile Security Industry leading integrated security #mstrworld 29
MicroStrategy Certificate Server Mutual Authentication Realized
MicroStrategy Certificate Server Mutual Authentication Workflow MicroStrategy Certificate Server LDAP Server Firewall Firewall X.509 Certificate Request CRL Certificate Revocation List MD HTTPS (AES) MicroStrategy Mobile Server MicroStrategy Intelligence Server DWH #mstrworld 31
MicroStrategy Certificate Server Invalid/Expired Certificate Prompt #mstrworld 32
MicroStrategy Certificate Server Certificate Server Authentication #mstrworld 33
MicroStrategy Certificate Server Certificate Issued and Downloaded to Device #mstrworld 34
MicroStrategy App Passcode Double Encryption Protection on ios
MicroStrategy App Passcode New ios App Passcode (Double Encryption) Feature App Passcode Password Based Key Definition AES #mstrworld 36
MicroStrategy App Passcode Define your password policy #mstrworld 37
MicroStrategy App Passcode Application Passcode Workflow #mstrworld 38
MicroStrategy App Passcode User creates compliant password Create Confirm #mstrworld 39
MicroStrategy App Passcode Password validation workflow Re-Enter Passcode Successful Passcode To App Enter Passcode Incorrect Passcode #mstrworld 40
BYOD & Monitoring Improving user Experience and Mitigating Risks
Monitoring - Why? Improving user Experience and Mitigating Risks There are many drivers for BYOD, most notably employee satisfaction. In data collected in Gartner inquiries, we have seen substantial improvement in the way the enterprise and its IT organization are perceived when BYOD is introduced! Unsurprisingly, security is the top concern for BYOD Gartner Bring Your Own Device: The Facts and the Future #mstrworld 42
Monitoring - Why? Why is it relevant for BYOD Not owning the device doesn t mean not being responsible for the experience #mstrworld 43
Monitoring - Why? Knowing about the variables that you don t control Device Information Do we support the the devices people bring in? Are our development targets aligned with our user base? What s the impact they have on performance and UX Usage Information Which Apps get more use? Who in the organisation is using them? On what network conditions? From where? #mstrworld 44
Monitoring - Why? App Centric Approach MAM means data collection starts and stops within the Apps owned by your company and the time users spend on them #mstrworld 45
Monitoring Helps you deliver better user experience Security without compromising privacy Tracking location data - but only where it pertains to your application You can even only allow Apps to be open in certain places or under certain conditions (i.e. WiFi) Ensuring the Devices that are used with your Apps to access your company s data are compliant/suitable to deliver the intended experience Keep tabs on availability and performance Gain insight on what works and what doesn t. Understanding how your user base is using their devices and your apps to create a better experience #mstrworld 46
Monitoring - How? Collection Your App's own Black Box #mstrworld 47
Monitoring - How? Configuration Steps Step 1. Enable Mobile Statistics Collection at the Project Level #mstrworld 48
Monitoring - How? Configuration Steps Step 2 #mstrworld 49
Monitoring - How? Exploitation #mstrworld 50
Monitoring - What? So what can we do with it? The best of both worlds Mobile Application Development Platform Enterprise Analytics Platform Web Documents Email Mobile Browsers Portals Apps PDF PowerPoint Excel Word One-Click Sharing Annotation ios Android Blackberry #mstrworld 51
Monitoring - What? So what did WE do with it? users new returning activity apps view engagement location Devices OS #mstrworld 52
Monitoring - Demo This is the Mobile Track We created an App #mstrworld 53
Monitoring - Demo Devices #mstrworld 54
Monitoring - Demo Country Activity #mstrworld 55
Monitoring - Demo Organization Drill #mstrworld 56
Monitoring - Demo Performance #mstrworld 57
Monitoring - Demo Users #mstrworld 58
Monitoring - Demo Location & Detail View #mstrworld 59
MicroStrategy Mobile Providing Value Through the Platform 60
MicroStrategy Mobile Invest in solutions, not app development #mstrworld 61
MicroStrategy Mobile Scaled and tested to support the enterprise Monitoring Security #mstrworld 62
Last Slide! Q&A