Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices

Similar documents
BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

Enterprise on the Go. How enterprises can leverage mobile apps

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer

Technology Shifts. Mainframe Windows Desktop Internet

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Smart Givaudan. From BYOD experience to new mobile opportunities

Device Independence - BYOD -

Division of Information Technology Lehman College CUNY

mobilecho: 5-Step Deployment Plan for Mobile File Management

Mac in the Enterprise

SECURING TODAY S MOBILE WORKFORCE

Access Tropical Cloud Desktop from Any Device

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Secure iphone Access to Corporate Web Applications

Getting Started with VMware Horizon View (Remote Desktop Access)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Chris Boykin VP of Professional Services

Statement of Direction

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT. uniflow canon.com.au/business

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

My CEO wants an ipad now what? Mobile Security for the Enterprise

All your apps & data in the cloud, all in one place.

Enterprise Security with mobilecho

Symantec Mobile Management Suite

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Privileged Access Management 15.3 Available Features

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Interact Intranet Version 7. Technical Requirements. August Interact

SANS Mobility/BYOD Security Survey

Mobile Device Strategy

When enterprise mobility strategies are discussed, security is usually one of the first topics

The Future of Mobile Device Management

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Kaspersky Security for Mobile

Cyber Security. John Leek Chief Strategist

SANS Mobility/BYOD Security Survey

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Advanced Configuration Steps

Privileged Access Management 15.2 Available Features

1 of :44

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

ForeScout MDM Enterprise

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Anchor End-User Guide

Solve BYOD with! Workspace as a Service!

The ForeScout Difference

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

How To Use A Citrix Netscaler Thin Client V (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Cisco Mobile Collaboration Management Service

Perceptive Enterprise Search

Exchange ActiveSync (EAS)

WhitePaper. Private Cloud Computing Essentials

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Bring Your Own Device (BYOD) Mobile Device Management (MDM) Joshua Jacobs, Sawyers & Jacobs LLC jjacobs@sawyersjacobs.com. Presented by Joshua Jacobs

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Tom Schauer TrustCC cell

11 Best Practices for Mobile Device Management (MDM)

4 Steps to Creating a Mobile Development Strategy

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

Google Identity Services for work

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Access Your Cisco Smart Storage Remotely Via WebDAV

EasiShare Whitepaper - Empowering Your Mobile Workforce

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

The Maximum Security Marriage:

Total Enterprise Mobility

Compliance Management for Mobile Devices

Bring Your Own Device Mobile Security

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Five Best Practices for Secure Enterprise Content Mobility

Mobile Device Security and Privacy. Discussion - Planning Considerations for a Successful Mobile Device Program

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Secure Mobile Solutions

Mobile Device. Management-

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

The Truth About Enterprise Mobile Security Products

Healthcare Buyers Guide: Mobile Device Management

Hosted Desktop for Business

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

SAP White Paper Enterprise Mobility

Transcription:

Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices Survey Results and Q&A 18-December-2013 Ryan Faas Journalist and Consultant T. Reid Lewis President Enterprise Device Alliance

Presenters Ryan Faas technology journalist and author who has been writing about Apple, business and enterprise IT topics, and the mobile industry for over a decade. He is author and/or editor of several technology books including "The iphone for Work". Ryan is the business reporter for Cult of Mac and a prolific freelance writer whose work has been featured on Computerworld, InfoWorld, Enterprise Mobile Today, InformIT.com, Peachpit Press, About.com, and Datamation. Most recently Ryan has started covering the emerging consumerization of IT trends, including BYOD, for IDG's new CITEworld service. In addition to writing, Ryan has spent a large portion of the past fifteen years in the systems/network engineering and IT management fields as an IT director, systems administrator, trainer, and all round multi-platform and mobile device technology consultant. T. Reid Lewis president of Enterprise Device Alliance 2

The Enterprise Device Alliance (EDA) We are a consortium of enterprise software companies As individual companies we deliver solutions that deliver crossplatform services and address the problems that IT administrators have when integrating Macs, iphones, ipads, Android and other mobile devices. As the EDA, our goal is to provide information and resources to help enterprises integrate and manage Macs, ios and Android devices in their Windows-based IT infrastructure Organizations and users should be able to choose their productivity tools based the merits of the platform, and not issues of manageability. We enable cross-platform environments where enterprises can leverage their established Windows expertise, infrastructure, and technology to manage Macs, iphones, ipads, Android and other mobile devices as peers on the network. 3

Enterprise Device Alliance Member Companies MDM & Client Management Security, Control, & Compliance Policies File Access, Sharing & Backup Virtual Desktop Making it easy to deploy, integrate and manage Macs, iphones, ipads, Android and other mobile devices in a Windows environment. www.enterprisedevicealliance.org

About the survey: Goals: Identify leading management issues for IT Responses: Conducted from 20-Nov Dec 16, 2013 Email outreach to thousands of IT professionals Many respondents were in organizations with thousands and tens of thousands of employees This presentation also includes results from comparable surveys conducted by the EDA in fall of 2011 & 2012. 5

Topics What IT has to say about: The Platforms Computers Phones Tablets Environments and Issues OSes Applications Policies Managing Mobile State of management Preferences 6

The Platforms Computers Phones Tablets 7

Windows 7/XP Remains Dominant Please estimate the percentage of people using the following devices in your organization at the end of 2013. Percentage of Sites Where Windows 7/XP Usage Exceeds 70% 50% 41% 45% 40% 30% 20% 10% 8 0% 2012 2013

Windows 7/XP vs Windows 8 Please estimate the percentage of people using the following devices in your organization at the end of 2013. 100% 85% 95% 90% 80% 70% 60% 50% 40% 30% 20% 10% Windows 7/XP Windows 8 1% Windows 7/XP Windows 8 10% 9 0% 2012 2013

Macintosh Reported by 100% Responders Mac In Use at 100% Firms in 2013 100% However, penetration remains in the minority as 65% report less than one third of their users use Macintosh. 10

Blackberry Classic Please estimate the percentage of people using the following devices in your organization at the end of 2013. In 2013, 90% respondents have less than 30% penetration of BB classic In 2012, 83% reported less than 30% BB classic has broad minority acceptance 11

Blackberry 10 Please estimate the percentage of people using the following devices in your organization at the end of 2013. 80% report no Blackberry 10 adoption The balance report less than 5% penetration 12

Windows 8 phones Please estimate the percentage of people using the following devices in your organization at the end of 2013. A majority report no Window 8 Phone penetration The balance report less than 5% penetration 13

Android Phones Please estimate the percentage of people using the following devices in your organization at the end of 2013. 10% 85% of Responders Report Less Than 10% Android Phone Penetration 90% 14

iphone Please estimate the percentage of people using the following devices in your organization at the end of 2013. 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 15 0% 90% have at least 10% iphones 20% have at least 90% iphones

Tablets In Organizations Percentage of Organizations Reporting That Some of Their Users Have a Tablet 90% 90% 80% 70% 60% 44% 50% 40% 30% 30% 20% 10% 16 0% ipads Windows tablets Android Tablets

Tablet Penetration Half of the organizations had 40% or more of their staff using ipads Windows tablets, 5.0% Android Tablets, 5.0%, 50% ipads, 40% 17

Environments and issues What are the issues that are driving IT management decisions? BYOD is pervasive, so what about alternatives like COPE? What class of apps are most important? What are people doing with mobile devices? What are the business reasons for issuing mobile devices? 18

Computers Are Laptops Thinking of the Macs, Windows and Linux non-server systems in your organization, please estimate what percentage are laptops. (We'll assume that all others are desktops.) 50% Across All Organizations, More than 70% of All Systems are Laptops 50% 45% 40% 30% 20% 10% 19 0% Macintosh Windows

COPE (Corporate Owned Personally Enabled) Some organizations are considering COPE (Corporate Owned Personally Enabled) as an alternative to BYOD. What are your organization's plans relative to COPE? Standardized on COPE 22% No plans to Use Cope 42% In Pilot now 8% 20 Planning for 2014 3% Planning for 2015 or later 10% Just learned of it 15%

Still No Standard Apps What do you include in a standard configuration of a Smartphone or Tablet for staff? Please check all that apply. Task Manager Project Management Don't know Malware Protection Other Time and expense tracking Secure Backup SharePoint or other collaboration systems Password Manager Public Social Media (Facebook, Twitter, LinkedIn, etc) Navigation Virtual desktop/app agents (Citrix or VMWare) Internal social media (Chatter, Yammer, Jive, wikis, etc) Mobile File Management In-house Enterprise Apps Line of Business Apps Industry-specific apps Note taking and documentation Presentation Spreadsheet Word Processing Don't provide a standard configuration Mobile Device Management 21 0% 2% 4% 6% 8% 10% 12%

Enterprise Resources 22 Which of these enterprise resources do you currently enable or plan to enable access to from Smart Phones and Tablets? Check all that apply. Other CRM ERP Project Management Documentum Expense Reporting HR/Payroll Industry-specific resources System Administration Internal social and collaboration systems File servers to provide access to corporate documents Business/technical documentation SharePoint Remote control/access my desktop/laptop computer Help Desk Email 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

Consumer Apps compromise mobile security In 2011-56% believed consumer solutions compromise security In 2012-64% believed consumer solutions compromise security In 2013-62% believe consumer solutions compromise security Employees are not using consumer solutions (that we know of). 2% Not sure 4% Employees are using these solutions, and we are planning to provide an alternative in or before 2013. 5% We are providing a secure alternative. 11% Employees are using these solutions. It's not really acceptable, but we don't have an alternative. 36% Employees are using consumer solutions, and it's acceptable. 38% 23 0% 5% 10% 15% 20% 25% 30% 35% 40%

Reasons for Caution Some organizations are cautious about introducing Mobile devices. If your organization has set some limitations on when employees can use a Smartphone or Tablet for company business, please select all concerns that led to these restrictions. Reasons for Caution Devices are too easy to steal/get lost. 37% Help desk and support expenses 30% Compliance with government and industry regulations. 30% Securing access to company information through the device does not meet our standards. Other 23% 26% Client management is too cumbersome. 21% 24 Securing applications is too complicated or impossible. 18% 0% 5% 10% 15% 20% 25% 30% 35% 40%

Managing Mobile What does it mean to manage these systems What security is preferred? What management tools are in use? Is everyone using an Mobile Device Management solution? 25

71% want to authenticate through Active Directory My organization wants to use the following authentication mechanisms for Smart Phones and Tablets. Check all that apply. 80% 71% 70% 60% 50% 43% 40% 30% 21% 20% 16% 10% 2% 5% 7% 26 0% SmartCards (CAC, PIV) Reverse Proxy BioMetric Other Multi-Factor Authentication (ie RSA) Certificate Active Directory Credentials

Mobile Device Management (MDM) In Control (2011 thru 2013) When will your organization begin using a mobile device management (MDM) solution (other than ActiveSync and Apple iphone Config Utility or Apple Configurator) to proactively manage Smartphones and Tablets? 60% 60% 50% 38% 40% 27% 29% 30% 21% 23% 18% 21% 22% 17% 20% 31% 9% 10% 27 0% Not sure No plans Plan to use MDM by end of next year Using MDM now

Mobile File Management (MFM) When will your organization begin using a mobile file management solution (MFM) to provide access to corporate documents from Smart Phones and Tablets? 30% 27% 30% 25% 20% 16% 18% 21% 15% 10% 5% 5% 28 0% No plans to use MFM to provide access to corporate documents Not sure about MFM plans Using a corporate procured cloud MFM solution Plan to use MFM by end of 2014 Permit employees to use their own cloud MFM solution Using MFM now for file servers, SharePoint sites and other enterprise storage

In Summary / Conclusion Desktop OSes now include Windows XP, 7, 8 & Mac OS X Mobile OSes dominated by Apple with Android on the move but Windows mobile OSes not moving yet. Security of devices, OSes, applications and corporate resources is still a major concern. MDM has become the dominant management application. Consumer solutions are losing their acceptability so organizations are looking for secure solutions Enterprise Apps are replacing consumer Apps for the sake of security and increased control. 29

About the Respondents What is the business of your organization? Construction/Field Services 3% Retail/Hospitality/Travel 4% Banking, Financial Services or Insurance 8% Government, Federal 15% Media or Advertising 13% Other Commercial Business 16% Health Care or Research 11% Non-Profit 12% 30 Government, State Or Local 21% 0% 5% 10% 15% 20% 25%

Q & A Use the chat to submit your questions. Contacts: Enterprise Device Alliance info@enterprisedevicealliance.org Ryan Faas ryan@ryanfaas.com T. Reid Lewis reid.lewis@enterprisedevicealliance.org 31

The Enterprise Device Alliance