The Cloud-Enabled Social Mobile Enterprise
-
Upload
maas360-by-fiberlink -
Category
Technology
-
view
868 -
download
1
description
Transcript of The Cloud-Enabled Social Mobile Enterprise
1
The Cloud-Enabled Social Mobile
EnterpriseNeil Florio, Fiberlink
Andrew Borg, Aberdeen Group
2
Today’s Agenda
• State of Enterprise Mobility Management (EMM)
• The Rise of Bring Your Own Device (BYOD)
• Cloud-Enabled Social Mobile Enterprise
• Leveraging the Cloud for Mobility Intelligence
• EMM Strategy Recommendations
© AberdeenGroup 2011
Andrew BorgResearch DirectorMobility Center of Excellence
4 • © AberdeenGroup 2012 – Not For Distribution
Research ReviewIntersection of Two Self-Assessment Research
Methods PACE Model: behavioral assessment
Pressures – pain-points and driversActions – strategies and tacticsCapabilities – processes and skill setsEnablers – technologies and services
Maturity Class: performance metrics: Top 20% - Best-in-ClassMiddle 50% - Industry AverageTrailing 30% - Laggard
Results are Verified: Survey follow-ups, end-user interviews
Intersection of Two Self-Assessment Research Methods PACE Model: behavioral assessment
Pressures – pain-points and driversActions – strategies and tacticsCapabilities – processes and skill setsEnablers – technologies and services
Maturity Class: performance metrics: Top 20% - Best-in-ClassMiddle 50% - Industry AverageTrailing 30% - Laggard
Results are Verified: Survey follow-ups, end-user interviews
5 • © AberdeenGroup 2012 – Not For Distribution
Mobility Pain Points
46%
30%
24%
0% 10% 20% 30% 40% 50%
Executive and employee demands to leverage mobility’s
productivity gains to broader organization
Need to become moreoperationally efficient
Increasing capabilities andcomplexities of new devices
Percent of Respondents, n=431Source: Aberdeen Group, May 2012
6 • © AberdeenGroup 2012 – Not For Distribution
Mobility Strategies
0% 10% 20% 30% 40% 50%
19%
29%
44%
Control the mobile softwareapplications ('apps') that have
corporate data access
Support a heterogeneous (vs.homogeneous) mix of mobile device
platforms
Ensure all mobile devices withenterprise access are compliant
with corporate standards
Percent of Respondents, n=431Source: Aberdeen Group, May 2012
7 • © AberdeenGroup 2012 – Not For Distribution
The EMM Lifecycle
Provisioning Performance
management Operations and
support
Compliance and security Expense management Decommissioning
1 2 3 4 5 6
Time
Effort
Device Refresh Cycle
1 2 3 4 5 6
Time
Effort
Pre-Pl
anni
ng
Pre-Pl
anni
ng
Device Refresh Cycle
Recy
cle
& R
efre
sh
Pro
visi
onin
g
Per
form
ance
Mgm
t.
Ope
ration
s & S
uppo
rt
Com
plia
nce
& S
ecur
ity
Expe
nse
Man
agem
ent
Dec
omm
issi
onin
g
8 • © AberdeenGroup 2012 – Not For Distribution
Best-in-Class Defined
94%
7%
10%
41%
9%
4%
10%
13%
-4%
-20% 0% 20% 40% 60% 80% 100%
Employees with Secure Mobile Access toCompany Network
Lost or Stolen Devices Never Recovered
1-Year Change in Speed of Decision-Making
Percentage, n=431
Best-in-Class
Industry Average
Laggard
Source: Aberdeen Group, May 2012
9 • © AberdeenGroup 2012 – Not For Distribution
Best-in-Class Point the WayProcess
Decommission process for lost, stolen, or outmoded devices
Security policy for full lifecycle of all compliant devices BYOD policy established for corporate use of Organization
Organization IT controls all mobile access to company assets Heteregeneous mobile device support DLP procedures protect corporate data on employee
devices Corporate profiles on employee devices secure
corporate assets
Process Decommission process for lost, stolen, or outmoded
devices Security policy for full lifecycle of all compliant devices BYOD policy established for corporate use of Organization
Organization IT controls all mobile access to company assets Heteregeneous mobile device support DLP procedures protect corporate data on employee
devices Corporate profiles on employee devices secure
corporate assets
10 • © AberdeenGroup 2012 – Not For Distribution
Best-in-Class Point the WayKnowledge
Internal expertise developed on targeted mobile platforms
Regular assessment of security risks Mobile collaboration tools utilized
Performance Track number of lost or stolen devices successfully
decomissioned Track uptime of organization’s Wi-Fi® network Track level of mobile access to network and data
provided to each employee
Knowledge Internal expertise developed on targeted mobile
platforms Regular assessment of security risks Mobile collaboration tools utilized
Performance Track number of lost or stolen devices successfully
decomissioned Track uptime of organization’s Wi-Fi® network Track level of mobile access to network and data
provided to each employee
11 • © AberdeenGroup 2012 – Not For Distribution
Key Technologies
11%
22%
13%
29%
38%
40%
25%
31%
26%
42%
40%
55%
31%
35%
45%
45%
52%
60%
0% 20% 40% 60%
Enterprise mobile application store('app store')
Mobile versions of enterprise software(ERP, CRM, SFA, etc)
Self-service web portal for support andprocurement
In-house developed mobileapplications ('apps')
Employee-selected mobile applications('apps')
Remote mobile device lock and wipe(erase all data)
Percent of Respondents, n=431
Best-in-Class
Industry Average
Laggard
Source: Aberdeen Group, May 2012
12 • © AberdeenGroup 2012 – Not For Distribution
Smartphone Vs. Tablet Security
Security Capabilities
Smartphones Tablets
Best-in-Class
All Others
Best-in-Class
All Others
Δ Best-in-Class Tablets
Mobile user authentication 75% 65% 59% 52% 25%Policies for user logon password strength enforced
74% 60% 56% 44% 30%
Data encryption over wireless connections 65% 56% 44% 39% 38%
VPN for mobile devices 64% 51% 48% 43% 31%
Mobile device remote lock and wipe 64% 53% 38% 35% 49%Secure and compliant mobile file sharing via cloud
45% 27% 36% 22% 33%
Data Loss Prevention (DLP) 41% 29% 28% 25% 45%Application version control (e.g. blacklist / whitelist)
38% 30% 26% 25% 40%Source: Aberdeen Group, May 2012N = 431
13 • © AberdeenGroup 2012 – Not For Distribution
Performance Gains
28%
10%
8%
15%
5%
4%
12%
-2%
-3%
-5% 0% 5% 10% 15% 20% 25% 30%
Rate their workforce as "extremelyproductive"
12 mo. change in employee adherence tomobile policies
12 mo. change in workforce productivity
Percent of Respondents, n=237
Best-in-Class
Industry Average
Laggard
Source: Aberdeen Group, May 2012
14 • © AberdeenGroup 2012 – Not For Distribution
BYOD is a Global Phenom
GLOBAL USA EMEA APAC0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
50% 53% 49% 44%
32% 33%27% 41%
18% 15%24%
15%
NoYes, but from an approved company list onlyYes, any device
n = 472
Source: Aberdeen Group, May 2012
15
Poll Question
Why has your organization chosen to implement a Bring Your Own Device (BYOD) Program?
a) To accommodate the demand of employees
b) Employees gain additional productivity
c) The business reduces costs by not paying for devices
16 • © AberdeenGroup 2012 – Not For Distribution
Why BYOD?
56%
62%
48%
52%
56%
46%
65%
46%
49%
0% 20% 40% 60%
Toaccommodate
the demands ofemployees
Employees gainadditional
productivity
The businessreduces costsby not paying
for devices
Percent of Respondents, n=431
Best-in-Class
Industry Average
Laggard
Source: Aberdeen Group, May 2012
17
Industry Point of View
• Device/OS platform diversity
• Core MDM best practices continue to drive adoption
• Apps & Docs are key requirements for evolving mobile strategy
• Large enterprises need scalable solutions after initial pilots
18 • © AberdeenGroup 2012 – Not For Distribution
Hashtags: #SoMoClo #MaaS360Webinar
@MobileAberdeen @MaaS360
Tweet Break
19 • © AberdeenGroup 2012 – Not For Distribution
Social Mobile Cloud
82%
80%
69%
3%
65%
77%
64%
11%
0% 20% 40% 60% 80%
Social business
Mobility
Cloud
None of theabove
Percent of Respondents, n=431
Have Initiatives or Intend to Adopt
Best-in-Class
All Others
Source: Aberdeen Group, May 2012
20 • © AberdeenGroup 2012 – Not For Distribution
Mobile is Social
54%
41%
1%5%
Use Social Networks
Yes, frequently
Yes, occasionally
Not yet, but planning to
No
Source: Aberdeen Group, May 2012Percent of Respondents, n=431
21 • © AberdeenGroup 2012 – Not For Distribution
Social Business Strategy
72%
52%43%
7%
21%
15%
21% 26%43%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Best-in-Class IndustryAverage
Laggard
Perc
en
t of
resp
on
dents
, n=
431
An ad hoc approach - ateach employee's discretion
Part of a planned socialmedia strategy, notnecessarily compliant withcompany IT policy
Part of a planned socialmedia strategy, secure andcompliant with company IT
policy
Source: Aberdeen Group, May 2012
22
Poll Question
EMM Hosting Plans for Next 12 Months:
a) A solution provider hosts our EMM in the cloud
b) A solution provider hosts our EMM on their premises
c) A solution provider hosts our EMM on their premises and manages it for us
d) We host our EMM on our premises, and a solution provider manages it for us
e) We host and manage our EMM on our premises
23 • © AberdeenGroup 2012 – Not For Distribution
Where is the Growth?
We host and manage our own EMM solution behind our firewall
We host and a solution provider manages our EMM solution behind our firewall (as an on-premise managed service)
A solution provider hosts and manages our EMM solution remotely on their premises (as a remote managed service) or in the cloud
A solution provider hosts our EMM solution on their premises, and we manage it remotely ourselves (hosted Software-as-a-Service - SaaS)
A solution provider hosts our EMM solution in the public cloud (cloud SaaS), and we manage it remotely ourselves
0% 10% 20% 30% 40% 50% 60% 70%
46%
16%
16%
13%
12%
18%
11%
14%
16%
19%
Current Planned
155%
122%
90%
69%
40%
GROWTH RATE:
Source: Aberdeen Group, May 2012
24 • © AberdeenGroup 2012 – Not For Distribution
DATA CENTER
DATA TRANSMISSION DATA TRANSMISSION
DEVICE DATA STORAGEDEVICE DATA STORAGE
ACCESS MANAGEMENTACCESS MANAGEMENT
MOBILE ECOSYSTEM MANAGEMENTMOBILE ECOSYSTEM MANAGEMENT
DATA CONTEXTDATA CONTEXT
APPS
APPS
FIREWALL
APPS
Post-Device
Device-Centric
USERUSER
DATA STORAGEDATA STORAGE
25
Instant Enterprise Mobility Management
• Fast deployment– Simple provisioning processes– Intuitive user interface
• Effortless scalability– Instantly turn up devices, users, apps– Start small and easily expand up
• Automatic upgrades– Continuous updates available instantly– No ongoing maintenance
• Unmatched affordability– Zero infrastructure needed– Pay as you go subscription model
Agility of the cloud for the pace of change in mobility
Enterprise Mobility Management Platform
26
Social Mobile Intelligence
• Moving beyond the delivery model– Create value differently than just speed and ease of use
Mobile Cloud
Devices
Apps
DocsPolicy
Actions
Big Data Analytics for Enterprise Mobility
• Leveraging the network effect of data collection– Each new user adds data to
the “engine”– Improves the service for all
customers– Benchmark against peers
based on data across the platform
27
EMM Community Analytics
Best practices and benchmarking
28 • © AberdeenGroup 2012 – Not For Distribution
Key Takeaways: Dive into EMM Start with MDM
If your organization can't recover the contents, or lock or wipe the data from a lost, stolen, or compromised device, then it better be entirely certain that there's no confidential or protected data on it first.
Track them before you lose them Lost or stolen mobile devices that cannot be recovered are your
organization's single largest mobile security and compliance vulnerability. Use MDM to take control of all rogue devices.
Mobile Application Management (MAM) A MAM solution enables the organization to deploy, monitor, and
enforce policy for both corporate-developed and publicly available apps.
Tablets have an insecurity complex Apply to tablets the same rigor and IT service management
principles that are used to support netbooks and smartphones.
© AberdeenGroup 2011
Twitter: @MobileAberdeen
30
Wrap Up
• Upcoming Webinars (Registration Link in Chat Window)
– Embracing BYOD with MDM and NAC• Thursday, June 7th @ 2:00 PM Eastern
• Past Webinars (http://links.maas360.com/webinars)
– Android in the Enterprise: Piecing Together Fragmentation– BYOD: Striking a Balance—Employee Privacy and IT Governance– Best Practices for Implementing a BYOD Program
• Plus lots of How-To content on our website – Mobile Device Management Best Practices
• http://links.maas360.com/mdm
– Mobile Device Management Glossary• http://links.maas360.com/mdm_glossary
Questions or [email protected]
31
MaaS360: Comprehensive EMM from the Cloud
Visualize the entire mobile computing environment
Manage users, devices, apps, and expenses across the enterprise
Secure corporate data and enforce compliance
Free 30-day Trial: www.maas360.com/trial/
Get Started Now!