the cloud-enabled social mobile enterprise

31
1 The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

Upload: maas360-by-fiberlink

Post on 18-Jan-2015

864 views

Category:

Technology


1 download

DESCRIPTION

The Aberdeen group joins Fiberlink for this webinar on the convergence of social, mobile and cloud. Learn more: http://www.maas360.com/products/mobile-device-management/

TRANSCRIPT

Page 1: The Cloud-Enabled Social Mobile Enterprise

1

The Cloud-Enabled Social Mobile

EnterpriseNeil Florio, Fiberlink

Andrew Borg, Aberdeen Group

Page 2: The Cloud-Enabled Social Mobile Enterprise

2

Today’s Agenda

• State of Enterprise Mobility Management (EMM)

• The Rise of Bring Your Own Device (BYOD)

• Cloud-Enabled Social Mobile Enterprise

• Leveraging the Cloud for Mobility Intelligence

• EMM Strategy Recommendations

Page 3: The Cloud-Enabled Social Mobile Enterprise

© AberdeenGroup 2011

Andrew BorgResearch DirectorMobility Center of Excellence

Page 4: The Cloud-Enabled Social Mobile Enterprise

4 • © AberdeenGroup 2012 – Not For Distribution

Research ReviewIntersection of Two Self-Assessment Research

Methods PACE Model: behavioral assessment

Pressures – pain-points and driversActions – strategies and tacticsCapabilities – processes and skill setsEnablers – technologies and services

Maturity Class: performance metrics: Top 20% - Best-in-ClassMiddle 50% - Industry AverageTrailing 30% - Laggard

Results are Verified: Survey follow-ups, end-user interviews

Intersection of Two Self-Assessment Research Methods PACE Model: behavioral assessment

Pressures – pain-points and driversActions – strategies and tacticsCapabilities – processes and skill setsEnablers – technologies and services

Maturity Class: performance metrics: Top 20% - Best-in-ClassMiddle 50% - Industry AverageTrailing 30% - Laggard

Results are Verified: Survey follow-ups, end-user interviews

Page 5: The Cloud-Enabled Social Mobile Enterprise

5 • © AberdeenGroup 2012 – Not For Distribution

Mobility Pain Points

46%

30%

24%

0% 10% 20% 30% 40% 50%

Executive and employee demands to leverage mobility’s

productivity gains to broader organization

Need to become moreoperationally efficient

Increasing capabilities andcomplexities of new devices

Percent of Respondents, n=431Source: Aberdeen Group, May 2012

Page 6: The Cloud-Enabled Social Mobile Enterprise

6 • © AberdeenGroup 2012 – Not For Distribution

Mobility Strategies

0% 10% 20% 30% 40% 50%

19%

29%

44%

Control the mobile softwareapplications ('apps') that have

corporate data access

Support a heterogeneous (vs.homogeneous) mix of mobile device

platforms

Ensure all mobile devices withenterprise access are compliant

with corporate standards

Percent of Respondents, n=431Source: Aberdeen Group, May 2012

Page 7: The Cloud-Enabled Social Mobile Enterprise

7 • © AberdeenGroup 2012 – Not For Distribution

The EMM Lifecycle

Provisioning Performance

management Operations and

support

Compliance and security Expense management Decommissioning

1 2 3 4 5 6

Time

Effort

Device Refresh Cycle

1 2 3 4 5 6

Time

Effort

Pre-Pl

anni

ng

Pre-Pl

anni

ng

Device Refresh Cycle

Recy

cle

& R

efre

sh

Pro

visi

onin

g

Per

form

ance

Mgm

t.

Ope

ration

s & S

uppo

rt

Com

plia

nce

& S

ecur

ity

Expe

nse

Man

agem

ent

Dec

omm

issi

onin

g

Page 8: The Cloud-Enabled Social Mobile Enterprise

8 • © AberdeenGroup 2012 – Not For Distribution

Best-in-Class Defined

94%

7%

10%

41%

9%

4%

10%

13%

-4%

-20% 0% 20% 40% 60% 80% 100%

Employees with Secure Mobile Access toCompany Network

Lost or Stolen Devices Never Recovered

1-Year Change in Speed of Decision-Making

Percentage, n=431

Best-in-Class

Industry Average

Laggard

Source: Aberdeen Group, May 2012

Page 9: The Cloud-Enabled Social Mobile Enterprise

9 • © AberdeenGroup 2012 – Not For Distribution

Best-in-Class Point the WayProcess

Decommission process for lost, stolen, or outmoded devices

Security policy for full lifecycle of all compliant devices BYOD policy established for corporate use of Organization

Organization IT controls all mobile access to company assets Heteregeneous mobile device support DLP procedures protect corporate data on employee

devices Corporate profiles on employee devices secure

corporate assets

Process Decommission process for lost, stolen, or outmoded

devices Security policy for full lifecycle of all compliant devices BYOD policy established for corporate use of Organization

Organization IT controls all mobile access to company assets Heteregeneous mobile device support DLP procedures protect corporate data on employee

devices Corporate profiles on employee devices secure

corporate assets

Page 10: The Cloud-Enabled Social Mobile Enterprise

10 • © AberdeenGroup 2012 – Not For Distribution

Best-in-Class Point the WayKnowledge

Internal expertise developed on targeted mobile platforms

Regular assessment of security risks Mobile collaboration tools utilized

Performance Track number of lost or stolen devices successfully

decomissioned Track uptime of organization’s Wi-Fi® network Track level of mobile access to network and data

provided to each employee

Knowledge Internal expertise developed on targeted mobile

platforms Regular assessment of security risks Mobile collaboration tools utilized

Performance Track number of lost or stolen devices successfully

decomissioned Track uptime of organization’s Wi-Fi® network Track level of mobile access to network and data

provided to each employee

Page 11: The Cloud-Enabled Social Mobile Enterprise

11 • © AberdeenGroup 2012 – Not For Distribution

Key Technologies

11%

22%

13%

29%

38%

40%

25%

31%

26%

42%

40%

55%

31%

35%

45%

45%

52%

60%

0% 20% 40% 60%

Enterprise mobile application store('app store')

Mobile versions of enterprise software(ERP, CRM, SFA, etc)

Self-service web portal for support andprocurement

In-house developed mobileapplications ('apps')

Employee-selected mobile applications('apps')

Remote mobile device lock and wipe(erase all data)

Percent of Respondents, n=431

Best-in-Class

Industry Average

Laggard

Source: Aberdeen Group, May 2012

Page 12: The Cloud-Enabled Social Mobile Enterprise

12 • © AberdeenGroup 2012 – Not For Distribution

Smartphone Vs. Tablet Security

Security Capabilities

Smartphones Tablets

Best-in-Class

All Others

Best-in-Class

All Others

Δ Best-in-Class Tablets

Mobile user authentication 75% 65% 59% 52% 25%Policies for user logon password strength enforced

74% 60% 56% 44% 30%

Data encryption over wireless connections 65% 56% 44% 39% 38%

VPN for mobile devices 64% 51% 48% 43% 31%

Mobile device remote lock and wipe 64% 53% 38% 35% 49%Secure and compliant mobile file sharing via cloud

45% 27% 36% 22% 33%

Data Loss Prevention (DLP) 41% 29% 28% 25% 45%Application version control (e.g. blacklist / whitelist)

38% 30% 26% 25% 40%Source: Aberdeen Group, May 2012N = 431

Page 13: The Cloud-Enabled Social Mobile Enterprise

13 • © AberdeenGroup 2012 – Not For Distribution

Performance Gains

28%

10%

8%

15%

5%

4%

12%

-2%

-3%

-5% 0% 5% 10% 15% 20% 25% 30%

Rate their workforce as "extremelyproductive"

12 mo. change in employee adherence tomobile policies

12 mo. change in workforce productivity

Percent of Respondents, n=237

Best-in-Class

Industry Average

Laggard

Source: Aberdeen Group, May 2012

Page 14: The Cloud-Enabled Social Mobile Enterprise

14 • © AberdeenGroup 2012 – Not For Distribution

BYOD is a Global Phenom

GLOBAL USA EMEA APAC0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

50% 53% 49% 44%

32% 33%27% 41%

18% 15%24%

15%

NoYes, but from an approved company list onlyYes, any device

n = 472

Source: Aberdeen Group, May 2012

Page 15: The Cloud-Enabled Social Mobile Enterprise

15

Poll Question

Why has your organization chosen to implement a Bring Your Own Device (BYOD) Program?

a) To accommodate the demand of employees

b) Employees gain additional productivity

c) The business reduces costs by not paying for devices

Page 16: The Cloud-Enabled Social Mobile Enterprise

16 • © AberdeenGroup 2012 – Not For Distribution

Why BYOD?

56%

62%

48%

52%

56%

46%

65%

46%

49%

0% 20% 40% 60%

Toaccommodate

the demands ofemployees

Employees gainadditional

productivity

The businessreduces costsby not paying

for devices

Percent of Respondents, n=431

Best-in-Class

Industry Average

Laggard

Source: Aberdeen Group, May 2012

Page 17: The Cloud-Enabled Social Mobile Enterprise

17

Industry Point of View

• Device/OS platform diversity

• Core MDM best practices continue to drive adoption

• Apps & Docs are key requirements for evolving mobile strategy

• Large enterprises need scalable solutions after initial pilots

Page 18: The Cloud-Enabled Social Mobile Enterprise

18 • © AberdeenGroup 2012 – Not For Distribution

Hashtags: #SoMoClo #MaaS360Webinar

@MobileAberdeen @MaaS360

Tweet Break

Page 19: The Cloud-Enabled Social Mobile Enterprise

19 • © AberdeenGroup 2012 – Not For Distribution

Social Mobile Cloud

82%

80%

69%

3%

65%

77%

64%

11%

0% 20% 40% 60% 80%

Social business

Mobility

Cloud

None of theabove

Percent of Respondents, n=431

Have Initiatives or Intend to Adopt

Best-in-Class

All Others

Source: Aberdeen Group, May 2012

Page 20: The Cloud-Enabled Social Mobile Enterprise

20 • © AberdeenGroup 2012 – Not For Distribution

Mobile is Social

54%

41%

1%5%

Use Social Networks

Yes, frequently

Yes, occasionally

Not yet, but planning to

No

Source: Aberdeen Group, May 2012Percent of Respondents, n=431

Page 21: The Cloud-Enabled Social Mobile Enterprise

21 • © AberdeenGroup 2012 – Not For Distribution

Social Business Strategy

72%

52%43%

7%

21%

15%

21% 26%43%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Best-in-Class IndustryAverage

Laggard

Perc

en

t of

resp

on

dents

, n=

431

An ad hoc approach - ateach employee's discretion

Part of a planned socialmedia strategy, notnecessarily compliant withcompany IT policy

Part of a planned socialmedia strategy, secure andcompliant with company IT

policy

Source: Aberdeen Group, May 2012

Page 22: The Cloud-Enabled Social Mobile Enterprise

22

Poll Question

EMM Hosting Plans for Next 12 Months:

a) A solution provider hosts our EMM in the cloud

b) A solution provider hosts our EMM on their premises

c) A solution provider hosts our EMM on their premises and manages it for us

d) We host our EMM on our premises, and a solution provider manages it for us

e) We host and manage our EMM on our premises

Page 23: The Cloud-Enabled Social Mobile Enterprise

23 • © AberdeenGroup 2012 – Not For Distribution

Where is the Growth?

We host and manage our own EMM solution behind our firewall

We host and a solution provider manages our EMM solution behind our firewall (as an on-premise managed service)

A solution provider hosts and manages our EMM solution remotely on their premises (as a remote managed service) or in the cloud

A solution provider hosts our EMM solution on their premises, and we manage it remotely ourselves (hosted Software-as-a-Service - SaaS)

A solution provider hosts our EMM solution in the public cloud (cloud SaaS), and we manage it remotely ourselves

0% 10% 20% 30% 40% 50% 60% 70%

46%

16%

16%

13%

12%

18%

11%

14%

16%

19%

Current Planned

155%

122%

90%

69%

40%

GROWTH RATE:

Source: Aberdeen Group, May 2012

Page 24: The Cloud-Enabled Social Mobile Enterprise

24 • © AberdeenGroup 2012 – Not For Distribution

DATA CENTER

DATA TRANSMISSION DATA TRANSMISSION

DEVICE DATA STORAGEDEVICE DATA STORAGE

ACCESS MANAGEMENTACCESS MANAGEMENT

MOBILE ECOSYSTEM MANAGEMENTMOBILE ECOSYSTEM MANAGEMENT

DATA CONTEXTDATA CONTEXT

APPS

APPS

FIREWALL

APPS

Post-Device

Device-Centric

USERUSER

DATA STORAGEDATA STORAGE

Page 25: The Cloud-Enabled Social Mobile Enterprise

25

Instant Enterprise Mobility Management

• Fast deployment– Simple provisioning processes– Intuitive user interface

• Effortless scalability– Instantly turn up devices, users, apps– Start small and easily expand up

• Automatic upgrades– Continuous updates available instantly– No ongoing maintenance

• Unmatched affordability– Zero infrastructure needed– Pay as you go subscription model

Agility of the cloud for the pace of change in mobility

Enterprise Mobility Management Platform

Page 26: The Cloud-Enabled Social Mobile Enterprise

26

Social Mobile Intelligence

• Moving beyond the delivery model– Create value differently than just speed and ease of use

Mobile Cloud

Devices

Apps

DocsPolicy

Actions

Big Data Analytics for Enterprise Mobility

• Leveraging the network effect of data collection– Each new user adds data to

the “engine”– Improves the service for all

customers– Benchmark against peers

based on data across the platform

Page 27: The Cloud-Enabled Social Mobile Enterprise

27

EMM Community Analytics

Best practices and benchmarking

Page 28: The Cloud-Enabled Social Mobile Enterprise

28 • © AberdeenGroup 2012 – Not For Distribution

Key Takeaways: Dive into EMM Start with MDM

If your organization can't recover the contents, or lock or wipe the data from a lost, stolen, or compromised device, then it better be entirely certain that there's no confidential or protected data on it first.

Track them before you lose them Lost or stolen mobile devices that cannot be recovered are your

organization's single largest mobile security and compliance vulnerability. Use MDM to take control of all rogue devices.

Mobile Application Management (MAM) A MAM solution enables the organization to deploy, monitor, and

enforce policy for both corporate-developed and publicly available apps.

Tablets have an insecurity complex Apply to tablets the same rigor and IT service management

principles that are used to support netbooks and smartphones.

Page 29: The Cloud-Enabled Social Mobile Enterprise

© AberdeenGroup 2011

Twitter: @MobileAberdeen

Page 30: The Cloud-Enabled Social Mobile Enterprise

30

Wrap Up

• Upcoming Webinars (Registration Link in Chat Window)

– Embracing BYOD with MDM and NAC• Thursday, June 7th @ 2:00 PM Eastern

• Past Webinars (http://links.maas360.com/webinars)

– Android in the Enterprise: Piecing Together Fragmentation– BYOD: Striking a Balance—Employee Privacy and IT Governance– Best Practices for Implementing a BYOD Program

• Plus lots of How-To content on our website – Mobile Device Management Best Practices

• http://links.maas360.com/mdm

– Mobile Device Management Glossary• http://links.maas360.com/mdm_glossary

Questions or [email protected]

[email protected]

Page 31: The Cloud-Enabled Social Mobile Enterprise

31

MaaS360: Comprehensive EMM from the Cloud

Visualize the entire mobile computing environment

Manage users, devices, apps, and expenses across the enterprise

Secure corporate data and enforce compliance

Free 30-day Trial: www.maas360.com/trial/

Get Started Now!