SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Citrix Mobility Report:
A Look Ahead
December, 2013

Will BYO in 2014 be more of the same?
To get a glimpse into mobility and BYO trends for 2014, Citrix recently conducted a
survey among enterprise IT organizations. This survey provides insights into 2013
trends and predictors for 2014, pointing to more BYO challenges in 2014 as the
variety of devices and applications increase.
Despite the rocky road ahead, IT organizations must continue to embrace BYO as
user choice will remain supreme and business owners will find creative approaches
to leverage mobility to grow the top line, improve customer relations, and drive
higher levels of productivity and efficiency.
IT must have a plan in place and adopt an enterprise mobility management solution
that allows them to adapt to the dynamic changes in their BYO environment.
BYO devices will increasingly extend beyond smartphones and tablets and include
desktops and laptops.
Our survey results reveal that while the spotlight around BYO device adoption has largely been focused on smartphones
and tablets, organizations are also having to support BYO desktops and laptops. In fact, BYO desktops/laptops account
for 18% of BYO devices in 2013.

A survey of Citrix customers confirm high levels of BYO for mobile devices
% devices that are BYO

60%

40%

50%

54%

20%

18%
0%

Smartphones

Tablets

Desktops/
Laptops
Citrix Mobility Report

2

December, 2013

In 2014, organizations predict BYO desktops and laptops will grow to 25%.

By the end of 2014, approximate percentage of the devices
in your environment that will be BYO (Average percentages)
60%

54%

50%

40%

25%

20%

0%

Smartphones

Tablets

Desktops/
Laptops

Windows-based desktops and apps will continue to be dominant.
While the use of BYO smartphones and tablets in the enterprise has increased, mobile apps only account for 6%
of all apps used. That means almost 94% of apps in an enterprise are not mobile. Windows apps still dominate
accounting for 64%.

Mix of app types in enterprises

Predicted mix of app types
in enterprises by end of 2014

6%

9%
20%

64%

10%

54%

23%

14%

Mobile

SaaS

Windows

HTML5/Web

In 2014, Windows will continue to be the dominant platform despite its decline from 64% to 54% of all app types
delivered by IT admins. The implication is that IT must find a solution to mobilize and manage these different types of
apps while delivering them to a diverse set of BYO devices.
Citrix Mobility Report

3

December, 2013

2014: Year of mobile app proliferation and confusion
For many organizations, the growth of mobile devices and applications is largely driven by employees’ desire to
be more productive. As a result, IT organizations are supporting a wide variety of applications with email being the
predominant mobile app.

When it comes to supporting mobility, what are the most
important types of mobile applications to your organization?
100%
80%

90%

60%
40%

35%

20%
0%

Mobile email
(including
calendar and
contacts)

SharePoint
access

48%
21%
Enterprise
file sync
and share

Web
conferencing

36%
Secure
browser

39%

Collaboration
tools

52%

Line of
business
apps

In 2014, the number of apps in use by organizations will increase. 42% of respondents expect to manage 100+ apps,
with 21% of those respondents expecting to manage 1000+ apps.
We predict that there will be a state of app confusion driven as IT struggles with answering key questions including:
ŸŸ Determining whether to wait until native mobile or cloud versions of commercial-off-the shelf apps are available.
ŸŸ Deciding what platforms (iOS, Android, WinPhone, etc.) internally developed apps should support and in what order.
ŸŸ Holding off further adoption of native mobile apps in favor of web or cloud based apps.
ŸŸ Creating the appropriate organizational structure and processes to support the development and management of a
heterogeneous application environment.
Citrix Mobility Report

4

December, 2013

Security concerns will still exist, but won’t slow down BYOD.
While IT organizations are clearly concerned about security risks such as corporate information stored locally on mobile
devices, these concerns will not slow BYOD adoption. The implication is that IT must find a solution that allows them to
secure data from a variety of different applications on different devices without impacting user productivity and satisfaction.

For native mobile applications (apps downloaded onto a device),
how concerned are you about corporate information from those
apps residing in applications locally stored on the device?

13%
Very
concerned

29%

58%

Somewhat
concerned
Not
concerned

Mobile device and app management strategies will need to evolve.
Most organizations have strategies in place to manage mobile devices, mobile apps, and cloud data.

Does your organization have a corporate strategy in place
to manage mobile devices, mobile apps, and cloud data?
120%
100%
80%

66%

56%

60%
40%
20%
0%

28%
Devices
(mobile device
management)

36%

Mobile Apps
(mobile application
management,
enterprise app store)

41%
49%

Cloud Data
(cloud data
sync and
sharing tools)

Yes
No
Don’t
know
Citrix Mobility Report

December, 2013

5

Conclusion
Organizations will need to re-evaluate existing mobility strategies to account for the increase in complexity in 2014 (outlined
above), including the growth of BYO desktops and laptops and the need to support Windows desktop and legacy apps on
all BYO devices.
Redefining mobile strategies will not be an easy task. Flexibility is key.
To learn more about how to develop a flexible mobility strategy, go to www.citrix.com/xenmobile.

Survey Methodology
Citrix surveyed 733 customers across North America, Europe, Asia Pacific, Latin America and Africa in May 2013.
Participants included IT administrators to IT executives/managers (directors, VPs, CIOs), and other IT decision makers,
representing a wide range of company sizes and industry verticals.

About Citrix
Citrix (NASDAQ:CTXS) is the cloud company that enables mobile workstyles—empowering people to work and collaborate from anywhere, easily
and securely. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing,
Citrix helps organizations achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more
than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at www.citrix.com.
Copyright © 2013 Citrix Systems, Inc. All rights reserved. Citrix and XenMobile are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries,
and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their
respective companies.

Mais conteúdo relacionado

Mais de Citrix

Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]Citrix
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Citrix
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote BrowserCitrix
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseCitrix
 
Digital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationDigital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationCitrix
 
The Digital Disconnect in South Africa
The Digital Disconnect in South AfricaThe Digital Disconnect in South Africa
The Digital Disconnect in South AfricaCitrix
 

Mais de Citrix (20)

Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote Browser
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 
Digital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationDigital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformation
 
The Digital Disconnect in South Africa
The Digital Disconnect in South AfricaThe Digital Disconnect in South Africa
The Digital Disconnect in South Africa
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Citrix Mobility Report: A Look Ahead at #BYOD & #EMM

  • 1. Citrix Mobility Report: A Look Ahead December, 2013 Will BYO in 2014 be more of the same? To get a glimpse into mobility and BYO trends for 2014, Citrix recently conducted a survey among enterprise IT organizations. This survey provides insights into 2013 trends and predictors for 2014, pointing to more BYO challenges in 2014 as the variety of devices and applications increase. Despite the rocky road ahead, IT organizations must continue to embrace BYO as user choice will remain supreme and business owners will find creative approaches to leverage mobility to grow the top line, improve customer relations, and drive higher levels of productivity and efficiency. IT must have a plan in place and adopt an enterprise mobility management solution that allows them to adapt to the dynamic changes in their BYO environment. BYO devices will increasingly extend beyond smartphones and tablets and include desktops and laptops. Our survey results reveal that while the spotlight around BYO device adoption has largely been focused on smartphones and tablets, organizations are also having to support BYO desktops and laptops. In fact, BYO desktops/laptops account for 18% of BYO devices in 2013. A survey of Citrix customers confirm high levels of BYO for mobile devices % devices that are BYO 60% 40% 50% 54% 20% 18% 0% Smartphones Tablets Desktops/ Laptops
  • 2. Citrix Mobility Report 2 December, 2013 In 2014, organizations predict BYO desktops and laptops will grow to 25%. By the end of 2014, approximate percentage of the devices in your environment that will be BYO (Average percentages) 60% 54% 50% 40% 25% 20% 0% Smartphones Tablets Desktops/ Laptops Windows-based desktops and apps will continue to be dominant. While the use of BYO smartphones and tablets in the enterprise has increased, mobile apps only account for 6% of all apps used. That means almost 94% of apps in an enterprise are not mobile. Windows apps still dominate accounting for 64%. Mix of app types in enterprises Predicted mix of app types in enterprises by end of 2014 6% 9% 20% 64% 10% 54% 23% 14% Mobile SaaS Windows HTML5/Web In 2014, Windows will continue to be the dominant platform despite its decline from 64% to 54% of all app types delivered by IT admins. The implication is that IT must find a solution to mobilize and manage these different types of apps while delivering them to a diverse set of BYO devices.
  • 3. Citrix Mobility Report 3 December, 2013 2014: Year of mobile app proliferation and confusion For many organizations, the growth of mobile devices and applications is largely driven by employees’ desire to be more productive. As a result, IT organizations are supporting a wide variety of applications with email being the predominant mobile app. When it comes to supporting mobility, what are the most important types of mobile applications to your organization? 100% 80% 90% 60% 40% 35% 20% 0% Mobile email (including calendar and contacts) SharePoint access 48% 21% Enterprise file sync and share Web conferencing 36% Secure browser 39% Collaboration tools 52% Line of business apps In 2014, the number of apps in use by organizations will increase. 42% of respondents expect to manage 100+ apps, with 21% of those respondents expecting to manage 1000+ apps. We predict that there will be a state of app confusion driven as IT struggles with answering key questions including: ŸŸ Determining whether to wait until native mobile or cloud versions of commercial-off-the shelf apps are available. ŸŸ Deciding what platforms (iOS, Android, WinPhone, etc.) internally developed apps should support and in what order. ŸŸ Holding off further adoption of native mobile apps in favor of web or cloud based apps. ŸŸ Creating the appropriate organizational structure and processes to support the development and management of a heterogeneous application environment.
  • 4. Citrix Mobility Report 4 December, 2013 Security concerns will still exist, but won’t slow down BYOD. While IT organizations are clearly concerned about security risks such as corporate information stored locally on mobile devices, these concerns will not slow BYOD adoption. The implication is that IT must find a solution that allows them to secure data from a variety of different applications on different devices without impacting user productivity and satisfaction. For native mobile applications (apps downloaded onto a device), how concerned are you about corporate information from those apps residing in applications locally stored on the device? 13% Very concerned 29% 58% Somewhat concerned Not concerned Mobile device and app management strategies will need to evolve. Most organizations have strategies in place to manage mobile devices, mobile apps, and cloud data. Does your organization have a corporate strategy in place to manage mobile devices, mobile apps, and cloud data? 120% 100% 80% 66% 56% 60% 40% 20% 0% 28% Devices (mobile device management) 36% Mobile Apps (mobile application management, enterprise app store) 41% 49% Cloud Data (cloud data sync and sharing tools) Yes No Don’t know
  • 5. Citrix Mobility Report December, 2013 5 Conclusion Organizations will need to re-evaluate existing mobility strategies to account for the increase in complexity in 2014 (outlined above), including the growth of BYO desktops and laptops and the need to support Windows desktop and legacy apps on all BYO devices. Redefining mobile strategies will not be an easy task. Flexibility is key. To learn more about how to develop a flexible mobility strategy, go to www.citrix.com/xenmobile. Survey Methodology Citrix surveyed 733 customers across North America, Europe, Asia Pacific, Latin America and Africa in May 2013. Participants included IT administrators to IT executives/managers (directors, VPs, CIOs), and other IT decision makers, representing a wide range of company sizes and industry verticals. About Citrix Citrix (NASDAQ:CTXS) is the cloud company that enables mobile workstyles—empowering people to work and collaborate from anywhere, easily and securely. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing, Citrix helps organizations achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at www.citrix.com. Copyright © 2013 Citrix Systems, Inc. All rights reserved. Citrix and XenMobile are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies.