SlideShare uma empresa Scribd logo
1 de 18
Key Trends and Opportunities in Business Mobility and Enterprise Communications
1      Key Trends in 2011 Rise of Handheld Computers BYOD “Bring Your Own Device” The Consumerization of Enterprise IT      Key Challenges for IT Meeting User Expectations Increased Support and Maintenance Costs New Security and Compliance Risks       The Options for IT Factors to Consider Approaches To Consumerization Enterprise Mobilization Strategy      Conclusions and Final Remarks 2 3 4 Agenda
1  Key Trends in 2011
Three Key Trends In 2011 1 Smartphones and tablets are the new PC Consumers are adopting smartphones faster than just about any other tech product in history. 2 Bring Your Own Device is changing how we work Employees now expect to be able to use the smartphones and tablets they bought for personal use. 3 Consumer Technology is influencing the enterprise Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.
75% 61% 95% US corporations where employees use tablets for work purposes. Strategy Analytics via PCWorld April 2011 Information Workers Using Self-purchased Technology For Work IDC survey of IT Consumerization Trends March 2011 Enterprises with 'Bring Your Own Device' policies Aberdeen data via ZDNet March 2011
“ Employers don’t know  how many or what consumer technologies are in use.  Workers report using consumer devices attwice the rateemployers reported. Survey of IT Consumerization Trends IDC, March 2011
2  Key Challenges for IT
Key Challenges For IT 1 Shift to a more consumer-oriented IT focus IT needs to bridge the growing gap between employee and IT interests. 2 Consumerization can increase IT costs dramatically. An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly. 3 New security and compliance risks Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.
“ IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.
3  The Options for IT
Factors To Consider Security Requirements Does the company work with sensitive data? Is the company risk-averse? Industry compliance and regulation Mobility Desktop Computer VS Mobile Devices Can mobile applications help the company ’s employees, customers, and value and supply chain partners? What functionalities does each user group need mobilized? What device types, capabilities and hardware need to be enabled? Company Culture Tech-savy VS Tech-challenged Flexible working culture that allows home office work
Approaches To Consumerization Companyowned High BYOD Consumerization Security Risks High Low Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)
“ The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service. Magic Quadrant for PC Configuration Life Cycle Management Tools Gartner, January 2011
4 Conclusions and Final Remarks
Enterprise Mobility Initiatives Support more smartphones, tablets, and other devices Deploymobile applications Establishmobility policies Securedata from criminals, malware and other threats Offerthe sort of technology experience users have come to expect from consumer technologies
“ CIOs must get ahead of the curve by coming to  terms with what is valuable about consumerization. Handled properly, it can increase productivity and even lower IT costs. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010
Thank You Raul Castanon-Martinez http://www.linkedin.com/in/rcastanon http://newchannelbuzz.com/ http://twitter.com/newchannelbuzz

Mais conteúdo relacionado

Mais procurados

Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsIBM India Smarter Computing
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Infosys
 
Global Technology Outlook
Global Technology Outlook Global Technology Outlook
Global Technology Outlook SD Paul
 
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...Capgemini
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsSubrahmanyam KVJ
 
Top 5 ICT Issues for Indonesia to address
Top 5 ICT Issues for Indonesia to addressTop 5 ICT Issues for Indonesia to address
Top 5 ICT Issues for Indonesia to addressAgus Wicaksono
 
My 2010 Trends
My 2010 TrendsMy 2010 Trends
My 2010 Trendsbrian9p
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemCognizant
 
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...eraser Juan José Calderón
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
How smart, connected products are transforming companies presentation (edit...
How smart, connected products are transforming companies   presentation (edit...How smart, connected products are transforming companies   presentation (edit...
How smart, connected products are transforming companies presentation (edit...Fahmy Amrillah
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Matthew Bailey
 
Digital leadership in disruptive changes
Digital leadership in disruptive changesDigital leadership in disruptive changes
Digital leadership in disruptive changesAgus Wicaksono
 

Mais procurados (18)

Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
Global Technology Outlook
Global Technology Outlook Global Technology Outlook
Global Technology Outlook
 
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
 
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
 
Top 5 ICT Issues for Indonesia to address
Top 5 ICT Issues for Indonesia to addressTop 5 ICT Issues for Indonesia to address
Top 5 ICT Issues for Indonesia to address
 
The present and future of consumer IoT
The present and future of consumer IoTThe present and future of consumer IoT
The present and future of consumer IoT
 
My 2010 Trends
My 2010 TrendsMy 2010 Trends
My 2010 Trends
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
 
Role of it in finance
Role of it in financeRole of it in finance
Role of it in finance
 
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
How smart, connected products are transforming companies presentation (edit...
How smart, connected products are transforming companies   presentation (edit...How smart, connected products are transforming companies   presentation (edit...
How smart, connected products are transforming companies presentation (edit...
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
 
Digital leadership in disruptive changes
Digital leadership in disruptive changesDigital leadership in disruptive changes
Digital leadership in disruptive changes
 

Destaque

Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic UncertaintyMobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic UncertaintyRaúl Castañón Martínez
 
Mobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based SolutionsMobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based SolutionsRaúl Castañón Martínez
 
Bots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for ITBots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for ITRaúl Castañón Martínez
 
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceMobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceRaúl Castañón Martínez
 

Destaque (6)

In-app purchases
In-app purchasesIn-app purchases
In-app purchases
 
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic UncertaintyMobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
 
Mobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based SolutionsMobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based Solutions
 
Mobile Apps Monetization
Mobile Apps MonetizationMobile Apps Monetization
Mobile Apps Monetization
 
Bots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for ITBots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for IT
 
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceMobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
 

Semelhante a Key Trends and Opportunities in Business Mobility and Enterprise Communications

Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderOKTOPUS Consulting
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingLisa Waddell
 
Top 10-technology-tr
Top 10-technology-trTop 10-technology-tr
Top 10-technology-trNissar Ahamed
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
The Internet of Things; a multi-trillion dollar opportunity
The Internet of Things; a multi-trillion dollar opportunityThe Internet of Things; a multi-trillion dollar opportunity
The Internet of Things; a multi-trillion dollar opportunityBen Gilchriest
 
Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
 Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A... Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...VIRGOkonsult
 
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsIndustry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsSuyati Technologies
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 

Semelhante a Key Trends and Opportunities in Business Mobility and Enterprise Communications (20)

Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Adopt new technology for 2011 and beyond
Adopt new technology for 2011 and beyondAdopt new technology for 2011 and beyond
Adopt new technology for 2011 and beyond
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
 
Mobilidade
MobilidadeMobilidade
Mobilidade
 
ict.......pptx
ict.......pptxict.......pptx
ict.......pptx
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
Top 10-technology-tr
Top 10-technology-trTop 10-technology-tr
Top 10-technology-tr
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Tech trends 2010
Tech trends 2010Tech trends 2010
Tech trends 2010
 
The IT archipelago
The IT archipelagoThe IT archipelago
The IT archipelago
 
The Internet of Things; a multi-trillion dollar opportunity
The Internet of Things; a multi-trillion dollar opportunityThe Internet of Things; a multi-trillion dollar opportunity
The Internet of Things; a multi-trillion dollar opportunity
 
Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
 Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A... Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
 
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsIndustry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Intel
IntelIntel
Intel
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 

Mais de Raúl Castañón Martínez

CPaaS Is Turning Business Communications Inside Out
CPaaS Is Turning Business Communications Inside OutCPaaS Is Turning Business Communications Inside Out
CPaaS Is Turning Business Communications Inside OutRaúl Castañón Martínez
 
How CPaaS is Emerging as a Catalyst for Digital Transformation
How CPaaS is Emerging as a Catalyst for Digital TransformationHow CPaaS is Emerging as a Catalyst for Digital Transformation
How CPaaS is Emerging as a Catalyst for Digital TransformationRaúl Castañón Martínez
 
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...Raúl Castañón Martínez
 
Deep Work in the Era of Real-Time Communications
Deep Work in the Era of Real-Time CommunicationsDeep Work in the Era of Real-Time Communications
Deep Work in the Era of Real-Time CommunicationsRaúl Castañón Martínez
 
The state of the CPaaS market and digital transformation
The state of the CPaaS market and digital transformationThe state of the CPaaS market and digital transformation
The state of the CPaaS market and digital transformationRaúl Castañón Martínez
 
Infographic: Fixed and Mobile Network Traffic H2 2012
Infographic: Fixed and Mobile Network Traffic H2 2012Infographic: Fixed and Mobile Network Traffic H2 2012
Infographic: Fixed and Mobile Network Traffic H2 2012Raúl Castañón Martínez
 
Here's why data is the new mantra in Latin America
Here's why data is the new mantra in Latin AmericaHere's why data is the new mantra in Latin America
Here's why data is the new mantra in Latin AmericaRaúl Castañón Martínez
 
Latin America 2013 Telecommunications Market Key Statistics
Latin America 2013 Telecommunications Market Key StatisticsLatin America 2013 Telecommunications Market Key Statistics
Latin America 2013 Telecommunications Market Key StatisticsRaúl Castañón Martínez
 
Instant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenuesInstant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenuesRaúl Castañón Martínez
 

Mais de Raúl Castañón Martínez (18)

CPaaS Is Turning Business Communications Inside Out
CPaaS Is Turning Business Communications Inside OutCPaaS Is Turning Business Communications Inside Out
CPaaS Is Turning Business Communications Inside Out
 
Speech Technologies Inside the Enterprise
Speech Technologies Inside the EnterpriseSpeech Technologies Inside the Enterprise
Speech Technologies Inside the Enterprise
 
How CPaaS is Emerging as a Catalyst for Digital Transformation
How CPaaS is Emerging as a Catalyst for Digital TransformationHow CPaaS is Emerging as a Catalyst for Digital Transformation
How CPaaS is Emerging as a Catalyst for Digital Transformation
 
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
 
The CPaaS Opportunity for Service Providers
The CPaaS Opportunity for Service ProvidersThe CPaaS Opportunity for Service Providers
The CPaaS Opportunity for Service Providers
 
Deep Work in the Era of Real-Time Communications
Deep Work in the Era of Real-Time CommunicationsDeep Work in the Era of Real-Time Communications
Deep Work in the Era of Real-Time Communications
 
The state of the CPaaS market and digital transformation
The state of the CPaaS market and digital transformationThe state of the CPaaS market and digital transformation
The state of the CPaaS market and digital transformation
 
Enterprise Use Cases for Speech Technologies
Enterprise Use Cases for Speech TechnologiesEnterprise Use Cases for Speech Technologies
Enterprise Use Cases for Speech Technologies
 
How Mobile Transforms the Enterprise
How Mobile Transforms the EnterpriseHow Mobile Transforms the Enterprise
How Mobile Transforms the Enterprise
 
Latin America Social Networking
Latin America Social NetworkingLatin America Social Networking
Latin America Social Networking
 
Infographic: Fixed and Mobile Network Traffic H2 2012
Infographic: Fixed and Mobile Network Traffic H2 2012Infographic: Fixed and Mobile Network Traffic H2 2012
Infographic: Fixed and Mobile Network Traffic H2 2012
 
Here's why data is the new mantra in Latin America
Here's why data is the new mantra in Latin AmericaHere's why data is the new mantra in Latin America
Here's why data is the new mantra in Latin America
 
Latin America 2013 Telecommunications Market Key Statistics
Latin America 2013 Telecommunications Market Key StatisticsLatin America 2013 Telecommunications Market Key Statistics
Latin America 2013 Telecommunications Market Key Statistics
 
2009 IBC VAS Mobile Forum LATAM
2009 IBC VAS Mobile Forum LATAM2009 IBC VAS Mobile Forum LATAM
2009 IBC VAS Mobile Forum LATAM
 
2009 Telecom Outlook
2009 Telecom Outlook2009 Telecom Outlook
2009 Telecom Outlook
 
iPhone For LATAM
iPhone For LATAMiPhone For LATAM
iPhone For LATAM
 
Voice Mail Strategy Chile
Voice Mail Strategy ChileVoice Mail Strategy Chile
Voice Mail Strategy Chile
 
Instant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenuesInstant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenues
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Key Trends and Opportunities in Business Mobility and Enterprise Communications

  • 1. Key Trends and Opportunities in Business Mobility and Enterprise Communications
  • 2. 1 Key Trends in 2011 Rise of Handheld Computers BYOD “Bring Your Own Device” The Consumerization of Enterprise IT Key Challenges for IT Meeting User Expectations Increased Support and Maintenance Costs New Security and Compliance Risks The Options for IT Factors to Consider Approaches To Consumerization Enterprise Mobilization Strategy Conclusions and Final Remarks 2 3 4 Agenda
  • 3. 1 Key Trends in 2011
  • 4.
  • 5. Three Key Trends In 2011 1 Smartphones and tablets are the new PC Consumers are adopting smartphones faster than just about any other tech product in history. 2 Bring Your Own Device is changing how we work Employees now expect to be able to use the smartphones and tablets they bought for personal use. 3 Consumer Technology is influencing the enterprise Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.
  • 6. 75% 61% 95% US corporations where employees use tablets for work purposes. Strategy Analytics via PCWorld April 2011 Information Workers Using Self-purchased Technology For Work IDC survey of IT Consumerization Trends March 2011 Enterprises with 'Bring Your Own Device' policies Aberdeen data via ZDNet March 2011
  • 7. “ Employers don’t know how many or what consumer technologies are in use. Workers report using consumer devices attwice the rateemployers reported. Survey of IT Consumerization Trends IDC, March 2011
  • 8. 2 Key Challenges for IT
  • 9. Key Challenges For IT 1 Shift to a more consumer-oriented IT focus IT needs to bridge the growing gap between employee and IT interests. 2 Consumerization can increase IT costs dramatically. An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly. 3 New security and compliance risks Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.
  • 10. “ IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.
  • 11. 3 The Options for IT
  • 12. Factors To Consider Security Requirements Does the company work with sensitive data? Is the company risk-averse? Industry compliance and regulation Mobility Desktop Computer VS Mobile Devices Can mobile applications help the company ’s employees, customers, and value and supply chain partners? What functionalities does each user group need mobilized? What device types, capabilities and hardware need to be enabled? Company Culture Tech-savy VS Tech-challenged Flexible working culture that allows home office work
  • 13. Approaches To Consumerization Companyowned High BYOD Consumerization Security Risks High Low Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)
  • 14. “ The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service. Magic Quadrant for PC Configuration Life Cycle Management Tools Gartner, January 2011
  • 15. 4 Conclusions and Final Remarks
  • 16. Enterprise Mobility Initiatives Support more smartphones, tablets, and other devices Deploymobile applications Establishmobility policies Securedata from criminals, malware and other threats Offerthe sort of technology experience users have come to expect from consumer technologies
  • 17. “ CIOs must get ahead of the curve by coming to terms with what is valuable about consumerization. Handled properly, it can increase productivity and even lower IT costs. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010
  • 18. Thank You Raul Castanon-Martinez http://www.linkedin.com/in/rcastanon http://newchannelbuzz.com/ http://twitter.com/newchannelbuzz
  • 19. “ Companies that make the shift to consumer-oriented IT will see real benefits in the form of lower costs and happier, more productive employees. Companies that don’tface a future in which employees will do it stealthily, leading to technological chaos and security issues. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010

Notas do Editor

  1. The smartphone revolution of the last three years has changed how mobile workers operate.
  2. Consumers are adopting smartphones faster than just about tech product in history.Smartphones will exceed 420 million devices in 2011, nearly 28% of the global handset market.(IMS Research, http://imsresearch.com/press-release/Global_Smartphones_Sales_Will_Top_420_Million_Devices_in_2011_Taking_28_Percent_of_all_Handsets_According_to_IMS_Research)More than likely, these devices are already being brought into the workplace.New information technology is emerging first in the consumer market and then spreading into business organizations
  3. A recent IDC survey found that 95% of respondents have used technology they purchased themselves for work. (“Consumerization of IT: 95% of Information Workers Use Self-Purchased Technology for Work”http://www.readwriteweb.com/enterprise/2011/03/consumerization-of-it-95-of-in.phpAccording to Aberdeen data (from late 2010 and 2011 surveys), almost 75% of companies allow employee-owned smartphones and/or tablets to be used at work. 25% give employees a whitelist of allowed devices and almost half let employees bring in and use any device.(“75% of Enterprises Have 'Bring Your Own Device' Policies. What That Means” http://www.zdnet.com/blog/sybase/75-of-enterprises-have-bring-your-own-device-policies-what-that-means-charts/1025), via Simply Security Report: ‘BYOD’ is changing workplaces http://www.simplysecurity.com/2011/06/09/report-byod-consumerization-is-changing-workplaces/A report from Strategy Analytics shows that 61% of U.S. corporation have found that their employees are already using tablets for work purposes(“Ready or not, iPad, other tablets are in the enterprise”, http://www.pcworldme.net/2011/04/15/ready-or-not-ipad-other-tablets-are-in-the-enterprise/)
  4. It is clear that there is a disconnect between employees and employers about how consumer technologies are used in the enterprise.95% of employees use self-purchased technologies for work, 70% employers want to buy standardized technologies for them.
  5. A consumer-oriented IT focus is more than just aiming to please the end user but rather, leveraging new technologies to improve employee productivity and reduce IT costs. Mobile professionals spend time away from their desk and require tools that will let them do their job: field sales, field service, production, consultants, managers. The question is how can IT create the right environment for them?Increased IT costs - One of the reasons IT might be unwilling to allow personal devices are the added support and maintenance costs due to increased complexity caused by more heterogeneous computing environments. In addition, there is the possibility to go overboard and try to compete with consumer products through the development of “consumer-oriented” services and applications.
  6. End users and technology are pulling the organization one way and security needs, compliance are pulling the other way.
  7. SecuritySensitive data – depends on the industry, for example retail, health care, finance may demand privacy and a higher level of security requirements than other industriesIndustry compliance – a complex legal and compliance environment require a higher level of security
  8. Possible scenarios:Traditional approach (seal off corporate IT) = Low IT Security Risks, Low User Freedom / Consumerization, essentially banning the use of consumer-oriented IT and personal devices at work.Open environment = High IT Security Risks, High User Freedom / ConsumerizationThe opposite scenario would be opening the organization with a computing environment that is easily accessed and user-determined.Take no action = Ignore IT consumerization altogether. This has the potential to shift to High IT Security Risks as the end user will tend to move towards “BYOD” and eventually to “self configuration”Ideally, the organization should move toward high consumerization / low security risks, either through company owned or BYOD, providing high mobility to employees that can benefit from itAdditional scenarios:BYOD + corporate apps, BYOD + corporate desktop = Low IT Security Risks, High User Freedom
  9. MagicQuadrant reference interviews revealed that consumerization is the No. 2 challenge they faced in2010; consumerizationwasn't in the top five last year. The advent of the iPad is the catalyzing factor, surveysshow that somewhere between 50% and 75% of desktop groups have received requests foriPad support.The iPad in the enterprise phenomenon has also driven users to request support for new handheld devices, such as the iPhone or the Android phone, leading enterprises to support a greater variety of devices. The primary mobile device management (MDM) concern is dataprotection. IT organizations want to ensure that user data is secure if the device is lost or stolen.Organizations are starting to treat smartphones (and now tablets) the same way they treat PCs.Systems Infrastructure SoftwareChange and Configuration Management Software (CCM)Secure Content and Threat Management (SCTM)Security and Vulnerability Management Software (SVM)Problem Management Software (PM)Application and User Session Virtualization (AV)Security Products and ServicesSecurity information and event management (SIEM)Proactive endpoint risk management (PERM )Forensics and incident investigation (FII)Policy and complianceSecurity systems and configuration management (SSCM)Device vulnerability assessment (VA), Application vulnerability assessment (VA )
  10. The smartphone revolution of the last three years has changed how mobile workers operate.
  11. The Evolution of Enterprise Mobility, Pyxis Mobile 2011Enterprises are leveraging mobility to improve operations and how they interact with customers, employees and suppliers