08448380779 Call Girls In Friends Colony Women Seeking Men
Key Trends and Opportunities in Business Mobility and Enterprise Communications
1. Key Trends and Opportunities in Business Mobility and Enterprise Communications
2. 1 Key Trends in 2011 Rise of Handheld Computers BYOD “Bring Your Own Device” The Consumerization of Enterprise IT Key Challenges for IT Meeting User Expectations Increased Support and Maintenance Costs New Security and Compliance Risks The Options for IT Factors to Consider Approaches To Consumerization Enterprise Mobilization Strategy Conclusions and Final Remarks 2 3 4 Agenda
5. Three Key Trends In 2011 1 Smartphones and tablets are the new PC Consumers are adopting smartphones faster than just about any other tech product in history. 2 Bring Your Own Device is changing how we work Employees now expect to be able to use the smartphones and tablets they bought for personal use. 3 Consumer Technology is influencing the enterprise Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.
6. 75% 61% 95% US corporations where employees use tablets for work purposes. Strategy Analytics via PCWorld April 2011 Information Workers Using Self-purchased Technology For Work IDC survey of IT Consumerization Trends March 2011 Enterprises with 'Bring Your Own Device' policies Aberdeen data via ZDNet March 2011
7. “ Employers don’t know how many or what consumer technologies are in use. Workers report using consumer devices attwice the rateemployers reported. Survey of IT Consumerization Trends IDC, March 2011
9. Key Challenges For IT 1 Shift to a more consumer-oriented IT focus IT needs to bridge the growing gap between employee and IT interests. 2 Consumerization can increase IT costs dramatically. An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly. 3 New security and compliance risks Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.
10. “ IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.
12. Factors To Consider Security Requirements Does the company work with sensitive data? Is the company risk-averse? Industry compliance and regulation Mobility Desktop Computer VS Mobile Devices Can mobile applications help the company ’s employees, customers, and value and supply chain partners? What functionalities does each user group need mobilized? What device types, capabilities and hardware need to be enabled? Company Culture Tech-savy VS Tech-challenged Flexible working culture that allows home office work
13. Approaches To Consumerization Companyowned High BYOD Consumerization Security Risks High Low Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)
14. “ The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service. Magic Quadrant for PC Configuration Life Cycle Management Tools Gartner, January 2011
16. Enterprise Mobility Initiatives Support more smartphones, tablets, and other devices Deploymobile applications Establishmobility policies Securedata from criminals, malware and other threats Offerthe sort of technology experience users have come to expect from consumer technologies
17. “ CIOs must get ahead of the curve by coming to terms with what is valuable about consumerization. Handled properly, it can increase productivity and even lower IT costs. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010
18. Thank You Raul Castanon-Martinez http://www.linkedin.com/in/rcastanon http://newchannelbuzz.com/ http://twitter.com/newchannelbuzz
19. “ Companies that make the shift to consumer-oriented IT will see real benefits in the form of lower costs and happier, more productive employees. Companies that don’tface a future in which employees will do it stealthily, leading to technological chaos and security issues. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010
Notas do Editor
The smartphone revolution of the last three years has changed how mobile workers operate.
Consumers are adopting smartphones faster than just about tech product in history.Smartphones will exceed 420 million devices in 2011, nearly 28% of the global handset market.(IMS Research, http://imsresearch.com/press-release/Global_Smartphones_Sales_Will_Top_420_Million_Devices_in_2011_Taking_28_Percent_of_all_Handsets_According_to_IMS_Research)More than likely, these devices are already being brought into the workplace.New information technology is emerging first in the consumer market and then spreading into business organizations
A recent IDC survey found that 95% of respondents have used technology they purchased themselves for work. (“Consumerization of IT: 95% of Information Workers Use Self-Purchased Technology for Work”http://www.readwriteweb.com/enterprise/2011/03/consumerization-of-it-95-of-in.phpAccording to Aberdeen data (from late 2010 and 2011 surveys), almost 75% of companies allow employee-owned smartphones and/or tablets to be used at work. 25% give employees a whitelist of allowed devices and almost half let employees bring in and use any device.(“75% of Enterprises Have 'Bring Your Own Device' Policies. What That Means” http://www.zdnet.com/blog/sybase/75-of-enterprises-have-bring-your-own-device-policies-what-that-means-charts/1025), via Simply Security Report: ‘BYOD’ is changing workplaces http://www.simplysecurity.com/2011/06/09/report-byod-consumerization-is-changing-workplaces/A report from Strategy Analytics shows that 61% of U.S. corporation have found that their employees are already using tablets for work purposes(“Ready or not, iPad, other tablets are in the enterprise”, http://www.pcworldme.net/2011/04/15/ready-or-not-ipad-other-tablets-are-in-the-enterprise/)
It is clear that there is a disconnect between employees and employers about how consumer technologies are used in the enterprise.95% of employees use self-purchased technologies for work, 70% employers want to buy standardized technologies for them.
A consumer-oriented IT focus is more than just aiming to please the end user but rather, leveraging new technologies to improve employee productivity and reduce IT costs. Mobile professionals spend time away from their desk and require tools that will let them do their job: field sales, field service, production, consultants, managers. The question is how can IT create the right environment for them?Increased IT costs - One of the reasons IT might be unwilling to allow personal devices are the added support and maintenance costs due to increased complexity caused by more heterogeneous computing environments. In addition, there is the possibility to go overboard and try to compete with consumer products through the development of “consumer-oriented” services and applications.
End users and technology are pulling the organization one way and security needs, compliance are pulling the other way.
SecuritySensitive data – depends on the industry, for example retail, health care, finance may demand privacy and a higher level of security requirements than other industriesIndustry compliance – a complex legal and compliance environment require a higher level of security
Possible scenarios:Traditional approach (seal off corporate IT) = Low IT Security Risks, Low User Freedom / Consumerization, essentially banning the use of consumer-oriented IT and personal devices at work.Open environment = High IT Security Risks, High User Freedom / ConsumerizationThe opposite scenario would be opening the organization with a computing environment that is easily accessed and user-determined.Take no action = Ignore IT consumerization altogether. This has the potential to shift to High IT Security Risks as the end user will tend to move towards “BYOD” and eventually to “self configuration”Ideally, the organization should move toward high consumerization / low security risks, either through company owned or BYOD, providing high mobility to employees that can benefit from itAdditional scenarios:BYOD + corporate apps, BYOD + corporate desktop = Low IT Security Risks, High User Freedom
MagicQuadrant reference interviews revealed that consumerization is the No. 2 challenge they faced in2010; consumerizationwasn't in the top five last year. The advent of the iPad is the catalyzing factor, surveysshow that somewhere between 50% and 75% of desktop groups have received requests foriPad support.The iPad in the enterprise phenomenon has also driven users to request support for new handheld devices, such as the iPhone or the Android phone, leading enterprises to support a greater variety of devices. The primary mobile device management (MDM) concern is dataprotection. IT organizations want to ensure that user data is secure if the device is lost or stolen.Organizations are starting to treat smartphones (and now tablets) the same way they treat PCs.Systems Infrastructure SoftwareChange and Configuration Management Software (CCM)Secure Content and Threat Management (SCTM)Security and Vulnerability Management Software (SVM)Problem Management Software (PM)Application and User Session Virtualization (AV)Security Products and ServicesSecurity information and event management (SIEM)Proactive endpoint risk management (PERM )Forensics and incident investigation (FII)Policy and complianceSecurity systems and configuration management (SSCM)Device vulnerability assessment (VA), Application vulnerability assessment (VA )
The smartphone revolution of the last three years has changed how mobile workers operate.
The Evolution of Enterprise Mobility, Pyxis Mobile 2011Enterprises are leveraging mobility to improve operations and how they interact with customers, employees and suppliers