SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
About	
  VDC	
  Research	
  




   VDC	
  is	
  a	
  leading	
  technology	
  research	
  company.	
  	
  
                                                               	
  
   We	
  help	
  our	
  clients	
  understand	
  the	
  rapidly	
  changing	
  dynamics	
  of	
  the	
  markets	
  they	
  	
  
             participate	
  in	
  so	
  they	
  can	
  make	
  more	
  informed	
  business	
  decisions.	
  
                                                               	
  	
  
                                                               	
  




                   AutoID	
  	
        Mobile	
  &	
  Wireless	
     Embedded	
  Hardware	
     Embedded	
  Software	
  
                                                                         &	
  Systems	
  	
          &	
  Tools	
  
                        	
  	
                     	
  	
  
                                                                                                             	
  




                                                                                                   © 2012 VDC Research Group, Inc.
                                                                                                                Mobile & Wireless    1	
  
 vdcresearch.com
Let’s Talk!

•  Opportunities and benefits of taking
   your workforce mobile

•  Overview of the enterprise-grade
   solutions that have emerged to secure
   mobile applications and manage the
   application lifecycle

•  How to balance securing mobile
   devices without risk or adversely
   impacting the user experience
BYOD

                         © 2012 VDC Research Group, Inc.
                                      Mobile & Wireless    3	
  
vdcresearch.com
Do	
  you	
  allow	
  
personally	
  owned	
  
devices	
  on	
  your	
  
network?
The	
  Way	
  we	
  Work	
  is	
  Changing	
  …	
  

                                                       Telework


                               Choice                                 Hoteling




                     Mobile                                                      Cloud




                                                                       Virtual
                               Unified
                                                                      Desktop

                                                      Collaboration



                                                                                  © 2012 VDC Research Group, Inc.
                                                                                               Mobile & Wireless    5	
  
 vdcresearch.com
BYOD	
  Brings	
  both	
  Challenges	
  and	
  Opportunities	
  in	
  the	
  Enterprise	
  

        Does	
  your	
  organization	
  currently	
  support	
  or	
  plan	
  
                 to	
  support	
  a	
  BYOD	
  mobile	
  policy*?	
  	
  
                                                                                                      (% Respondents, n=238)


                                                         11%

                                                                                                 27%

                                                                                                                               Yes, currently have a BYOD policy in place
                                                                                                                              Yes, plan to implement a BYOD policy
                                                                                                                              No
                                 33%
                                                                                                                              Don't know / not sure




                                                                                        28%




                   *By	
   mobile	
   policy,	
   we	
   mean	
   specific	
   guidelines	
   that	
   have	
   been	
   put	
   in	
   place	
   and	
   are	
   typically	
  
                   enforced	
   by	
   your	
   IT	
   organization	
   around	
   the	
   provisioning	
   of	
   applications,	
   device	
   management,	
  
                   and	
  technical	
  support	
  of	
  employee-­‐owned	
  mobile	
  devices	
  in	
  the	
  workplace.


                                                                                                                                                            © 2012 VDC Research Group, Inc.
                                                                                                                                                                         Mobile & Wireless    6	
  
 vdcresearch.com
32 %
of companies have zero tolerance for personal devices




                                    1in3
                      employees admitted to violating the policy


                                                   ZK Research
SWOT	
  Analysis:	
  BYOD	
  




 	
  	
  	
  Strengths	
  
 	
                                                                        	
  	
  	
  Weaknesses	
  
        §  Hardware cost savings and ROI                                  §  System integration and interoperability challenges
        §  SW licensing cost savings                                      §  Concerns over user habits/work style
        §  On-the-go connectivity for a mobile workforce                  §  Mobile enablement brings the need for additional security/
        §  The incoming workforce (Gen Y and millennials are                  policies
            well-equipped and technologically savvy)                       §  The “Shiny new device” syndrome – CIOs are pressured
                                                                               to keep up with employee expectations




                                     The	
  “Mobile	
  Enabled”	
  Enterprise	
  
 	
  	
  	
  Opportunities	
                                               	
  	
  	
  Threats	
  
 	
  


        §  Mobile AD tools are more IT friendly, bringing a significant   §  Increasing security risks (data leakage, malware, resource
            opportunity for custom developed mobile apps                       and service availability abuse)
        §  Mobile brings an opportunity for increased collaboration       §  Lines can blur between “work” and “personal” and impact
            and ideation                                                       productivity and potentially lead to “burnout”
        §  Work/life balance can be enhanced with greater access to       §  Financial risk to potential exposure to unauthorized access
            corporate data via mobile platforms                                to corporate resource (data)
        §  ISVs have brought cost-effective and proven tools to the       §  Moving forward, MNCs with mobile enabled employees
            market to manage devices and applications                          who frequently travel outside of their home state will need
                                                                               to track tax and visitation compliance




                                                                                                                © 2012 VDC Research Group, Inc.
                                                                                                                             Mobile & Wireless    8	
  
        vdcresearch.com
Allowing	
  personally	
  
owned	
  devices	
  on	
  
your	
  network	
  can	
  …	
  
MAM:	
  Lifting	
  the	
  Barriers	
  of	
  Mobile	
  Application	
  Enablement	
  



                                                      Analytics to Identify
                                                        Usage Patterns


                          “Social” Elements to Rate                           Sandboxing Apps via a
                            & Recommend Apps                                    Secure Container




              Application Level DLP                                                         Version Control
               via “App Wrapping”                                                           & Management




        Whitelist / Blacklist                                                                   App Catalogs to Curate
           Capabilities                                                                          Custom/Trusted Apps




    Establish / Enforce                                                                                App Decommission
     Mobile Policies                                                                                  End-of-Life / Data Wipe




                                                                                                   © 2012 VDC Research Group, Inc.
                                                                                                                Mobile & Wireless    10	
  
 vdcresearch.com
App	
  lifecycle	
  gets	
  Apps	
  from	
  [dev]	
  to	
  [device]	
  




              Acquiring Apps"

                                    Understanding App behavior"

                                                         Securing mobile apps"

                                                                          Managing all aspects"
                                                                                     Deploying over-the-air"



                                                  MAM
Does	
  your	
  company	
  
currently	
  use	
  (or	
  plan	
  to)	
  
an	
  enterprise	
  app	
  store	
  
to	
  manage	
  and	
  deploy	
  
mobile	
  applications?	
  
Awareness	
  of	
  the	
  “App	
  Store	
  for	
  Business”	
  is	
  Rising	
  ….	
  


          Does	
  your	
  company	
  currently	
  use,	
  or	
  plan	
  	
           What	
  is	
  your	
  organization's	
  approximate	
  
          to	
  deploy,	
  a	
  solution	
  such	
  as	
  an	
  enterprise	
  	
      timeframe	
  for	
  deploying	
  an	
  enterprise	
  
              app	
  store	
  to	
  help	
  manage	
  and	
  deploy	
  	
                                    app	
  store?	
  
                           mobile	
  applications?	
                                               (% Respondents, n=90)
                            (% Respondents, n=238)


                                                                                                       8%
                                                                                                                     14%
                       16%                         17%


                                                                                      23%



          29%
                                                        38%
                                                                                                                        54%



         Yes, we currently use an enterprise app store                                               < 6 months
         Yes, we plan to deploy an enterprise app store                                              6 months - 1 year
         No                                                                                          More than 1 year
         Don't know                                                                                  Don't know



                                                                                                              © 2012 VDC Research Group, Inc.
                                                                                                                           Mobile & Wireless    13	
  
 vdcresearch.com
Q&	
  A	
  




                                 Q	
  &	
  A	
  
        Thank	
  you	
  for	
  joining	
  our	
  
                  webcast!	
  	
  
                                          	
  
          For	
  recap	
  blog	
  post	
  with	
  free	
  download	
  of	
  
                  Apperian	
  Vendor	
  Spotlight	
  visit:	
  
                           Apperian.com/blog	
  
                                         	
  
                                         	
  

Mais conteúdo relacionado

Mais procurados

2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprexKim Aarenstrup
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transitionCisco Canada
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessChris Silva
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnSandy Kemsley
 
Enterprise Appstore webinar FEB13
Enterprise Appstore webinar FEB13Enterprise Appstore webinar FEB13
Enterprise Appstore webinar FEB13Peter J. Melander
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Emerging trends in the Software Industry
Emerging trends in the Software IndustryEmerging trends in the Software Industry
Emerging trends in the Software IndustryMichael Fauscette
 
UC Mobility Guide
UC Mobility GuideUC Mobility Guide
UC Mobility GuideLanair
 
Servion Presentation 20 April 2011
Servion Presentation 20 April 2011Servion Presentation 20 April 2011
Servion Presentation 20 April 2011Peter Borup Jakobsen
 
Six steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceSix steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceInka Traktman
 
Mobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneMobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneGlen Koskela
 
Pavel burba cisco_pre_final
Pavel burba cisco_pre_finalPavel burba cisco_pre_final
Pavel burba cisco_pre_finalmoldovaictsummit
 

Mais procurados (18)

2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transition
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile Business
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, Tallinn
 
Enterprise Appstore webinar FEB13
Enterprise Appstore webinar FEB13Enterprise Appstore webinar FEB13
Enterprise Appstore webinar FEB13
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
Emerging trends in the Software Industry
Emerging trends in the Software IndustryEmerging trends in the Software Industry
Emerging trends in the Software Industry
 
UC Mobility Guide
UC Mobility GuideUC Mobility Guide
UC Mobility Guide
 
Servion Presentation 20 April 2011
Servion Presentation 20 April 2011Servion Presentation 20 April 2011
Servion Presentation 20 April 2011
 
Six steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceSix steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforce
 
Mobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneMobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial Tone
 
Pavel burba cisco_pre_final
Pavel burba cisco_pre_finalPavel burba cisco_pre_final
Pavel burba cisco_pre_final
 
Set the style
Set the styleSet the style
Set the style
 
Success Story Iphone Draft V3
Success Story Iphone Draft V3Success Story Iphone Draft V3
Success Story Iphone Draft V3
 
Top5 it-predictions-v2
Top5 it-predictions-v2Top5 it-predictions-v2
Top5 it-predictions-v2
 

Semelhante a Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle Management

Situational Awareness for Complex Environments
Situational Awareness for Complex EnvironmentsSituational Awareness for Complex Environments
Situational Awareness for Complex EnvironmentsVDC Research Group
 
Thought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMThought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMSolarWinds
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloudKamesh Pemmaraju
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochuremartgroot
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaborationSvetlana Belyaeva
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsLars Bodenhoff
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11mcini
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]kgbacdd
 

Semelhante a Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle Management (20)

BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
Situational Awareness for Complex Environments
Situational Awareness for Complex EnvironmentsSituational Awareness for Complex Environments
Situational Awareness for Complex Environments
 
Thought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMThought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDM
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloud
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochure
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 

Mais de Apperian

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian WebinarApperian
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesApperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 

Mais de Apperian (19)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle Management

  • 1. About  VDC  Research   VDC  is  a  leading  technology  research  company.       We  help  our  clients  understand  the  rapidly  changing  dynamics  of  the  markets  they     participate  in  so  they  can  make  more  informed  business  decisions.         AutoID     Mobile  &  Wireless   Embedded  Hardware   Embedded  Software   &  Systems     &  Tools             © 2012 VDC Research Group, Inc. Mobile & Wireless 1   vdcresearch.com
  • 2. Let’s Talk! •  Opportunities and benefits of taking your workforce mobile •  Overview of the enterprise-grade solutions that have emerged to secure mobile applications and manage the application lifecycle •  How to balance securing mobile devices without risk or adversely impacting the user experience
  • 3. BYOD © 2012 VDC Research Group, Inc. Mobile & Wireless 3   vdcresearch.com
  • 4. Do  you  allow   personally  owned   devices  on  your   network?
  • 5. The  Way  we  Work  is  Changing  …   Telework Choice Hoteling Mobile Cloud Virtual Unified Desktop Collaboration © 2012 VDC Research Group, Inc. Mobile & Wireless 5   vdcresearch.com
  • 6. BYOD  Brings  both  Challenges  and  Opportunities  in  the  Enterprise   Does  your  organization  currently  support  or  plan   to  support  a  BYOD  mobile  policy*?     (% Respondents, n=238) 11% 27% Yes, currently have a BYOD policy in place Yes, plan to implement a BYOD policy No 33% Don't know / not sure 28% *By   mobile   policy,   we   mean   specific   guidelines   that   have   been   put   in   place   and   are   typically   enforced   by   your   IT   organization   around   the   provisioning   of   applications,   device   management,   and  technical  support  of  employee-­‐owned  mobile  devices  in  the  workplace. © 2012 VDC Research Group, Inc. Mobile & Wireless 6   vdcresearch.com
  • 7. 32 % of companies have zero tolerance for personal devices 1in3 employees admitted to violating the policy ZK Research
  • 8. SWOT  Analysis:  BYOD        Strengths          Weaknesses   §  Hardware cost savings and ROI §  System integration and interoperability challenges §  SW licensing cost savings §  Concerns over user habits/work style §  On-the-go connectivity for a mobile workforce §  Mobile enablement brings the need for additional security/ §  The incoming workforce (Gen Y and millennials are policies well-equipped and technologically savvy) §  The “Shiny new device” syndrome – CIOs are pressured to keep up with employee expectations The  “Mobile  Enabled”  Enterprise        Opportunities        Threats     §  Mobile AD tools are more IT friendly, bringing a significant §  Increasing security risks (data leakage, malware, resource opportunity for custom developed mobile apps and service availability abuse) §  Mobile brings an opportunity for increased collaboration §  Lines can blur between “work” and “personal” and impact and ideation productivity and potentially lead to “burnout” §  Work/life balance can be enhanced with greater access to §  Financial risk to potential exposure to unauthorized access corporate data via mobile platforms to corporate resource (data) §  ISVs have brought cost-effective and proven tools to the §  Moving forward, MNCs with mobile enabled employees market to manage devices and applications who frequently travel outside of their home state will need to track tax and visitation compliance © 2012 VDC Research Group, Inc. Mobile & Wireless 8   vdcresearch.com
  • 9. Allowing  personally   owned  devices  on   your  network  can  …  
  • 10. MAM:  Lifting  the  Barriers  of  Mobile  Application  Enablement   Analytics to Identify Usage Patterns “Social” Elements to Rate Sandboxing Apps via a & Recommend Apps Secure Container Application Level DLP Version Control via “App Wrapping” & Management Whitelist / Blacklist App Catalogs to Curate Capabilities Custom/Trusted Apps Establish / Enforce App Decommission Mobile Policies End-of-Life / Data Wipe © 2012 VDC Research Group, Inc. Mobile & Wireless 10   vdcresearch.com
  • 11. App  lifecycle  gets  Apps  from  [dev]  to  [device]   Acquiring Apps" Understanding App behavior" Securing mobile apps" Managing all aspects" Deploying over-the-air" MAM
  • 12. Does  your  company   currently  use  (or  plan  to)   an  enterprise  app  store   to  manage  and  deploy   mobile  applications?  
  • 13. Awareness  of  the  “App  Store  for  Business”  is  Rising  ….   Does  your  company  currently  use,  or  plan     What  is  your  organization's  approximate   to  deploy,  a  solution  such  as  an  enterprise     timeframe  for  deploying  an  enterprise   app  store  to  help  manage  and  deploy     app  store?   mobile  applications?   (% Respondents, n=90) (% Respondents, n=238) 8% 14% 16% 17% 23% 29% 38% 54% Yes, we currently use an enterprise app store < 6 months Yes, we plan to deploy an enterprise app store 6 months - 1 year No More than 1 year Don't know Don't know © 2012 VDC Research Group, Inc. Mobile & Wireless 13   vdcresearch.com
  • 14. Q&  A   Q  &  A   Thank  you  for  joining  our   webcast!       For  recap  blog  post  with  free  download  of   Apperian  Vendor  Spotlight  visit:   Apperian.com/blog