SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
SybaSe | I DG Playbook


Why Managing
Mobility Matters
	   Device	Management	&	Security	Issues		
	   That	Keep	You	Up	at	Night

           Conventional Wisdom: IT Must
           Manage and Secure Mobility

           The Five Must-Dos
           of Mobile Management

           The Mobile World Is Not the
           Wired World, and Vice Versa

           Tasty baking Company
           Case Study

           Forrester Consulting Study

           What’s Next




                      4      n ext page
                                          Custom Solutions Group
Conventional Wisdom: It Must
Manage and Secure Mobility
A ‘plAtform ApproAch’ yields control And Agility for
hArried mAnAgers

                                     Shifting mobile landscape screams, ‘Manage me!’                      many it groups are now being asked to provide broad access
Conventional Wisdom:                 not too long ago, business support of mobile workers centered        to networks, databases and critical enterprise applications on
IT Must Manage and Secure                                                                                 iphones, BlackBerrys and a myriad devices powered by Windows
                                     on managing the use of a limited number of Windows-based
Mobility
                                     laptops and BlackBerry smartphones. today mobile phones are          mobile, as well as many cell phones and smartphones from
                                     ubiquitous for almost all employees, and it departments are          manufacturers such as motorola, nokia and samsung running
The Five Must-Dos of Mobile
Management                           being asked to manage, support and figure out how to protect         on google’s Android and the symbian os.
                                     data from theft and security breaches.
The Mobile World Is Not the                                                                               ‘Secure me, too!’
Wired World, and Vice Versa          comscore recently reported that smartphone use in the U.s.           security is top of mind for anyone considering mobile
                                     increased to 33.7 million in August 2009, up from 20.7 million       management. in a report issued in march 2009, market research
Tasty baking Company                 only a year earlier. touch screen phones increased to 23.8 million   firm idc observed, “in the rush to capitalize on the opportunity
Case Study                           for the same period, up 159 percent from the year-earlier figure,
                                     9.2 million.                                                              Smartphone and touch screen phone
Forrester Consulting Study                                                                                     usage has increased over the past year.
                                     Just from July through september of 2009, there was a                     (numbers in millions)
What’s Next                          relentless parade of new smartphone announcements,
                                     including the BlackBerry curve 8520, htc tattoo, lg gW880,
                                                                                                                                              20.7       august 2008
                                                                                                               Smartphone
                                     motorola cliQ, nokia 5230 and n900, palm pixi and sony                                                                  33.7      august 2009
                                     ericsson XperiA X2, to name a few.

                                     it departments, many of which are budget-constrained to                                        9.2    august 2008
                                     begin with, are expected to ensure the security of increasing             touch screen
                                                                                                                    phones                         23.8    august 2009
                                     numbers and types of portable systems and figure out a way

324                                  to manage their use not only in the corporate environment but
                                     also at home and on the go.
                                                                                                              Source: Comscore, november 3, 2009




SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
for improved efficiency and profits, businesses have moved to        risks such as unauthorized access to networks. data breaches,
Conventional Wisdom:
IT Must Manage and Secure                      leverage email and im applications on mobile devices; security,      regardless of how they happen, are increasingly expensive, cost-
Mobility                                       it seems, is an afterthought that is not integrated into certain     ing businesses $202 per customer record on average, according
                                               devices. consequently, even companies that are aware of the          to an annual report from the ponemon institute. “more than
The Five Must-Dos of Mobile                    danger and looking to secure mobile devices may lack solutions       88% of all cases in this year’s study involved insider negligence,”
Management                                     to address the issue.”                                               the report says, “and 35% of all cases in this year’s study involved
                                                                                                                    lost or stolen laptops or other mobile data-bearing devices.”
The Mobile World Is Not the                    “Because of their form factor, mobile devices are an easy target,”
Wired World, and Vice Versa
                                               says matt carrier, an enterprise mobility consultant with
                                                                                                                    The Privacy Rights Clearinghouse has
                                               sybase, which provides software and services for mobilizing
Tasty baking Company
Case Study
                                               information. “many companies extend corporate e-mail systems         documented that more than 340 million
                                               and documents to mobile devices, but there’s no telling what
                                               kind of confidential corporate data is on those devices.”            private records containing sensitive
Forrester Consulting Study
                                                                                                                    personal information have been involved
                                               security is just one element of mobility management. it
What’s Next
                                               departments are being asked to provide users of mobile               in security breaches in the U.S. since
                                               devices with access to networks and enterprise applications
                                               such as crm and erp, ensure that Vpns and antivirus software
                                                                                                                    January 2005—a number greater than
                                               are utilized and prevent the loss or abuse of corporate data.        the entire U.S. population.

                   Data breaches                                    today’s smartphones feature as much             Although the largest breaches involved hackers’ gaining access
                                                                    storage as yesterday’s laptops, with            to corporate databases, the organization has gathered informa-
                   $202             Cost to business
                                    per customer record
                                                                    gigabytes of internal memory and often          tion about hundreds of stolen or lost laptops.
                                                                    the ability to use tiny storage cards that
                                                                    can hold gigabytes of data. plus, most
                   88%              Breaches involving                                                              loss or disclosure of data stored on mobile devices could result
                                    insider negligence              new devices feature both Wifi and               in some companies being in noncompliance with federal or
                                                                    Bluetooth radios that can provide a             state privacy or financial oversight laws and regulations. for
                                    Breaches involving
                   35%              lost or stolen
                                                                    gateway to unauthorized access to
                                                                    corporate networks and information.
                                                                                                                    example, sarbannes-oxley (soX) penalties can run as much
                                                                                                                    as $1 million a day for unauthorized disclosure of financial
                                    mobile device
                   Source: ponemon Institute
                                                                                                                    information.
                                                                    The perils of inaction
                                               the power and storage of handheld devices and their ability          employee devices can be infected with malware such as
                                               to transfer digital information are tremendous liabilities if an     viruses and worms, which can be introduced into the corpo-


334                                            organization isn’t able to manage their use and security:
                                               devices can be lost or stolen, exposing a business to potential
                                                                                                                    rate network, resulting in steep costs to clean up the mess. in
                                                                                                                    a hallmark 2007 study, computer economics estimated that


SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
the worldwide cost of malware infections in 2006 totaled             for many companies, the introduction of the Apple iphone
Conventional Wisdom:
                                      $13.3 billion in damages, including labor costs to analyze, repair   decimated efforts to limit the use of mobile devices. for
IT Must Manage and Secure
Mobility                              and cleanse infected systems; loss of user productivity; loss of     many executives and information workers, it was a must-have
                                      revenue due to loss or degraded performance of a system; and         item even though enterprise security and manageability were
The Five Must-Dos of Mobile           other costs incurred directly as the result of a malware attack.     major it concerns at its initial introduction and remain so
Management                                                                                                 despite the strides Apple has taken to make its device more
                                      Pitfalls aplenty                                                     business-friendly.
The Mobile World Is Not the           the entry of consumer devices into the enterprise is driving
Wired World, and Vice Versa                                                                                “things quickly get out of control when the default action of
                                      rapid change. many organizations have concluded that it is less
                                      costly to support workers who buy their own authorized devices       the iphone is to do a backup when connected to itunes,” says
Tasty baking Company
                                      from third parties, such as the major wireless vendors, than to      carrier, who notes that microsoft exchange data is stored in
Case Study
                                      try to mandate use of corporate-owned devices. others give in        unencrypted databases on that device. “your corporate data
                                      to demands from executives and business departments to               could be backed up on your employee’s home pc—well beyond
Forrester Consulting Study
                                       accommodate readily available devices that provide access           the reach of the it department.”
                                      to new features that are impractical to create with in-house
What’s Next
                                      resources. the result is a proliferation of device types that must   Another complication is the need to coordinate a myriad of
                                      be accommodated in a corporate infrastructure.                       services and software providers, which becomes more complex
                                                                                                           as more devices are supported. rather than try to implement a
                                                                                                           series of point products to manage different components, many
                                                                                                           organizations today are opting for a “platform approach” in
                                                                                                           which one vendor provides foundation software that enables
                                                                                                           all devices and applications to interoperate.

                                                                                                           a device-agnostic solution
                                                                                                           A significant benefit of a platform approach is the ability to
                                                                                                           provide a central management console. sybase’s industry-
                                                                                                           leading mobility management solution ensures that mobile
                                                                                                           data and devices on both corporate and personally owned
                                                                                                           devices are up-to-date, reliable and secure. this gives technical
                                                                                                           staff the ability to manage and secure all mobile device types
                                                                                                           across the enterprise.

                                                                                                           illustrating some of the capabilities for dealing with evolving
                                                                                                           challenges of mobility, sybase tools simplify the complexity

344                                                                                                        of managing the entire mobile enterprise, including the


SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
ability to restrict the use of the a device’s Web browser, limit
Conventional Wisdom:
IT Must Manage and Secure             access to specific Web sites such as youtube or hotmail,
Mobility                              allow or disallow specific applications and even disallow
                                      screen captures and use of the camera. sybase’s mobility
The Five Must-Dos of Mobile           management solution provides the best protection against
Management                            security threats and compliance issues. A multitenant option
                                      enables service providers to offer hosted management
The Mobile World Is Not the           capabilities to multiple companies or divisions.
Wired World, and Vice Versa
                                      Addressing the prime concern of security, administrators can
Tasty baking Company
                                      set up remote “time bombs” that automatically wipe out data
Case Study
                                      on a device if it has been inactive for a certain period, which
                                      may indicate that it’s been lost or stolen. Although microsoft
Forrester Consulting Study
                                      exchange provides a “mobile wipe” capability, it’s not reliable if
                                      the device sim card is removed or the device is prevented from
What’s Next
                                      connecting to the network.

                                      Managing change made easy
                                      one big mobile management headache is that users move
                                      around the company or leave for other ventures but take their
                                      devices with them. so sybase’s platform makes it possible to set
                                      and change access rights according to a worker’s profile and can
                                      integrate with Active directory to do so. meanwhile, companies
                                      also come and go via mergers and acquisitions, and according to
                                      carrier, it departments using sybase’s Afaria mobile enterprise
                                      business intelligence software can quickly reconfigure devices
                                      to comply with new mandates and companies can add servers
                                      for scalability.

                                      With businesses increasingly urged to better pursue opportuni-
                                      ties and serve their customers, investing in a platform approach
                                      to mobility enables you to not only support the devices that are
                                      on the market today but also to adapt as the technology and


354
                                      user needs evolve. ►




SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
the Five Must-Dos of Mobile Management
corporAte dAtA integrity mAy Very Well liVe or die By yoUr ABility to ensUre thAt dozens,
hUndreds or perhAps thoUsAnds of moBile deVices Are mAnAged And Used the right WAy.


Conventional Wisdom:
                                                                                                         IDC says it expects the smartphone
IT Must Manage and Secure                                                                                market to grow faster than the overall
Mobility
                                                                                                         mobile market. That means you need to
The Five Must-Dos of Mobile
Management                                                                                               look beyond the immediate demands of
The Mobile World Is Not the
                                                                                                         a line-of-business application and
Wired World, and Vice Versa                                                                              anticipate your future mobile plans.
Tasty baking Company
                                                                                                         2. Plan ahead!
Case Study
                                                                                                         there’s nothing worse than building a great mobile
                                     Follow these five steps, and be on your way to compre-              application only to realize that you’ve forgotten to consider
Forrester Consulting Study           hensive management of the mobile environment.                       how to manage it. you need to plan ahead to determine
                                                                                                         security requirements as well as how to configure, deploy and
What’s Next                          1. Plan to support a broad range of mobile devices.                 update data and devices. this up-front planning will ensure
                                     efforts to keep the genie stuffed in the bottle are likely to be    that your help desk is prepared for requests for assistance.
                                     short-lived at best. market research firm idc recently reported
                                     that worldwide shipments of smartphones reached 43.3 million        3. establish guidelines for all types of users.
                                     units during the third quarter of 2009, a new record for a single   today’s technology makes it easy for employees to take
                                     quarter. Unlike the pc market, which is dominated by one oper-      advantage of almost any mobile device for personal use:
                                     ating system, there is a multitude of smartphone os choices,        visiting consumer Web sites; checking personal e-mail; and
                                     including Apple’s iphone, google’s Android, microsoft’s Win-        storing music, games and other files. it is critical to educate
                                     dows mobile, palm’s Webos, research in motion’s BlackBerry          them on acceptable use and make sure that published poli-
                                     and symbian. the many operating systems are providing con-          cies reflect differences between different types of users—for
                                     sumers and now enterprise users with a wider breadth of appli-      example, access granted to a top executive is likely to be much

364                                  cation options and a distinctly more “friendly” user experience.    broader than that of contractors.



SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
Conventional Wisdom:                  4. leverage tools that make it easy to control                       Setting new mobile phone shipping
IT Must Manage and Secure             device settings and access.                                          records with each quarter.
Mobility                              Unless your company is very small, it’s not feasible to handle                                                43.3
                                      each device physically, so you need technology, processes and
The Five Must-Dos of Mobile           procedures to provision devices, track hardware inventory and                                   41.5 41.9
Management                            software licensing conformance and set up blacklists and/or
                                      whitelists to manage appropriate access to applications and
The Mobile World Is Not the
                                      data. Adopt a system that enables you to centrally manage a
Wired World, and Vice Versa




                                                                                                                  units in millions
                                      broad range of device types from a single interface for added
Tasty baking Company                  simplicity.
Case Study
                                      5. ensure that corporate data is encrypted and
                                      secure.
Forrester Consulting Study
                                      data security is only as strong as its weakest link, and with the
                                      likelihood that mobile devices will be lost or stolen, companies
What’s Next
                                      need assurance that a missing device can’t be exploited.

                                                                                                                                       Q3     Q2     Q3
                                      strong data encryption is a must for data stored on a device                                    2008   2009   2009
                                      and being transmitted over the air. devices and access need         Source: Worldwide Converged Mobile Device (Smartphone) Market
                                                                                                          Continues to Grow Despite Economic Malaise, Says IDC (Nov. 5, 2009).




374
SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
ity
                                       to be protected by strong passwords, and you need the ability              Hear how Duke Univers
Conventional Wisdom:
IT Must Manage and Secure
                                       to lock or wipe lost or stolen devices. one big consideration to           and others are using
Mobility
                                       check: Will your security protections persist if a device is off-          Sybase technology to
                                       network or if its sim card is replaced? ►
                                                                                                                  manage and secure
                                                                                                                                              ).
The Five Must-Dos of Mobile                                                                                       mobile devices (click below
Management

The Mobile World Is Not the
Wired World, and Vice Versa
                                          Click here to listen to an informative Webcast:
Tasty baking Company
                                          The Top 5 Best Practices for Managing Mobility Within Your Enterprise
Case Study

Forrester Consulting Study

What’s Next




384
  SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
the Mobile World Is not the
Wired World, and Vice Versa
JUst ABoUt eVerything inVolVed in mAnAging
moBile deVices is drAmAticAlly different thAn
With stAtionAry, Wired pcs.

                                     When it needs to access or audit a desktop pc, it’s typically a
Conventional Wisdom:                 simple matter to locate and access the computer. But a mobile
IT Must Manage and Secure            device can be unavailable in so many ways: locked in “airplane
Mobility
                                     mode,” left in the back of a taxicab or lying at the bottom of a
                                     stolen handbag.
The Five Must-Dos of Mobile
Management
                                     thus, it’s much more challenging to ensure the integrity of
                                                                                                        needed,” says milja gillespie, a marketing manager with
The Mobile World Is Not the          the data on that remote device as well as to reconfigure it to
                                                                                                        mobile middleware provider sybase. “in today’s market, with
Wired World, and Vice Versa          meet changing organizational needs, administer software
                                                                                                        the introduction of the Apple iphone and google’s Android,
                                     patches and simply keep track of computing assets.
Tasty baking Company                                                                                    companies are supporting a wider range of mobile devices,
Case Study                                                                                              allowing their users to choose the personally owned devices
                                     Whereas business desktops and even                                 they want to use.”
Forrester Consulting Study           laptops are likely to be running a varia-                          After struggling for years to perfect the usability of enterprise
What’s Next                          tion of the Windows operating system                               resource applications, businesses now need to extend resource-
                                                                                                        intensive back-office applications to mobile devices that have
                                     with standard office applications, there                           limited bandwidth, limited processing capabilities and relatively
                                                                                                        small screens and keyboards. oh, and figure out how to remote-
                                     are many more varieties of mobile                                  ly troubleshoot issues with workers whose only communica-
                                     device operating systems to support.                               tions device is the one they’re having trouble with.


                                     “three or four years ago, businesses had pretty much               mobile devices are subject to carrier or contract limitations,

394                                  standardized on the BlackBerry; they thought it was all they       degraded signal quality in particular areas or limited access



SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
to Wifi hotspots—factors that complicate an organization’s
Conventional Wisdom:                  ability to meet application performance and data
IT Must Manage and Secure             transmission speed requirements.
Mobility
                                      Without a management solution in place, it administrators
The Five Must-Dos of Mobile
Management                            are required to physically collect devices and manually per-
                                      form software installations or upgrades one by one. the cost
The Mobile World Is Not the           impact in terms of it resources, shipping costs and loss of field
Wired World, and Vice Versa           worker productivity is significant.

Tasty baking Company
Case Study                            For a small deployment, a hands-on
                                      approach may seem manageable at
Forrester Consulting Study
                                      first, but when the number of users
What’s Next
                                      grows to the hundreds or thousands
                                      and updates are required multiple
                                      times per year, it simply becomes an
                                      impossible task.
                                                             many firms today also face strict regu-      if the problems outlined above sound all too familiar, a mobile
                                                             latory issues and risk significant           devices management and security solution might be just
                                                             penalties in the event of noncompli-         what you need. such solutions provide a range of options
                                                             ance. staying in compliance is much          for dealing with the challenges of managing mobile devices
                                                             easier in a wired world where compli-        through their entire lifecycle, from the initial provisioning
                                                             ance can be centrally monitored and          of a new application to the remote wiping of data when an
                                                             enforced. But what do you do when a          employee is no longer with the firm. ►
                                                             mobile device has slipped between the
                                                             cushions of a couch and has been “lost”
                                                             there for more than a week?




3104
SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
case study :
a Fresher approach to Delivery
tAsty BAKing compAny tUrns to syBAse for neW distriBUtion recipe

                                      tasty Baking company is one of the country’s leading bakers      director of applications at tasty Baking company. “As they
Conventional Wisdom:                  of snack cakes, pies, cookies and doughnuts. founded in 1914,    made their rounds to the numerous outlets on their routes,
IT Must Manage and Secure             the company is a philadelphia institution. it offers more than   the distributors would pull outdated products from the shelves,
Mobility
                                      100 products under the tastykake brand name. over the years,     determine restock requirements, go back out to their trucks to
                                      philadelphia’s hometown secret has spread, and the products      get those products and then wait until a manager was free to
The Five Must-Dos of Mobile
Management                            are now available as far west as cleveland, north to northern    count and verify the delivery by signing a paper form.”
                                      new Jersey, south to northern Virginia
                                                                                                       Creating an application to increase distributors’
The Mobile World Is Not the           and east to the eastern shore of maryland. the company
Wired World, and Vice Versa           distributes its products to convenience stores, supermarkets
                                                                                                       efficiency and profitability
                                                                                                       “What we wanted to do,” says Kang, “was to create an
                                      and other retail outlets across this geographic territory by
Tasty baking Company                                                                                   application for our sales distributors that would help them
                                      using a direct-to-store delivery (dsd) system that is operated
Case Study                                                                                             run their businesses more efficiently and more profitably. We
                                      by more than 450 independent sales distributors.
                                                                                                       wanted this application to automate data capture, including
Forrester Consulting Study                                                                             signature capture and other types of data, and we wanted
                                      “Our vision was to help distributors                             to provide them with a tool that would provide them with a
What’s Next
                                      increase the efficiency of their daily runs
                                      and maximize their profitability.”
                                                       – Chan Kang, director of applications,
                                                                     Tasty Baking Company

                                      Until recently these independent distributors ran their
                                      businesses by using a combination of an outdated dos-based
                                      application and paper records.



34   11
                                      “the old mobile platform that our distributors used was
                                      strictly transactional and text-based,” explains chan Kang,


SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
broad range of information to help them analyze and grow            distributors to quickly and
Conventional Wisdom:                  their businesses—information such as product sales by store         accurately capture data on
IT Must Manage and Secure
                                      and special sales promotions. our vision was an application         product being removed from
Mobility
                                      that would automate delivery and documentation processes            the shelves and products
The Five Must-Dos of Mobile           and improve synchronization with our back-office systems to         being delivered. they are
Management                            help distributors increase the efficiency of their daily runs and   connected via Bluetooth to a
                                      maximize their profitability.”                                      thermal printer to enable the
The Mobile World Is Not the                                                                               distributors to print documents
Wired World, and Vice Versa           As it created its list of application criteria, the company         when required.
                                      met with its intended users—the independent sales
Tasty baking Company                  distributors. there were a few givens: the need to gather           communication between the distributors and tasty Baking
Case Study                            and synchronize transactional information, a desire to improve      company’s back-office systems is via an internet Vpn
                                      operational efficiency and the ability for the company’s it         connection.
Forrester Consulting Study            staff to manage the distributors’ mobile devices from a central
                                                                                                          leveraging Sybase Services to improve
                                      location. still, the tasty Baking company it team wanted to
What’s Next                                                                                               application performance
                                      get direct input from the distributors. including them in the
                                                                                                          After tasty Baking company successfully deployed the route
                                      process did produce a better understanding of the kinds of
                                                                                                          dsd application, it started to discover areas where it could
                                      functionality the distributors would welcome and prepared
                                                                                                          improve the application. one of the first things it did was to
                                      them for the transition to a new application.
                                                                                                          address the need to optimize synchronization between the
                                      Choosing key technologies for building an                           symbol devices and the company’s microsoft sQl server and
                                      application                                                         sAp erp system.
                                      tasty Baking company then turned to an outside software
                                      application vendor to help it create the new route dsd              “it was taking our distributors as long as 18 minutes each
                                           application. With the assistance of this company,              time they wanted to synchronize with our systems,” says
                                                    it created the application, embedding sybase’s        Kang. “this was a bit of a sore point with them, as they had
                                                          Afaria and sQl Anywhere into the                to just wait around for the process to complete. We knew
                                                            application. Afaria enabled tasty             we had to improve the synchronization performance, so we
                                                            Baking company’s it staff to manage           turned to sybase professional services to help us do that.
                                                            the distributors’ symbol devices from a       Working together, we were able to tune mobilink to reduce
                                                           central location. sQl Anywhere provided        the synchronization time for data volumes of up to three
                                                         database and synchronization capabilities.       megabytes from an average of 18 to five minutes per session.
                                      the route dsd application was installed on symbol 9090              this performance improvement was enthusiastically received
                                      handheld devices that were issued to the distributors. these        by our distributors and won us a lot of good will from them.


3124                                  devices are equipped with barcode scanners that enable              With mobilink, our distributors can quickly sync their symbol



SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
devices with our erp system first thing in the morning, at the        wait while the products are counted and continue to wait until
Conventional Wisdom:                  end of their runs or both.”                                           a manager signs various forms acknowledging receipt, which
IT Must Manage and Secure                                                                                   can be quite time-consuming when stores are busy. instead,
Mobility                              enabling scan-based trading                                           our distributors can just walk in the front door of the retail
                                      the new application also includes signature capture func-             establishment, do what they have to do as far as merchandising
The Five Must-Dos of Mobile
                                      tionality, which enables the distributors to capture the store        the shelves and then leave. their time spent at each store is
Management
                                      managers’ or receivers’ signatures digitally in the application       significantly reduced, largely because they don’t have to wait for
The Mobile World Is Not the           and incorporate them into the printed delivery tickets. the           a receiver or store manager to verify the delivery and sign off on
Wired World, and Vice Versa           digital signatures are then electronically transmitted to tasty       it. the stores also like the increased efficiency.”
                                      Baking company as proof of delivery. this alleviates the need
Tasty baking Company                  for the distributors to mail in or deliver the tickets to tasty       ‘The success of route DSD owes a great
Case Study                            Baking company.                                                       deal to Sybase’
                                                                                                            “We’re a bakery,” says Kang, “not a software development
Forrester Consulting Study                                                                                  company, so when we wanted to improve this new route
                                      Signature capture saves the distributors                              dsd application, we knew we couldn’t do it ourselves.
What’s Next                           time and reduces Tasty Baking                                         “it’s clear to us that the success of our route dsd application
                                      Company’s administrative burden.                                      owes a great deal to sybase technology—particularly the
                                                                                                            mobilink synchronization product,” adds Kang. “We really
                                      Although this functionality is very useful, the sybase-powered        couldn’t have implemented scan-based trading without the
                                      route dsd application is enabling tasty Baking company and            functionality we’ve gotten from sybase. sybase’s data syn-
                                      its distributors to move to an even more efficient distribution       chronization platform is very robust and reliable and offers a
                                      and sales model called scan-based trading.                            lot of flexibility. it’s open and enables us to connect to mul-
                                                                                                            tiple databases. it’s also very scalable. it’s enabled us to meet
                                      scan-based trading is a distribution and sales system in which        a lot of immediate business requirements, and we expect
                                      products (in this case, tastykakes) delivered to a store are not      to use mobilink, Afaria and sQl Anywhere to continue to
                                      the property of the store. the products that are delivered to a       enhance the application as we move forward. i would highly
                                      supermarket or convenience store and merchandised on the              recommend sybase to any company planning to deploy mo-
                                      shelves by the independent distributors remains the property          bile applications.” ►
                                      of the distributors until it is sold and scanned by the store’s
                                      register. At that point, and only at that point, the transaction is
                                      reported and the store is invoiced for the product.

                                      “the benefit to our sales distributors,” explains Kang, “is that

3134                                  they don’t have to go to the receiving area and get checked in,



SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
forrester consulting study :
Understanding the Critical role of Device Management
and Security in your business’s Mobile Strategy
HoW IT CaN ProVIDe beTTer MobIlITy SUPPorT To ITS aNyTIMe, aNyWHere WorkerS
DeSPITe a ProlIFeraTIoN oF INCreaSINGly DIVerSe MobIle DeVICeS


                                      executive summary
Conventional Wisdom:                  in January 2009, sybase commissioned forrester consulting to
                                                                                                        More than half of firms support multiple
IT Must Manage and Secure                                                                               operating systems, and 10% have plans to do so.
                                      assess the importance of mobile device management and, in
Mobility
                                      particular, mobile security and the associated issues that keep
The Five Must-Dos of Mobile           cXos up at night.
Management                                                                                                                                      53%
                                      While conducting in-depth interviews with 30 it and telecom/                                           Support
                                                                                                                                          multiple mobile
The Mobile World Is Not the           network decision-makers at north American and Western
                                                                                                                                              oSs, 16
Wired World, and Vice Versa           european companies with 500 or more employees, forrester
                                      found that these it professionals:
Tasty baking Company                                                                                                           10%
                                      n Anticipate that the number of mobile devices they support                                              37%
Case Study                               will continue to increase through 2010, despite the global                                         Support one
                                         economic recession                                             Support one single                 single mobile
Forrester Consulting Study                                                                              mobile oS today                        oS, 11
                                      n recognize that mobile devices need to be managed and
                                         secured in the same way that pcs are today, although           but have plans to
What’s Next                                                                                             support multiple
                                         most admit that they don’t do this yet
                                                                                                        oSs in the future, 3
                                      n Are feeling increased pressure from c-level executives,
                                         line-of-business managers and employees to support more                                             base: 30 senior It managers
                                                                                                                                             involved in mobile device manage-
                                         mobile platforms and even personal mobile devices                                                   ment and security in public and
                                      n prioritize security as the no. 1 consideration when making                                           private organizations in the U.S.
                                         changes to their mobility strategy                                                                  and Western europe


                                                                                                        Source: U.S. and Western european phone survey conducted by Forrester


3144                                                                                                    Consulting and commissioned by Sybase, February and March 2009




SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
key Findings
Conventional Wisdom:
                                      forrester’s study yielded four key findings:
IT Must Manage and Secure
Mobility                              n despite tightening budgets as a result of the
                                         global economic recession, 28 out of the 30 it
The Five Must-Dos of Mobile              professionals interviewed anticipate that the number
Management                               of mobile devices they support will increase
                                         through 2010.
The Mobile World Is Not the           n firms are increasingly embracing more than just one
Wired World, and Vice Versa              mobile platform, making it critical that they invest in tools
                                         that can support mobile devices powered by BlackBerry,
Tasty baking Company
                                         Windows mobile, symbian, mac os X and Windows ce.
Case Study
                                      n With the changing workforce, it is feeling intense pressure
                                         from c-level executives, line-of-business managers and
Forrester Consulting Study
                                         employees to support personal devices and applications,
                                         making security a major concern.
What’s Next
                                      n companies are increasingly investing in mobile device
                                         management and security solutions that will help auto-
                                         mate support tasks, streamline the operations of enterprise
                                         mobility and secure data.

                                      This report is from a commissioned study conducted by
                                      Forrester Consulting on behalf of Sybase.

                                               [ ClICk Here For THe FUll STUDy. ]




3154
SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
What’s next
resoUrces And Action items for yoUr moBile mAnAgement strAtegy

                                      a Checklist of key Moves emerging                                   The 60-Second Mobile Manager
Conventional Wisdom:
IT Must Manage and Secure             from This Playbook                                                  A small sampling of must-see resources on mobile
                                                                                                          management.
Mobility                              4 surge ahead with a multi-os/multi-hardware mangement
                                          and security strategy for Android, BlackBerry, iphone,          In one convenient place, here is a collection of case studies,
The Five Must-Dos of Mobile               nokia, palm, sony, Windows mobile and so on and push            short videos, solutions overviews and other superb mobile
Management                                this project up the list of it priorities before the crush of   management resources.
                                          new devices overwhelms you.
The Mobile World Is Not the                                                                               Tapping the minds of two mobility experts, this Webcast
Wired World, and Vice Versa           4 take the lead in establishing mobile usage guidelines for         offers practical, immediately usable best practices designed
                                          all types of users.                                             to get it started on the road to comprehensive mobile
Tasty baking Company
                                      4 drive home the point to your it staff that the mobile and         management and security.
Case Study
                                          wired or networked world are very different and therefore
                                                                                                          Survey says that both the number and type of mobile
                                          need to be managed and secured with different solutions.
Forrester Consulting Study                                                                                devices seeking it support will continue to soar, the reces-
                                                                                                          sion notwithstanding. read the full report of the incisive
What’s Next                                                                                               study from forrester consulting.




3164
SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS

Mais conteúdo relacionado

Mais procurados

Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Faizal Adiputra
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsVictoria Romero-Gomez
 
Technology Trends 2013
Technology Trends 2013Technology Trends 2013
Technology Trends 2013IMC Institute
 
Information opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesInformation opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesJohn Mancini
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingJay McLaughlin
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business IntelligenceMICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business IntelligenceTwinergy
 
Javier salcedo cloud computing - seserv se workshop june 2012
Javier salcedo   cloud computing - seserv se workshop june 2012Javier salcedo   cloud computing - seserv se workshop june 2012
Javier salcedo cloud computing - seserv se workshop june 2012ictseserv
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesDesiree Miloshevic
 
Next Generation Media Quarterly July 2012
Next Generation Media Quarterly July 2012Next Generation Media Quarterly July 2012
Next Generation Media Quarterly July 2012dentsu
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik HamburgFraunhofer AISEC
 
The New Next: 2011 Moblie Influencers Predictions by TrendsSpotting
The New Next: 2011 Moblie Influencers Predictions by TrendsSpottingThe New Next: 2011 Moblie Influencers Predictions by TrendsSpotting
The New Next: 2011 Moblie Influencers Predictions by TrendsSpottingTaly Weiss
 

Mais procurados (19)

Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of Things
 
Forging A New Path
Forging A New PathForging A New Path
Forging A New Path
 
Technology Trends 2013
Technology Trends 2013Technology Trends 2013
Technology Trends 2013
 
Information opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesInformation opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologies
 
Our top 3 tech trends for 2022
Our top 3 tech trends for 2022Our top 3 tech trends for 2022
Our top 3 tech trends for 2022
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business IntelligenceMICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
 
Javier salcedo cloud computing - seserv se workshop june 2012
Javier salcedo   cloud computing - seserv se workshop june 2012Javier salcedo   cloud computing - seserv se workshop june 2012
Javier salcedo cloud computing - seserv se workshop june 2012
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
 
Next Generation Media Quarterly July 2012
Next Generation Media Quarterly July 2012Next Generation Media Quarterly July 2012
Next Generation Media Quarterly July 2012
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
 
The New Next: 2011 Moblie Influencers Predictions by TrendsSpotting
The New Next: 2011 Moblie Influencers Predictions by TrendsSpottingThe New Next: 2011 Moblie Influencers Predictions by TrendsSpotting
The New Next: 2011 Moblie Influencers Predictions by TrendsSpotting
 

Semelhante a Why Managing Mobility Matters

Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudAntenna Software
 
How Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationHow Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationDigitalDesignsInc
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Att uc newsletter issue 3
Att uc newsletter   issue 3Att uc newsletter   issue 3
Att uc newsletter issue 3Eric Sineath
 
AIIM conference 2012 Presentation
AIIM conference 2012 PresentationAIIM conference 2012 Presentation
AIIM conference 2012 PresentationABBYY
 
AIIM conference 2012
AIIM conference 2012 AIIM conference 2012
AIIM conference 2012 ABBYY
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Technology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai IndustriesTechnology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai IndustriesSoftware Park Thailand
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 

Semelhante a Why Managing Mobility Matters (20)

White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile Cloud
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
How Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationHow Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive Presentation
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Att uc newsletter issue 3
Att uc newsletter   issue 3Att uc newsletter   issue 3
Att uc newsletter issue 3
 
AIIM conference 2012 Presentation
AIIM conference 2012 PresentationAIIM conference 2012 Presentation
AIIM conference 2012 Presentation
 
AIIM conference 2012
AIIM conference 2012 AIIM conference 2012
AIIM conference 2012
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Technology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai IndustriesTechnology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai Industries
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Why Managing Mobility Matters

  • 1. SybaSe | I DG Playbook Why Managing Mobility Matters Device Management & Security Issues That Keep You Up at Night Conventional Wisdom: IT Must Manage and Secure Mobility The Five Must-Dos of Mobile Management The Mobile World Is Not the Wired World, and Vice Versa Tasty baking Company Case Study Forrester Consulting Study What’s Next 4 n ext page Custom Solutions Group
  • 2. Conventional Wisdom: It Must Manage and Secure Mobility A ‘plAtform ApproAch’ yields control And Agility for hArried mAnAgers Shifting mobile landscape screams, ‘Manage me!’ many it groups are now being asked to provide broad access Conventional Wisdom: not too long ago, business support of mobile workers centered to networks, databases and critical enterprise applications on IT Must Manage and Secure iphones, BlackBerrys and a myriad devices powered by Windows on managing the use of a limited number of Windows-based Mobility laptops and BlackBerry smartphones. today mobile phones are mobile, as well as many cell phones and smartphones from ubiquitous for almost all employees, and it departments are manufacturers such as motorola, nokia and samsung running The Five Must-Dos of Mobile Management being asked to manage, support and figure out how to protect on google’s Android and the symbian os. data from theft and security breaches. The Mobile World Is Not the ‘Secure me, too!’ Wired World, and Vice Versa comscore recently reported that smartphone use in the U.s. security is top of mind for anyone considering mobile increased to 33.7 million in August 2009, up from 20.7 million management. in a report issued in march 2009, market research Tasty baking Company only a year earlier. touch screen phones increased to 23.8 million firm idc observed, “in the rush to capitalize on the opportunity Case Study for the same period, up 159 percent from the year-earlier figure, 9.2 million. Smartphone and touch screen phone Forrester Consulting Study usage has increased over the past year. Just from July through september of 2009, there was a (numbers in millions) What’s Next relentless parade of new smartphone announcements, including the BlackBerry curve 8520, htc tattoo, lg gW880, 20.7 august 2008 Smartphone motorola cliQ, nokia 5230 and n900, palm pixi and sony 33.7 august 2009 ericsson XperiA X2, to name a few. it departments, many of which are budget-constrained to 9.2 august 2008 begin with, are expected to ensure the security of increasing touch screen phones 23.8 august 2009 numbers and types of portable systems and figure out a way 324 to manage their use not only in the corporate environment but also at home and on the go. Source: Comscore, november 3, 2009 SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 3. for improved efficiency and profits, businesses have moved to risks such as unauthorized access to networks. data breaches, Conventional Wisdom: IT Must Manage and Secure leverage email and im applications on mobile devices; security, regardless of how they happen, are increasingly expensive, cost- Mobility it seems, is an afterthought that is not integrated into certain ing businesses $202 per customer record on average, according devices. consequently, even companies that are aware of the to an annual report from the ponemon institute. “more than The Five Must-Dos of Mobile danger and looking to secure mobile devices may lack solutions 88% of all cases in this year’s study involved insider negligence,” Management to address the issue.” the report says, “and 35% of all cases in this year’s study involved lost or stolen laptops or other mobile data-bearing devices.” The Mobile World Is Not the “Because of their form factor, mobile devices are an easy target,” Wired World, and Vice Versa says matt carrier, an enterprise mobility consultant with The Privacy Rights Clearinghouse has sybase, which provides software and services for mobilizing Tasty baking Company Case Study information. “many companies extend corporate e-mail systems documented that more than 340 million and documents to mobile devices, but there’s no telling what kind of confidential corporate data is on those devices.” private records containing sensitive Forrester Consulting Study personal information have been involved security is just one element of mobility management. it What’s Next departments are being asked to provide users of mobile in security breaches in the U.S. since devices with access to networks and enterprise applications such as crm and erp, ensure that Vpns and antivirus software January 2005—a number greater than are utilized and prevent the loss or abuse of corporate data. the entire U.S. population. Data breaches today’s smartphones feature as much Although the largest breaches involved hackers’ gaining access storage as yesterday’s laptops, with to corporate databases, the organization has gathered informa- $202 Cost to business per customer record gigabytes of internal memory and often tion about hundreds of stolen or lost laptops. the ability to use tiny storage cards that can hold gigabytes of data. plus, most 88% Breaches involving loss or disclosure of data stored on mobile devices could result insider negligence new devices feature both Wifi and in some companies being in noncompliance with federal or Bluetooth radios that can provide a state privacy or financial oversight laws and regulations. for Breaches involving 35% lost or stolen gateway to unauthorized access to corporate networks and information. example, sarbannes-oxley (soX) penalties can run as much as $1 million a day for unauthorized disclosure of financial mobile device Source: ponemon Institute information. The perils of inaction the power and storage of handheld devices and their ability employee devices can be infected with malware such as to transfer digital information are tremendous liabilities if an viruses and worms, which can be introduced into the corpo- 334 organization isn’t able to manage their use and security: devices can be lost or stolen, exposing a business to potential rate network, resulting in steep costs to clean up the mess. in a hallmark 2007 study, computer economics estimated that SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 4. the worldwide cost of malware infections in 2006 totaled for many companies, the introduction of the Apple iphone Conventional Wisdom: $13.3 billion in damages, including labor costs to analyze, repair decimated efforts to limit the use of mobile devices. for IT Must Manage and Secure Mobility and cleanse infected systems; loss of user productivity; loss of many executives and information workers, it was a must-have revenue due to loss or degraded performance of a system; and item even though enterprise security and manageability were The Five Must-Dos of Mobile other costs incurred directly as the result of a malware attack. major it concerns at its initial introduction and remain so Management despite the strides Apple has taken to make its device more Pitfalls aplenty business-friendly. The Mobile World Is Not the the entry of consumer devices into the enterprise is driving Wired World, and Vice Versa “things quickly get out of control when the default action of rapid change. many organizations have concluded that it is less costly to support workers who buy their own authorized devices the iphone is to do a backup when connected to itunes,” says Tasty baking Company from third parties, such as the major wireless vendors, than to carrier, who notes that microsoft exchange data is stored in Case Study try to mandate use of corporate-owned devices. others give in unencrypted databases on that device. “your corporate data to demands from executives and business departments to could be backed up on your employee’s home pc—well beyond Forrester Consulting Study accommodate readily available devices that provide access the reach of the it department.” to new features that are impractical to create with in-house What’s Next resources. the result is a proliferation of device types that must Another complication is the need to coordinate a myriad of be accommodated in a corporate infrastructure. services and software providers, which becomes more complex as more devices are supported. rather than try to implement a series of point products to manage different components, many organizations today are opting for a “platform approach” in which one vendor provides foundation software that enables all devices and applications to interoperate. a device-agnostic solution A significant benefit of a platform approach is the ability to provide a central management console. sybase’s industry- leading mobility management solution ensures that mobile data and devices on both corporate and personally owned devices are up-to-date, reliable and secure. this gives technical staff the ability to manage and secure all mobile device types across the enterprise. illustrating some of the capabilities for dealing with evolving challenges of mobility, sybase tools simplify the complexity 344 of managing the entire mobile enterprise, including the SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 5. ability to restrict the use of the a device’s Web browser, limit Conventional Wisdom: IT Must Manage and Secure access to specific Web sites such as youtube or hotmail, Mobility allow or disallow specific applications and even disallow screen captures and use of the camera. sybase’s mobility The Five Must-Dos of Mobile management solution provides the best protection against Management security threats and compliance issues. A multitenant option enables service providers to offer hosted management The Mobile World Is Not the capabilities to multiple companies or divisions. Wired World, and Vice Versa Addressing the prime concern of security, administrators can Tasty baking Company set up remote “time bombs” that automatically wipe out data Case Study on a device if it has been inactive for a certain period, which may indicate that it’s been lost or stolen. Although microsoft Forrester Consulting Study exchange provides a “mobile wipe” capability, it’s not reliable if the device sim card is removed or the device is prevented from What’s Next connecting to the network. Managing change made easy one big mobile management headache is that users move around the company or leave for other ventures but take their devices with them. so sybase’s platform makes it possible to set and change access rights according to a worker’s profile and can integrate with Active directory to do so. meanwhile, companies also come and go via mergers and acquisitions, and according to carrier, it departments using sybase’s Afaria mobile enterprise business intelligence software can quickly reconfigure devices to comply with new mandates and companies can add servers for scalability. With businesses increasingly urged to better pursue opportuni- ties and serve their customers, investing in a platform approach to mobility enables you to not only support the devices that are on the market today but also to adapt as the technology and 354 user needs evolve. ► SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 6. the Five Must-Dos of Mobile Management corporAte dAtA integrity mAy Very Well liVe or die By yoUr ABility to ensUre thAt dozens, hUndreds or perhAps thoUsAnds of moBile deVices Are mAnAged And Used the right WAy. Conventional Wisdom: IDC says it expects the smartphone IT Must Manage and Secure market to grow faster than the overall Mobility mobile market. That means you need to The Five Must-Dos of Mobile Management look beyond the immediate demands of The Mobile World Is Not the a line-of-business application and Wired World, and Vice Versa anticipate your future mobile plans. Tasty baking Company 2. Plan ahead! Case Study there’s nothing worse than building a great mobile Follow these five steps, and be on your way to compre- application only to realize that you’ve forgotten to consider Forrester Consulting Study hensive management of the mobile environment. how to manage it. you need to plan ahead to determine security requirements as well as how to configure, deploy and What’s Next 1. Plan to support a broad range of mobile devices. update data and devices. this up-front planning will ensure efforts to keep the genie stuffed in the bottle are likely to be that your help desk is prepared for requests for assistance. short-lived at best. market research firm idc recently reported that worldwide shipments of smartphones reached 43.3 million 3. establish guidelines for all types of users. units during the third quarter of 2009, a new record for a single today’s technology makes it easy for employees to take quarter. Unlike the pc market, which is dominated by one oper- advantage of almost any mobile device for personal use: ating system, there is a multitude of smartphone os choices, visiting consumer Web sites; checking personal e-mail; and including Apple’s iphone, google’s Android, microsoft’s Win- storing music, games and other files. it is critical to educate dows mobile, palm’s Webos, research in motion’s BlackBerry them on acceptable use and make sure that published poli- and symbian. the many operating systems are providing con- cies reflect differences between different types of users—for sumers and now enterprise users with a wider breadth of appli- example, access granted to a top executive is likely to be much 364 cation options and a distinctly more “friendly” user experience. broader than that of contractors. SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 7. Conventional Wisdom: 4. leverage tools that make it easy to control Setting new mobile phone shipping IT Must Manage and Secure device settings and access. records with each quarter. Mobility Unless your company is very small, it’s not feasible to handle 43.3 each device physically, so you need technology, processes and The Five Must-Dos of Mobile procedures to provision devices, track hardware inventory and 41.5 41.9 Management software licensing conformance and set up blacklists and/or whitelists to manage appropriate access to applications and The Mobile World Is Not the data. Adopt a system that enables you to centrally manage a Wired World, and Vice Versa units in millions broad range of device types from a single interface for added Tasty baking Company simplicity. Case Study 5. ensure that corporate data is encrypted and secure. Forrester Consulting Study data security is only as strong as its weakest link, and with the likelihood that mobile devices will be lost or stolen, companies What’s Next need assurance that a missing device can’t be exploited. Q3 Q2 Q3 strong data encryption is a must for data stored on a device 2008 2009 2009 and being transmitted over the air. devices and access need Source: Worldwide Converged Mobile Device (Smartphone) Market Continues to Grow Despite Economic Malaise, Says IDC (Nov. 5, 2009). 374 SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 8. ity to be protected by strong passwords, and you need the ability Hear how Duke Univers Conventional Wisdom: IT Must Manage and Secure to lock or wipe lost or stolen devices. one big consideration to and others are using Mobility check: Will your security protections persist if a device is off- Sybase technology to network or if its sim card is replaced? ► manage and secure ). The Five Must-Dos of Mobile mobile devices (click below Management The Mobile World Is Not the Wired World, and Vice Versa Click here to listen to an informative Webcast: Tasty baking Company The Top 5 Best Practices for Managing Mobility Within Your Enterprise Case Study Forrester Consulting Study What’s Next 384 SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 9. the Mobile World Is not the Wired World, and Vice Versa JUst ABoUt eVerything inVolVed in mAnAging moBile deVices is drAmAticAlly different thAn With stAtionAry, Wired pcs. When it needs to access or audit a desktop pc, it’s typically a Conventional Wisdom: simple matter to locate and access the computer. But a mobile IT Must Manage and Secure device can be unavailable in so many ways: locked in “airplane Mobility mode,” left in the back of a taxicab or lying at the bottom of a stolen handbag. The Five Must-Dos of Mobile Management thus, it’s much more challenging to ensure the integrity of needed,” says milja gillespie, a marketing manager with The Mobile World Is Not the the data on that remote device as well as to reconfigure it to mobile middleware provider sybase. “in today’s market, with Wired World, and Vice Versa meet changing organizational needs, administer software the introduction of the Apple iphone and google’s Android, patches and simply keep track of computing assets. Tasty baking Company companies are supporting a wider range of mobile devices, Case Study allowing their users to choose the personally owned devices Whereas business desktops and even they want to use.” Forrester Consulting Study laptops are likely to be running a varia- After struggling for years to perfect the usability of enterprise What’s Next tion of the Windows operating system resource applications, businesses now need to extend resource- intensive back-office applications to mobile devices that have with standard office applications, there limited bandwidth, limited processing capabilities and relatively small screens and keyboards. oh, and figure out how to remote- are many more varieties of mobile ly troubleshoot issues with workers whose only communica- device operating systems to support. tions device is the one they’re having trouble with. “three or four years ago, businesses had pretty much mobile devices are subject to carrier or contract limitations, 394 standardized on the BlackBerry; they thought it was all they degraded signal quality in particular areas or limited access SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 10. to Wifi hotspots—factors that complicate an organization’s Conventional Wisdom: ability to meet application performance and data IT Must Manage and Secure transmission speed requirements. Mobility Without a management solution in place, it administrators The Five Must-Dos of Mobile Management are required to physically collect devices and manually per- form software installations or upgrades one by one. the cost The Mobile World Is Not the impact in terms of it resources, shipping costs and loss of field Wired World, and Vice Versa worker productivity is significant. Tasty baking Company Case Study For a small deployment, a hands-on approach may seem manageable at Forrester Consulting Study first, but when the number of users What’s Next grows to the hundreds or thousands and updates are required multiple times per year, it simply becomes an impossible task. many firms today also face strict regu- if the problems outlined above sound all too familiar, a mobile latory issues and risk significant devices management and security solution might be just penalties in the event of noncompli- what you need. such solutions provide a range of options ance. staying in compliance is much for dealing with the challenges of managing mobile devices easier in a wired world where compli- through their entire lifecycle, from the initial provisioning ance can be centrally monitored and of a new application to the remote wiping of data when an enforced. But what do you do when a employee is no longer with the firm. ► mobile device has slipped between the cushions of a couch and has been “lost” there for more than a week? 3104 SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 11. case study : a Fresher approach to Delivery tAsty BAKing compAny tUrns to syBAse for neW distriBUtion recipe tasty Baking company is one of the country’s leading bakers director of applications at tasty Baking company. “As they Conventional Wisdom: of snack cakes, pies, cookies and doughnuts. founded in 1914, made their rounds to the numerous outlets on their routes, IT Must Manage and Secure the company is a philadelphia institution. it offers more than the distributors would pull outdated products from the shelves, Mobility 100 products under the tastykake brand name. over the years, determine restock requirements, go back out to their trucks to philadelphia’s hometown secret has spread, and the products get those products and then wait until a manager was free to The Five Must-Dos of Mobile Management are now available as far west as cleveland, north to northern count and verify the delivery by signing a paper form.” new Jersey, south to northern Virginia Creating an application to increase distributors’ The Mobile World Is Not the and east to the eastern shore of maryland. the company Wired World, and Vice Versa distributes its products to convenience stores, supermarkets efficiency and profitability “What we wanted to do,” says Kang, “was to create an and other retail outlets across this geographic territory by Tasty baking Company application for our sales distributors that would help them using a direct-to-store delivery (dsd) system that is operated Case Study run their businesses more efficiently and more profitably. We by more than 450 independent sales distributors. wanted this application to automate data capture, including Forrester Consulting Study signature capture and other types of data, and we wanted “Our vision was to help distributors to provide them with a tool that would provide them with a What’s Next increase the efficiency of their daily runs and maximize their profitability.” – Chan Kang, director of applications, Tasty Baking Company Until recently these independent distributors ran their businesses by using a combination of an outdated dos-based application and paper records. 34 11 “the old mobile platform that our distributors used was strictly transactional and text-based,” explains chan Kang, SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 12. broad range of information to help them analyze and grow distributors to quickly and Conventional Wisdom: their businesses—information such as product sales by store accurately capture data on IT Must Manage and Secure and special sales promotions. our vision was an application product being removed from Mobility that would automate delivery and documentation processes the shelves and products The Five Must-Dos of Mobile and improve synchronization with our back-office systems to being delivered. they are Management help distributors increase the efficiency of their daily runs and connected via Bluetooth to a maximize their profitability.” thermal printer to enable the The Mobile World Is Not the distributors to print documents Wired World, and Vice Versa As it created its list of application criteria, the company when required. met with its intended users—the independent sales Tasty baking Company distributors. there were a few givens: the need to gather communication between the distributors and tasty Baking Case Study and synchronize transactional information, a desire to improve company’s back-office systems is via an internet Vpn operational efficiency and the ability for the company’s it connection. Forrester Consulting Study staff to manage the distributors’ mobile devices from a central leveraging Sybase Services to improve location. still, the tasty Baking company it team wanted to What’s Next application performance get direct input from the distributors. including them in the After tasty Baking company successfully deployed the route process did produce a better understanding of the kinds of dsd application, it started to discover areas where it could functionality the distributors would welcome and prepared improve the application. one of the first things it did was to them for the transition to a new application. address the need to optimize synchronization between the Choosing key technologies for building an symbol devices and the company’s microsoft sQl server and application sAp erp system. tasty Baking company then turned to an outside software application vendor to help it create the new route dsd “it was taking our distributors as long as 18 minutes each application. With the assistance of this company, time they wanted to synchronize with our systems,” says it created the application, embedding sybase’s Kang. “this was a bit of a sore point with them, as they had Afaria and sQl Anywhere into the to just wait around for the process to complete. We knew application. Afaria enabled tasty we had to improve the synchronization performance, so we Baking company’s it staff to manage turned to sybase professional services to help us do that. the distributors’ symbol devices from a Working together, we were able to tune mobilink to reduce central location. sQl Anywhere provided the synchronization time for data volumes of up to three database and synchronization capabilities. megabytes from an average of 18 to five minutes per session. the route dsd application was installed on symbol 9090 this performance improvement was enthusiastically received handheld devices that were issued to the distributors. these by our distributors and won us a lot of good will from them. 3124 devices are equipped with barcode scanners that enable With mobilink, our distributors can quickly sync their symbol SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 13. devices with our erp system first thing in the morning, at the wait while the products are counted and continue to wait until Conventional Wisdom: end of their runs or both.” a manager signs various forms acknowledging receipt, which IT Must Manage and Secure can be quite time-consuming when stores are busy. instead, Mobility enabling scan-based trading our distributors can just walk in the front door of the retail the new application also includes signature capture func- establishment, do what they have to do as far as merchandising The Five Must-Dos of Mobile tionality, which enables the distributors to capture the store the shelves and then leave. their time spent at each store is Management managers’ or receivers’ signatures digitally in the application significantly reduced, largely because they don’t have to wait for The Mobile World Is Not the and incorporate them into the printed delivery tickets. the a receiver or store manager to verify the delivery and sign off on Wired World, and Vice Versa digital signatures are then electronically transmitted to tasty it. the stores also like the increased efficiency.” Baking company as proof of delivery. this alleviates the need Tasty baking Company for the distributors to mail in or deliver the tickets to tasty ‘The success of route DSD owes a great Case Study Baking company. deal to Sybase’ “We’re a bakery,” says Kang, “not a software development Forrester Consulting Study company, so when we wanted to improve this new route Signature capture saves the distributors dsd application, we knew we couldn’t do it ourselves. What’s Next time and reduces Tasty Baking “it’s clear to us that the success of our route dsd application Company’s administrative burden. owes a great deal to sybase technology—particularly the mobilink synchronization product,” adds Kang. “We really Although this functionality is very useful, the sybase-powered couldn’t have implemented scan-based trading without the route dsd application is enabling tasty Baking company and functionality we’ve gotten from sybase. sybase’s data syn- its distributors to move to an even more efficient distribution chronization platform is very robust and reliable and offers a and sales model called scan-based trading. lot of flexibility. it’s open and enables us to connect to mul- tiple databases. it’s also very scalable. it’s enabled us to meet scan-based trading is a distribution and sales system in which a lot of immediate business requirements, and we expect products (in this case, tastykakes) delivered to a store are not to use mobilink, Afaria and sQl Anywhere to continue to the property of the store. the products that are delivered to a enhance the application as we move forward. i would highly supermarket or convenience store and merchandised on the recommend sybase to any company planning to deploy mo- shelves by the independent distributors remains the property bile applications.” ► of the distributors until it is sold and scanned by the store’s register. At that point, and only at that point, the transaction is reported and the store is invoiced for the product. “the benefit to our sales distributors,” explains Kang, “is that 3134 they don’t have to go to the receiving area and get checked in, SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 14. forrester consulting study : Understanding the Critical role of Device Management and Security in your business’s Mobile Strategy HoW IT CaN ProVIDe beTTer MobIlITy SUPPorT To ITS aNyTIMe, aNyWHere WorkerS DeSPITe a ProlIFeraTIoN oF INCreaSINGly DIVerSe MobIle DeVICeS executive summary Conventional Wisdom: in January 2009, sybase commissioned forrester consulting to More than half of firms support multiple IT Must Manage and Secure operating systems, and 10% have plans to do so. assess the importance of mobile device management and, in Mobility particular, mobile security and the associated issues that keep The Five Must-Dos of Mobile cXos up at night. Management 53% While conducting in-depth interviews with 30 it and telecom/ Support multiple mobile The Mobile World Is Not the network decision-makers at north American and Western oSs, 16 Wired World, and Vice Versa european companies with 500 or more employees, forrester found that these it professionals: Tasty baking Company 10% n Anticipate that the number of mobile devices they support 37% Case Study will continue to increase through 2010, despite the global Support one economic recession Support one single single mobile Forrester Consulting Study mobile oS today oS, 11 n recognize that mobile devices need to be managed and secured in the same way that pcs are today, although but have plans to What’s Next support multiple most admit that they don’t do this yet oSs in the future, 3 n Are feeling increased pressure from c-level executives, line-of-business managers and employees to support more base: 30 senior It managers involved in mobile device manage- mobile platforms and even personal mobile devices ment and security in public and n prioritize security as the no. 1 consideration when making private organizations in the U.S. changes to their mobility strategy and Western europe Source: U.S. and Western european phone survey conducted by Forrester 3144 Consulting and commissioned by Sybase, February and March 2009 SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 15. key Findings Conventional Wisdom: forrester’s study yielded four key findings: IT Must Manage and Secure Mobility n despite tightening budgets as a result of the global economic recession, 28 out of the 30 it The Five Must-Dos of Mobile professionals interviewed anticipate that the number Management of mobile devices they support will increase through 2010. The Mobile World Is Not the n firms are increasingly embracing more than just one Wired World, and Vice Versa mobile platform, making it critical that they invest in tools that can support mobile devices powered by BlackBerry, Tasty baking Company Windows mobile, symbian, mac os X and Windows ce. Case Study n With the changing workforce, it is feeling intense pressure from c-level executives, line-of-business managers and Forrester Consulting Study employees to support personal devices and applications, making security a major concern. What’s Next n companies are increasingly investing in mobile device management and security solutions that will help auto- mate support tasks, streamline the operations of enterprise mobility and secure data. This report is from a commissioned study conducted by Forrester Consulting on behalf of Sybase. [ ClICk Here For THe FUll STUDy. ] 3154 SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS
  • 16. What’s next resoUrces And Action items for yoUr moBile mAnAgement strAtegy a Checklist of key Moves emerging The 60-Second Mobile Manager Conventional Wisdom: IT Must Manage and Secure from This Playbook A small sampling of must-see resources on mobile management. Mobility 4 surge ahead with a multi-os/multi-hardware mangement and security strategy for Android, BlackBerry, iphone, In one convenient place, here is a collection of case studies, The Five Must-Dos of Mobile nokia, palm, sony, Windows mobile and so on and push short videos, solutions overviews and other superb mobile Management this project up the list of it priorities before the crush of management resources. new devices overwhelms you. The Mobile World Is Not the Tapping the minds of two mobility experts, this Webcast Wired World, and Vice Versa 4 take the lead in establishing mobile usage guidelines for offers practical, immediately usable best practices designed all types of users. to get it started on the road to comprehensive mobile Tasty baking Company 4 drive home the point to your it staff that the mobile and management and security. Case Study wired or networked world are very different and therefore Survey says that both the number and type of mobile need to be managed and secured with different solutions. Forrester Consulting Study devices seeking it support will continue to soar, the reces- sion notwithstanding. read the full report of the incisive What’s Next study from forrester consulting. 3164 SybaSe, aN SaP CoMPaNy | I DG Playbook: Why ManagI ng Mob I lIty MatterS