Mobile Vision 2020

IBM Security
IBM SecurityIBM Security
More devices and
things
Mobile Vision 2020
UNIFIED ENDPOINT MANAGEMENT
TOP DRIVERS OF UNIFIED ENDPOINT MANAGEMENT ADOPTION
THE ENDPOINT MANAGEMENT LANDSCAPE IS
INCREASINGLY COMPLEX
More than half of organizations will adopt this
approach by 2020.
UNIFIED ENDPOINT MANAGEMENT IS
GROWING RAPIDLY
User demand for data
anytime/anywhere
Need to lower total
cost of ownership
Source: A commissioned study conducted by Forrester Consulting on behalf
of IBM, January 2017
*Source: Forrester Data Global Business Technographics®
Telecommunications And Mobility Workforce Survey, 2016
© 2017 Forrester Research, Inc. All right reserved. Forrester is a registered trademark of Forrester Research, Inc.
Read the full study
Artificial intelligence and cognitive computing
Devices and things
Productivity Security
Actionable insights
Apps
Smartphones Tablets Laptops Wearables Internet of
things
Content Data Identity Threats Connectivity
Contextual analytics
Organizations are seeing huge increases in
endpoint data . . .
Organizations are supporting more devices than ever . . .
. . . and will move toward a device-agnostic approach
The Impact Of Mobility, IoT, And
Artificial Intelligence On The Future
Of Business Transformation
26% of organizations are using
device-agnostic management.
42% will be using device-agnostic
management by 2020.
15% are using UEM today. 54% will have UEM in place by 2020.
80% will implement AI/cognitive
computing by 2020.
96% will see an increase in
endpoint data in the next 3 years.
Base: 556 IT professionals at the director level and above in the US, the
UK,Germany, India, and Australia
Methodology: In this study, Forrester conducted an online survey of 556 IT
professionals at the director level and above in the US, the UK, Germany,
India, and Australia.
72%
of workers use a mobile
device weekly for work.*
49%
use at least three devices for
work.*
99%
use a desktop or laptop.*
88%
of organizations will be
managing IoT devices by 2020.
. . . so they are turning to AI/cognitive
computing to generate insights from this data

Mais conteúdo relacionado

Mais procurados(20)

Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
IBM Sverige206 visualizações
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
IBM Security1K visualizações
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
IBM Security3.1K visualizações
Unified application security analyserUnified application security analyser
Unified application security analyser
Tim Youm210 visualizações
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security8.6K visualizações
Cognitive securityCognitive security
Cognitive security
Iqra khalil1K visualizações

Similar a Mobile Vision 2020(20)

Smart Data Module 6 d drive the futureSmart Data Module 6 d drive the future
Smart Data Module 6 d drive the future
caniceconsulting94 visualizações
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
Osterman Research, Inc.923 visualizações
Unlocking the Power of Mobility - Ben GoodmanUnlocking the Power of Mobility - Ben Goodman
Unlocking the Power of Mobility - Ben Goodman
scoopnewsgroup307 visualizações
The 2018 Threat LandscapeThe 2018 Threat Landscape
The 2018 Threat Landscape
ColloqueRISQ586 visualizações
Top Tech & Business Trends for 2017 articleTop Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 article
Louis F Vargas Business Development•Marketing Executive259 visualizações
Top 20 Tech & Business Trends for 2017Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017
Louis F Vargas Business Development•Marketing Executive256 visualizações
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
Blueboxer2014700 visualizações
The Journey to Manage Endpoints EverywhereThe Journey to Manage Endpoints Everywhere
The Journey to Manage Endpoints Everywhere
Insight42 visualizações
Thomas Vavra | New Ways of Handling Old DataThomas Vavra | New Ways of Handling Old Data
Thomas Vavra | New Ways of Handling Old Data
semanticsconference516 visualizações
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summary
Emisor Digital143 visualizações
Digital Revolution 4.0 is Here TodayDigital Revolution 4.0 is Here Today
Digital Revolution 4.0 is Here Today
Dr. Mazlan Abbas204 visualizações
Top 8 Tips For Business Technology Strategy in 2015Top 8 Tips For Business Technology Strategy in 2015
Top 8 Tips For Business Technology Strategy in 2015
David Stoffel799 visualizações
Iot presentationIot presentation
Iot presentation
International Finance Corporation411 visualizações

Mais de IBM Security(20)

Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security2K visualizações
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
IBM Security2K visualizações
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K visualizações
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
IBM Security1.2K visualizações
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security703 visualizações
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security1.3K visualizações
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
IBM Security1.4K visualizações

Último(20)

Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray1042 visualizações
AMD: 4th Generation EPYC CXL DemoAMD: 4th Generation EPYC CXL Demo
AMD: 4th Generation EPYC CXL Demo
CXL Forum117 visualizações
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman152 visualizações
Photowave Presentation Slides - 11.8.23.pptxPhotowave Presentation Slides - 11.8.23.pptx
Photowave Presentation Slides - 11.8.23.pptx
CXL Forum118 visualizações
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman20 visualizações
CXL at OCPCXL at OCP
CXL at OCP
CXL Forum183 visualizações
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation23 visualizações
MemVerge: Past Present and Future of CXLMemVerge: Past Present and Future of CXL
MemVerge: Past Present and Future of CXL
CXL Forum105 visualizações
Micron CXL product and architecture updateMicron CXL product and architecture update
Micron CXL product and architecture update
CXL Forum23 visualizações

Mobile Vision 2020

  • 1. More devices and things Mobile Vision 2020 UNIFIED ENDPOINT MANAGEMENT TOP DRIVERS OF UNIFIED ENDPOINT MANAGEMENT ADOPTION THE ENDPOINT MANAGEMENT LANDSCAPE IS INCREASINGLY COMPLEX More than half of organizations will adopt this approach by 2020. UNIFIED ENDPOINT MANAGEMENT IS GROWING RAPIDLY User demand for data anytime/anywhere Need to lower total cost of ownership Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 *Source: Forrester Data Global Business Technographics® Telecommunications And Mobility Workforce Survey, 2016 © 2017 Forrester Research, Inc. All right reserved. Forrester is a registered trademark of Forrester Research, Inc. Read the full study Artificial intelligence and cognitive computing Devices and things Productivity Security Actionable insights Apps Smartphones Tablets Laptops Wearables Internet of things Content Data Identity Threats Connectivity Contextual analytics Organizations are seeing huge increases in endpoint data . . . Organizations are supporting more devices than ever . . . . . . and will move toward a device-agnostic approach The Impact Of Mobility, IoT, And Artificial Intelligence On The Future Of Business Transformation 26% of organizations are using device-agnostic management. 42% will be using device-agnostic management by 2020. 15% are using UEM today. 54% will have UEM in place by 2020. 80% will implement AI/cognitive computing by 2020. 96% will see an increase in endpoint data in the next 3 years. Base: 556 IT professionals at the director level and above in the US, the UK,Germany, India, and Australia Methodology: In this study, Forrester conducted an online survey of 556 IT professionals at the director level and above in the US, the UK, Germany, India, and Australia. 72% of workers use a mobile device weekly for work.* 49% use at least three devices for work.* 99% use a desktop or laptop.* 88% of organizations will be managing IoT devices by 2020. . . . so they are turning to AI/cognitive computing to generate insights from this data