SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
- Enterprise
- Mobile
- Web
- Digital
Integrating Enterprise Mobility - an Assessment
WHITE PAPER
ENTERPRISE
IS THE
PEOPLE,
AND PEOPLE ARE NOW MOBILE.
www.mobiloitte.com
Abstract
Why Enterprise Mobility
Enterprise Mobility
This paper briefly explains how mobile IT can be integrated with the
organizational work processes and its internal systems, and how the
enterprise can benefit from Enterprise Mobility Solutions.
Smartphones and tablets have
today become ubiquitous all over
the world. People are getting
accustomed to accessing the
internet from their mobile devices.
According to recent Gartner
reports, by 2018, more than
50% of the population both in
emerging economies as well as
in the developed ones, will use a
smartphone or a tablet to access the
internet. The worldwide wearable
devices sales will grow 18.4 percent
in 2016. By
2020, more than half of the major new business
processes and systems around the world will
incorporate some elements of Internet of Things
(IoT) due to the reducing costs of instrumenting and
inter-connecting physical devices with sensors. The
public cloud market will also remain on a boom, as
per the research firm.
In such a scenario, it is becoming mandatory for
enterprises to adapt to their changing digital
environments. As, with a deluge of devices and
their apps entering the workplaces, not only is maintaining data security
becoming a major challenge, but also keeping the workers focused on their
jobs becoming an issue. While on the other hand, instead of considering
these devices and their apps as threats, if they are managed efficiently and
brought within the purview of the enterprise’s mainline resource base not
only would the security of corporate data get enhanced, but also worker’s
productivity considerably improve while further optimizing the usage of
the other resources involved.
Instead of considering the
mobile devices and their
apps as threats, they must
be managed efficiently
and brought within the
purviewoftheenterprise’s
mainline resource base.
Solution
Enterprise Mobility
In today’s digital environment contentis available anywhere on the go andis
also dynamically updated. You can access it anytime, anywhere, in any which
way you want. Thus, managing a plethora of mobile devices not to mention
the digital wearables like
smartwatches, body-
worn cameras, Bluetooth
headsets,smartgarments,
fitness monitors, etc.
would become a
nightmare for the IT
department, in absence
of relevant IT policies
and procedures. Hence,
modern-day enterprises
must deliberate around
enabling, managing,
analyzing and controlling;
The devices
Their applications and
The content
Gartner’s Magic Quadrant for EMM solution providers in June 2015.
not only when they are used within the organization premises, but
also when they are used outside the premises for the purposes of the
organization itself.
Once the policies are in place the next step would be to select the most
optimal mix of software and hardware solutions that would be suitable for
your enterprise. These solutions are broadly categorized under Enterprise
Mobility Management (EMM).
Enterprise Mobility Management can be segmented into:
Mobile Device Management (MDM)
Bring Your Own Device (BYOD)
Choose Your Own Device (CYOD)
Mobile Applications Management (MAM)
Mobile Content Management (MCM)
Every year, Gartner evaluates the EMM providers from around the world
on their execution abilities and completeness of vision. Based on the
evaluation it places the providers on a quadrant.
Ensurethatyouremployees
donotmisusetheirmobile
devicesandhandhelds
withintheworkplaceand
remainproductive.
▶ Mobile Device Management (MDM)
▶ Bring Your Own Device (BYOD)
Enterprise Mobility
Mobile Device Management is a way to ensure that employees do not
misuse their mobile devices and handhelds within the workplace and
remain productive. MDM primarily deals with using the latest crypto
techniques for encrypting and processing all corporate data like emails,
documents and enterprise applications
and containerizing them. Personal data
is segregated from corporate data on all
devices.
A server componentsends out management
commands to the mobile devices, while a
client component running on the mobile
devices receives and implements the
management commands. This adds an extra layer of security and ensures
a way to monitor all device related activities. Mobile apps, data and
configuration settings are distributed over the air for mobile phones,
tablets, mobile printers, mobile POS devices, etc. Recently, laptops and
desktops have also been added to the list of devices as MDM is becoming
more about basic device management.
Both company owned (CYOD) and employee owned (BYOD) devices are
progressively being managed and controlled by the MDM tools.
Drawbacks of MDM
1. Employees sometimes have to carry two devices to the workplace, one
for their personal use and the other for official use.
2. MDM does not work well with the BYOD model and works better with
the CYOD model.
3. MDM is not cost effective as it involves device procurement costs,
operational and capital costs.
BYOD is an evolving concept in EMM and is referred to as the IT
consumerization phenomenon. It is the policy of allowing employees
to bring in their own devices such as laptops, tablets, mobile phones or
any other digital wearable to office and access the privileged company
information and applications.
BYOD is perceived by employees as a convenience and enjoyment as they
can keep working with their choicest devices even in office. This also goes
to add to their efficiency as they can work from anywhere, anytime.
Enterprise Mobility
Many companies are fast adopting
BYOD as it boosts employee morale,
adds to their convenience, and makes
the organization look more flexible
and employee friendly. In a recent
study by Intel on BYOD usage in India,
six out of ten IT managers favoured
BYOD as it increased productivity and
employee satisfaction. Besides, BYOD is
cost effective as it reduces investments
in devices such as laptops, desktops,
phones, etc.
Drawbacks of BYOD
1. Chances of higher data breach like if an employee loses a mobile phone
which was used to access official emails, sensitive information could get
into the wrong hands.
2. Since employees would use the devices for personal browsing as well, it
raises the chances of higher malware and virus infections.
3. Governance breaches also increase due to the infiltration of personal
apps in the professional workspace.
▶ Choose Your Own Device (CYOD)
▶ Mobile Applications Management (MAM)
CYOD is similar to BYOD, only the devices, i.e. laptops, mobile phones,
tablets, etc. are pre-approved by the company and the security softwares,
firewalls, the set-up administrator and the network settings are offered as
pre-installed on these devices. The workers’ personal devices remain out
of the office network. Sometimes workers are allowed to carry the official
devices home on work-from-home assignments.
Although CYOD model involves cost incurrence in purchasing the devices
and their maintenance, it is more effective in preventing malware and
virus infections and governance breaches. The BYOD model is, therefore,
more cost effective in comparison to the CYOD model.
MAM describes the software, applications and services that are required
to provision and control the various devices operated inside the office
premises. It is the glue that binds the various devices with their respective
applications and software for optimized usage, and ultimately, more
efficient performance of the workforce. It finds application in both CYOD
and BYOD models. For e.g., when an employee brings his personal device
to office the corporate IT staff downloads the required mobile applications
or software into the mobile device for controlling access over confidential
corporate data.
The glue that binds the
various devices with their
respective applications
andsoftwareforoptimized
usage, leading to more
efficient performance of
the workforce.
Enterprise Mobility
MAM not only enhances data security, but enterprises have also started
offering various mobile applications to their
workers for corporate utilities like tracking
their whereabouts, automated billing, receiving
and making payments, enterprise resource
management, human resource management,
fleet tracking, etc.
Drawbacks of MAM
1. MAM is expensive as it requires building
the right mobile applications for enhancing
entrepreneurial decision making.
2. Version upgrade becomes difficult as this is
bundled along with application.
3. Control can be at the application level only, if not integrated with MDM.
▶ Mobile Content Management (MCM)
MCM is corporate data management system over the mobile platform.
It is the capability of a company to store and deliver corporate data and
services to the mobile devices with such precision that not only the work
gets done, but complete data security is also maintained. It is the effective
dissemination and protection of IT related information to the workers.
Drawbacks of MCM
1. For MCM to work efficiently a native mobile app is required.
2. MCM has limited platform support and works well with only iOS and
Android.
To arrive at the most optimum EMM solution suite, an enterprise first has
to devise the right IT policies. Once the IT policies are in place, the right
people have to be hired who can implement and execute these policies
for highest data security while supporting the workers when they use
their mobile devices in office. There is no optimum EMM suite in general
that suits all. Since different businesses have different needs and occupy
different positions in the market, each business must find its own optimum
EMM solutions mix.
The Optimum EMM Solution Mix
EMM solutions suite includes the following services:
Enterprise Mobility
Device Authentication  Authorization
Applications Version Management
Maintaining Data Security
Maintaining Reports  Statistics
It is imperative to install multi-layered
authentication procedures through Username,
DevicePasswordsandOTPs(OneTimePasswords)
to keep a check on whether the devices asking
access are user owned or company owned,
and to enable geo-location based data access
and authentication. This would help in effective
geo-location tracking by keeping a tab on the
location of the devices that log in.
Itisimportanttokeeptheappsup-to-datethroughregularsoftwareupgrades
based upon the device OS compatibility. Sending out push notifications
informing the user to go for the next upgrade when there is a change in
technology, or to restrict app access temporarily to address security flaws that
come up are key to app maintenance and versioning.
This service includes encrypting the data to restrict access, disabling the data
sharing applications or utilities on authorized devices, automatic deletions
of sensitive corporate data on authorized devices based on ‘time to live’
certificates, encrypting data communication on top of SSL protocol for data
security, implementing asymmetric encryption key algorithms for transport
layer data security.
Remote Data Wipe is another useful feature that wipes out all sensitive data
at the application or container level from any device remotely, in case it is lost
or stolen.
Customized reports and statistics go a long way in adding value to the app
features, Regular updates in designing and updating records for better
insight are necessary actions for the enterprise’s mobile strategy. Some useful
measurement metrics are app usage vs. platform, app vs. platform versions,
app vs. device OEMs, app vs. location, etc.
Mobile Applications Provisioning  Deployment
Since enterprise gets utility based mobile apps created for enabling mobility
for specific enterprise functionalities like billing, mCommerce, ERP, HRM, fleet
monitoring, field force management, sales force management or accounting,
etc., it is advisable that the enterprise provisions
alloftheseappsfromacentrallocationonly,such
as the enterprise app store. This would ensure
the accessibility of certified applications through
authorized devices by valid persons only.
Policy Management
Multi-platform Handling Capabilities
Purpose-built Platform
Growing Customer Base
Listing out a set of IT rules and regulations to be followed by employees when
theyusetheirpersonalmobiledevicesinoffice,oruseofficedevicesauthorized
for usage at home is an essential necessity. The rules can be enforceable at the
user, device and application levels. Policies like restricting app usage during
office hours, blacklisting particular websites and applications, disabling app
usage outside office premises, restricting the number of logins from particular
devices, etc. are some examples of policy management.
Mobile technology is fast evolving and every six months a new operating
software getsintroduced.Ifyoudoarealitycheckonsomewell-knownmobile
apps that were a rage few years back but are extinct now,
you will find that many of them disappeared due to non-
adaptability with their fast changing OS environments.
Hence, to create your enterprise grade mobile app,
you must choose a provider who is proficient with
multiple platforms and not just a specialist of one. Such
a provider will be able to modify and re-strategize your
mobile app according to its changing environment.
Choose a vendor whose platform was built from the ground up with the
vision of servicing industries so that it can offer scalability and reliability that
your enterprise would need for its transition to mobility.
In addition to a strong vision and a robust infrastructure your EMM provider
must also have a growing database of satisfied customer base and focus on
customer engagements. Are they servicing across a wide range of industry
verticals or are they servicing a narrow segment of the market? A vendor with
a broad portfolio should be preferred.  
Enterprise Mobility
EMM is the call of the day, and enterprises across the world are fast
adapting to this new reality. However, one of the most frequently asked
questions in this regard has been how to choose the right EMM solutions
provider. Some of the key points to be considered are:
How to Choose your EMM Solutions
Provider
Many well-known mobile
apps that were a rage few
years back are extinct now
due to non-adaptability
with their fast changing OS
environments.

Weitere ähnliche Inhalte

Was ist angesagt?

Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsOsterman Research, Inc.
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Mobile Application Strategy
Mobile Application StrategyMobile Application Strategy
Mobile Application StrategySybase Türkiye
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
Enterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveEnterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveSoftweb Solutions
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device ManagementHexnode
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 

Was ist angesagt? (19)

Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Mobile Application Strategy
Mobile Application StrategyMobile Application Strategy
Mobile Application Strategy
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Enterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveEnterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the move
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device Management
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 

Andere mochten auch

Insight into Managing mobile devices webinar
Insight into Managing mobile devices webinarInsight into Managing mobile devices webinar
Insight into Managing mobile devices webinarJisc RSC East Midlands
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...itnewsafrica
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPEAvocatsMathias
 
System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ?
System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ? System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ?
System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ? Microsoft Technet France
 
CYOD info night presentation for website
CYOD info night presentation for websiteCYOD info night presentation for website
CYOD info night presentation for websiteJason Micallef
 
Install Party Linux (Université Constantine 2) - Clic Club
Install Party Linux (Université Constantine 2) - Clic ClubInstall Party Linux (Université Constantine 2) - Clic Club
Install Party Linux (Université Constantine 2) - Clic ClubAdel Belbekri
 
Active approaches to Induction using technology
Active approaches to Induction using technologyActive approaches to Induction using technology
Active approaches to Induction using technologyJisc RSC East Midlands
 
RCE: solution de Controle d'accès centralisé
RCE: solution de Controle d'accès centraliséRCE: solution de Controle d'accès centralisé
RCE: solution de Controle d'accès centraliséE. Duverger
 
Le BYOD comment y aller de manière pragmatique
Le BYOD comment y aller de manière pragmatiqueLe BYOD comment y aller de manière pragmatique
Le BYOD comment y aller de manière pragmatiqueMicrosoft Décideurs IT
 
CV_BOUZAYANI_Emna_2016
CV_BOUZAYANI_Emna_2016CV_BOUZAYANI_Emna_2016
CV_BOUZAYANI_Emna_2016emna bouzayani
 
ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...
ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...
ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...EasyNove
 
5 Appel D Offres Et Cahier Des Charges
5 Appel D Offres Et Cahier Des Charges5 Appel D Offres Et Cahier Des Charges
5 Appel D Offres Et Cahier Des ChargesStéphane Bordage
 
Le BYOD, les perspectives pour l’entreprise
Le BYOD, les perspectives pour l’entrepriseLe BYOD, les perspectives pour l’entreprise
Le BYOD, les perspectives pour l’entrepriseClément Michel
 
Planning for BYOD and CYOD in future UCC infrastructure
Planning for BYOD and CYOD in future UCC infrastructurePlanning for BYOD and CYOD in future UCC infrastructure
Planning for BYOD and CYOD in future UCC infrastructureAnders Løkke
 

Andere mochten auch (20)

Insight into Managing mobile devices webinar
Insight into Managing mobile devices webinarInsight into Managing mobile devices webinar
Insight into Managing mobile devices webinar
 
Proposed CYOD Model
Proposed CYOD ModelProposed CYOD Model
Proposed CYOD Model
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
 
System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ?
System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ? System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ?
System Center 2012 R2 et Windows 8.1 : Quoi de neuf pour le BYOD ?
 
Rh et BYOD
Rh et BYODRh et BYOD
Rh et BYOD
 
CYOD info night presentation for website
CYOD info night presentation for websiteCYOD info night presentation for website
CYOD info night presentation for website
 
Install Party Linux (Université Constantine 2) - Clic Club
Install Party Linux (Université Constantine 2) - Clic ClubInstall Party Linux (Université Constantine 2) - Clic Club
Install Party Linux (Université Constantine 2) - Clic Club
 
Active approaches to Induction using technology
Active approaches to Induction using technologyActive approaches to Induction using technology
Active approaches to Induction using technology
 
RCE: solution de Controle d'accès centralisé
RCE: solution de Controle d'accès centraliséRCE: solution de Controle d'accès centralisé
RCE: solution de Controle d'accès centralisé
 
2010 10 08_angd_aussois_cdcf
2010 10 08_angd_aussois_cdcf2010 10 08_angd_aussois_cdcf
2010 10 08_angd_aussois_cdcf
 
Anytime, Anywhere, Any device
Anytime, Anywhere, Any deviceAnytime, Anywhere, Any device
Anytime, Anywhere, Any device
 
Le BYOD comment y aller de manière pragmatique
Le BYOD comment y aller de manière pragmatiqueLe BYOD comment y aller de manière pragmatique
Le BYOD comment y aller de manière pragmatique
 
CV_BOUZAYANI_Emna_2016
CV_BOUZAYANI_Emna_2016CV_BOUZAYANI_Emna_2016
CV_BOUZAYANI_Emna_2016
 
ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...
ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...
ReF - OI - Empowerment et agilité au service de l’action publique : l’exemple...
 
Sécuriser un BYOD
Sécuriser un BYODSécuriser un BYOD
Sécuriser un BYOD
 
5 Appel D Offres Et Cahier Des Charges
5 Appel D Offres Et Cahier Des Charges5 Appel D Offres Et Cahier Des Charges
5 Appel D Offres Et Cahier Des Charges
 
Cahier des charges modèle gratuit - préparez votre projet web facilement !
Cahier des charges modèle gratuit - préparez votre projet web facilement !Cahier des charges modèle gratuit - préparez votre projet web facilement !
Cahier des charges modèle gratuit - préparez votre projet web facilement !
 
Le BYOD, les perspectives pour l’entreprise
Le BYOD, les perspectives pour l’entrepriseLe BYOD, les perspectives pour l’entreprise
Le BYOD, les perspectives pour l’entreprise
 
Planning for BYOD and CYOD in future UCC infrastructure
Planning for BYOD and CYOD in future UCC infrastructurePlanning for BYOD and CYOD in future UCC infrastructure
Planning for BYOD and CYOD in future UCC infrastructure
 

Ähnlich wie Integrating Enterprise Mobility - an Assessment WHITE PAPER

Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfJPLoft Solutions
 
Mobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsMobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsIRJET Journal
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilitySanjay Abraham
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxsreevidyaopenteq
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 

Ähnlich wie Integrating Enterprise Mobility - an Assessment WHITE PAPER (20)

Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Security that works
Security that worksSecurity that works
Security that works
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 
Mobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsMobile Device Management and Their Security Concerns
Mobile Device Management and Their Security Concerns
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise Mobility
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 

Mehr von Mobiloitte

Frameworks and Tools For Developing Progressive Web App
Frameworks and Tools For Developing Progressive Web AppFrameworks and Tools For Developing Progressive Web App
Frameworks and Tools For Developing Progressive Web AppMobiloitte
 
Flutter or PWA Which Is Best For Application Development
Flutter or PWA Which Is Best For Application DevelopmentFlutter or PWA Which Is Best For Application Development
Flutter or PWA Which Is Best For Application DevelopmentMobiloitte
 
Vue.js vs angular the best java script framework to choose
Vue.js vs angular  the best java script framework to chooseVue.js vs angular  the best java script framework to choose
Vue.js vs angular the best java script framework to chooseMobiloitte
 
Top Tools for WordPress Development
Top Tools for WordPress DevelopmentTop Tools for WordPress Development
Top Tools for WordPress DevelopmentMobiloitte
 
Why Mobile Applications Are Necessary For Small Businesses
Why Mobile Applications Are Necessary For Small BusinessesWhy Mobile Applications Are Necessary For Small Businesses
Why Mobile Applications Are Necessary For Small BusinessesMobiloitte
 
Factors To Be Considered Before Outsourcing Mobile Application
Factors To Be Considered Before Outsourcing Mobile ApplicationFactors To Be Considered Before Outsourcing Mobile Application
Factors To Be Considered Before Outsourcing Mobile ApplicationMobiloitte
 
Flutter vs Ionic: Which framework is better for cross platform application d...
Flutter vs Ionic: Which framework is better  for cross platform application d...Flutter vs Ionic: Which framework is better  for cross platform application d...
Flutter vs Ionic: Which framework is better for cross platform application d...Mobiloitte
 
iOS 13 Every New Feature iPhone You Need To Know About
iOS 13 Every New Feature iPhone You Need To Know AboutiOS 13 Every New Feature iPhone You Need To Know About
iOS 13 Every New Feature iPhone You Need To Know AboutMobiloitte
 
Key tactics for online reputation management
Key tactics for online reputation managementKey tactics for online reputation management
Key tactics for online reputation managementMobiloitte
 
Benefits of blockchain in healthcare
Benefits of blockchain in healthcareBenefits of blockchain in healthcare
Benefits of blockchain in healthcareMobiloitte
 
Facts about new cryptocurrency coin
Facts about new cryptocurrency coinFacts about new cryptocurrency coin
Facts about new cryptocurrency coinMobiloitte
 
Blockchain trends in 2019
Blockchain trends in 2019Blockchain trends in 2019
Blockchain trends in 2019Mobiloitte
 
Angular JS For Your Business
Angular JS For Your BusinessAngular JS For Your Business
Angular JS For Your BusinessMobiloitte
 
.Net framework
.Net framework.Net framework
.Net frameworkMobiloitte
 
Top 5 Ethereum DApps by Volume
Top 5 Ethereum DApps by VolumeTop 5 Ethereum DApps by Volume
Top 5 Ethereum DApps by VolumeMobiloitte
 
Python Version 3.7
Python Version 3.7Python Version 3.7
Python Version 3.7Mobiloitte
 
Would React js Remain To Prevail in 2019?
Would React js Remain To Prevail in 2019?Would React js Remain To Prevail in 2019?
Would React js Remain To Prevail in 2019?Mobiloitte
 
Evolution of python
Evolution of python Evolution of python
Evolution of python Mobiloitte
 
Mobile app development trends
Mobile app development trendsMobile app development trends
Mobile app development trendsMobiloitte
 

Mehr von Mobiloitte (20)

Frameworks and Tools For Developing Progressive Web App
Frameworks and Tools For Developing Progressive Web AppFrameworks and Tools For Developing Progressive Web App
Frameworks and Tools For Developing Progressive Web App
 
Flutter or PWA Which Is Best For Application Development
Flutter or PWA Which Is Best For Application DevelopmentFlutter or PWA Which Is Best For Application Development
Flutter or PWA Which Is Best For Application Development
 
Vue.js vs angular the best java script framework to choose
Vue.js vs angular  the best java script framework to chooseVue.js vs angular  the best java script framework to choose
Vue.js vs angular the best java script framework to choose
 
Top Tools for WordPress Development
Top Tools for WordPress DevelopmentTop Tools for WordPress Development
Top Tools for WordPress Development
 
Why Mobile Applications Are Necessary For Small Businesses
Why Mobile Applications Are Necessary For Small BusinessesWhy Mobile Applications Are Necessary For Small Businesses
Why Mobile Applications Are Necessary For Small Businesses
 
Factors To Be Considered Before Outsourcing Mobile Application
Factors To Be Considered Before Outsourcing Mobile ApplicationFactors To Be Considered Before Outsourcing Mobile Application
Factors To Be Considered Before Outsourcing Mobile Application
 
Flutter vs Ionic: Which framework is better for cross platform application d...
Flutter vs Ionic: Which framework is better  for cross platform application d...Flutter vs Ionic: Which framework is better  for cross platform application d...
Flutter vs Ionic: Which framework is better for cross platform application d...
 
iOS 13 Every New Feature iPhone You Need To Know About
iOS 13 Every New Feature iPhone You Need To Know AboutiOS 13 Every New Feature iPhone You Need To Know About
iOS 13 Every New Feature iPhone You Need To Know About
 
Key tactics for online reputation management
Key tactics for online reputation managementKey tactics for online reputation management
Key tactics for online reputation management
 
Benefits of blockchain in healthcare
Benefits of blockchain in healthcareBenefits of blockchain in healthcare
Benefits of blockchain in healthcare
 
Facts about new cryptocurrency coin
Facts about new cryptocurrency coinFacts about new cryptocurrency coin
Facts about new cryptocurrency coin
 
Blockchain trends in 2019
Blockchain trends in 2019Blockchain trends in 2019
Blockchain trends in 2019
 
Angular JS For Your Business
Angular JS For Your BusinessAngular JS For Your Business
Angular JS For Your Business
 
.Net framework
.Net framework.Net framework
.Net framework
 
Top 5 Ethereum DApps by Volume
Top 5 Ethereum DApps by VolumeTop 5 Ethereum DApps by Volume
Top 5 Ethereum DApps by Volume
 
Java timeline
Java timelineJava timeline
Java timeline
 
Python Version 3.7
Python Version 3.7Python Version 3.7
Python Version 3.7
 
Would React js Remain To Prevail in 2019?
Would React js Remain To Prevail in 2019?Would React js Remain To Prevail in 2019?
Would React js Remain To Prevail in 2019?
 
Evolution of python
Evolution of python Evolution of python
Evolution of python
 
Mobile app development trends
Mobile app development trendsMobile app development trends
Mobile app development trends
 

Kürzlich hochgeladen

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Kürzlich hochgeladen (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Integrating Enterprise Mobility - an Assessment WHITE PAPER

  • 1. - Enterprise - Mobile - Web - Digital Integrating Enterprise Mobility - an Assessment WHITE PAPER ENTERPRISE IS THE PEOPLE, AND PEOPLE ARE NOW MOBILE. www.mobiloitte.com
  • 2. Abstract Why Enterprise Mobility Enterprise Mobility This paper briefly explains how mobile IT can be integrated with the organizational work processes and its internal systems, and how the enterprise can benefit from Enterprise Mobility Solutions. Smartphones and tablets have today become ubiquitous all over the world. People are getting accustomed to accessing the internet from their mobile devices. According to recent Gartner reports, by 2018, more than 50% of the population both in emerging economies as well as in the developed ones, will use a smartphone or a tablet to access the internet. The worldwide wearable devices sales will grow 18.4 percent in 2016. By 2020, more than half of the major new business processes and systems around the world will incorporate some elements of Internet of Things (IoT) due to the reducing costs of instrumenting and inter-connecting physical devices with sensors. The public cloud market will also remain on a boom, as per the research firm. In such a scenario, it is becoming mandatory for enterprises to adapt to their changing digital environments. As, with a deluge of devices and their apps entering the workplaces, not only is maintaining data security becoming a major challenge, but also keeping the workers focused on their jobs becoming an issue. While on the other hand, instead of considering these devices and their apps as threats, if they are managed efficiently and brought within the purview of the enterprise’s mainline resource base not only would the security of corporate data get enhanced, but also worker’s productivity considerably improve while further optimizing the usage of the other resources involved. Instead of considering the mobile devices and their apps as threats, they must be managed efficiently and brought within the purviewoftheenterprise’s mainline resource base.
  • 3. Solution Enterprise Mobility In today’s digital environment contentis available anywhere on the go andis also dynamically updated. You can access it anytime, anywhere, in any which way you want. Thus, managing a plethora of mobile devices not to mention the digital wearables like smartwatches, body- worn cameras, Bluetooth headsets,smartgarments, fitness monitors, etc. would become a nightmare for the IT department, in absence of relevant IT policies and procedures. Hence, modern-day enterprises must deliberate around enabling, managing, analyzing and controlling; The devices Their applications and The content Gartner’s Magic Quadrant for EMM solution providers in June 2015. not only when they are used within the organization premises, but also when they are used outside the premises for the purposes of the organization itself. Once the policies are in place the next step would be to select the most optimal mix of software and hardware solutions that would be suitable for your enterprise. These solutions are broadly categorized under Enterprise Mobility Management (EMM). Enterprise Mobility Management can be segmented into: Mobile Device Management (MDM) Bring Your Own Device (BYOD) Choose Your Own Device (CYOD) Mobile Applications Management (MAM) Mobile Content Management (MCM) Every year, Gartner evaluates the EMM providers from around the world on their execution abilities and completeness of vision. Based on the evaluation it places the providers on a quadrant.
  • 4. Ensurethatyouremployees donotmisusetheirmobile devicesandhandhelds withintheworkplaceand remainproductive. ▶ Mobile Device Management (MDM) ▶ Bring Your Own Device (BYOD) Enterprise Mobility Mobile Device Management is a way to ensure that employees do not misuse their mobile devices and handhelds within the workplace and remain productive. MDM primarily deals with using the latest crypto techniques for encrypting and processing all corporate data like emails, documents and enterprise applications and containerizing them. Personal data is segregated from corporate data on all devices. A server componentsends out management commands to the mobile devices, while a client component running on the mobile devices receives and implements the management commands. This adds an extra layer of security and ensures a way to monitor all device related activities. Mobile apps, data and configuration settings are distributed over the air for mobile phones, tablets, mobile printers, mobile POS devices, etc. Recently, laptops and desktops have also been added to the list of devices as MDM is becoming more about basic device management. Both company owned (CYOD) and employee owned (BYOD) devices are progressively being managed and controlled by the MDM tools. Drawbacks of MDM 1. Employees sometimes have to carry two devices to the workplace, one for their personal use and the other for official use. 2. MDM does not work well with the BYOD model and works better with the CYOD model. 3. MDM is not cost effective as it involves device procurement costs, operational and capital costs. BYOD is an evolving concept in EMM and is referred to as the IT consumerization phenomenon. It is the policy of allowing employees to bring in their own devices such as laptops, tablets, mobile phones or any other digital wearable to office and access the privileged company information and applications. BYOD is perceived by employees as a convenience and enjoyment as they can keep working with their choicest devices even in office. This also goes to add to their efficiency as they can work from anywhere, anytime.
  • 5. Enterprise Mobility Many companies are fast adopting BYOD as it boosts employee morale, adds to their convenience, and makes the organization look more flexible and employee friendly. In a recent study by Intel on BYOD usage in India, six out of ten IT managers favoured BYOD as it increased productivity and employee satisfaction. Besides, BYOD is cost effective as it reduces investments in devices such as laptops, desktops, phones, etc. Drawbacks of BYOD 1. Chances of higher data breach like if an employee loses a mobile phone which was used to access official emails, sensitive information could get into the wrong hands. 2. Since employees would use the devices for personal browsing as well, it raises the chances of higher malware and virus infections. 3. Governance breaches also increase due to the infiltration of personal apps in the professional workspace. ▶ Choose Your Own Device (CYOD) ▶ Mobile Applications Management (MAM) CYOD is similar to BYOD, only the devices, i.e. laptops, mobile phones, tablets, etc. are pre-approved by the company and the security softwares, firewalls, the set-up administrator and the network settings are offered as pre-installed on these devices. The workers’ personal devices remain out of the office network. Sometimes workers are allowed to carry the official devices home on work-from-home assignments. Although CYOD model involves cost incurrence in purchasing the devices and their maintenance, it is more effective in preventing malware and virus infections and governance breaches. The BYOD model is, therefore, more cost effective in comparison to the CYOD model. MAM describes the software, applications and services that are required to provision and control the various devices operated inside the office premises. It is the glue that binds the various devices with their respective applications and software for optimized usage, and ultimately, more efficient performance of the workforce. It finds application in both CYOD and BYOD models. For e.g., when an employee brings his personal device to office the corporate IT staff downloads the required mobile applications or software into the mobile device for controlling access over confidential corporate data.
  • 6. The glue that binds the various devices with their respective applications andsoftwareforoptimized usage, leading to more efficient performance of the workforce. Enterprise Mobility MAM not only enhances data security, but enterprises have also started offering various mobile applications to their workers for corporate utilities like tracking their whereabouts, automated billing, receiving and making payments, enterprise resource management, human resource management, fleet tracking, etc. Drawbacks of MAM 1. MAM is expensive as it requires building the right mobile applications for enhancing entrepreneurial decision making. 2. Version upgrade becomes difficult as this is bundled along with application. 3. Control can be at the application level only, if not integrated with MDM. ▶ Mobile Content Management (MCM) MCM is corporate data management system over the mobile platform. It is the capability of a company to store and deliver corporate data and services to the mobile devices with such precision that not only the work gets done, but complete data security is also maintained. It is the effective dissemination and protection of IT related information to the workers. Drawbacks of MCM 1. For MCM to work efficiently a native mobile app is required. 2. MCM has limited platform support and works well with only iOS and Android. To arrive at the most optimum EMM solution suite, an enterprise first has to devise the right IT policies. Once the IT policies are in place, the right people have to be hired who can implement and execute these policies for highest data security while supporting the workers when they use their mobile devices in office. There is no optimum EMM suite in general that suits all. Since different businesses have different needs and occupy different positions in the market, each business must find its own optimum EMM solutions mix. The Optimum EMM Solution Mix EMM solutions suite includes the following services:
  • 7. Enterprise Mobility Device Authentication Authorization Applications Version Management Maintaining Data Security Maintaining Reports Statistics It is imperative to install multi-layered authentication procedures through Username, DevicePasswordsandOTPs(OneTimePasswords) to keep a check on whether the devices asking access are user owned or company owned, and to enable geo-location based data access and authentication. This would help in effective geo-location tracking by keeping a tab on the location of the devices that log in. Itisimportanttokeeptheappsup-to-datethroughregularsoftwareupgrades based upon the device OS compatibility. Sending out push notifications informing the user to go for the next upgrade when there is a change in technology, or to restrict app access temporarily to address security flaws that come up are key to app maintenance and versioning. This service includes encrypting the data to restrict access, disabling the data sharing applications or utilities on authorized devices, automatic deletions of sensitive corporate data on authorized devices based on ‘time to live’ certificates, encrypting data communication on top of SSL protocol for data security, implementing asymmetric encryption key algorithms for transport layer data security. Remote Data Wipe is another useful feature that wipes out all sensitive data at the application or container level from any device remotely, in case it is lost or stolen. Customized reports and statistics go a long way in adding value to the app features, Regular updates in designing and updating records for better insight are necessary actions for the enterprise’s mobile strategy. Some useful measurement metrics are app usage vs. platform, app vs. platform versions, app vs. device OEMs, app vs. location, etc. Mobile Applications Provisioning Deployment Since enterprise gets utility based mobile apps created for enabling mobility for specific enterprise functionalities like billing, mCommerce, ERP, HRM, fleet monitoring, field force management, sales force management or accounting, etc., it is advisable that the enterprise provisions alloftheseappsfromacentrallocationonly,such as the enterprise app store. This would ensure the accessibility of certified applications through authorized devices by valid persons only.
  • 8. Policy Management Multi-platform Handling Capabilities Purpose-built Platform Growing Customer Base Listing out a set of IT rules and regulations to be followed by employees when theyusetheirpersonalmobiledevicesinoffice,oruseofficedevicesauthorized for usage at home is an essential necessity. The rules can be enforceable at the user, device and application levels. Policies like restricting app usage during office hours, blacklisting particular websites and applications, disabling app usage outside office premises, restricting the number of logins from particular devices, etc. are some examples of policy management. Mobile technology is fast evolving and every six months a new operating software getsintroduced.Ifyoudoarealitycheckonsomewell-knownmobile apps that were a rage few years back but are extinct now, you will find that many of them disappeared due to non- adaptability with their fast changing OS environments. Hence, to create your enterprise grade mobile app, you must choose a provider who is proficient with multiple platforms and not just a specialist of one. Such a provider will be able to modify and re-strategize your mobile app according to its changing environment. Choose a vendor whose platform was built from the ground up with the vision of servicing industries so that it can offer scalability and reliability that your enterprise would need for its transition to mobility. In addition to a strong vision and a robust infrastructure your EMM provider must also have a growing database of satisfied customer base and focus on customer engagements. Are they servicing across a wide range of industry verticals or are they servicing a narrow segment of the market? A vendor with a broad portfolio should be preferred.   Enterprise Mobility EMM is the call of the day, and enterprises across the world are fast adapting to this new reality. However, one of the most frequently asked questions in this regard has been how to choose the right EMM solutions provider. Some of the key points to be considered are: How to Choose your EMM Solutions Provider Many well-known mobile apps that were a rage few years back are extinct now due to non-adaptability with their fast changing OS environments.