SlideShare une entreprise Scribd logo
1  sur  60
Télécharger pour lire hors ligne
The Future of Enterprise Mobility:

Predictions
for 2014
Introduction: 2014 predictions slide deck

Introduction
Enterprise mobility is a rapidly evolving area of
technology, requiring corporate IT departments to move at a
faster pace than they were accustomed to in previous eras.
According to a recent survey, 72 percent of IT executive
respondents plan to spend more than 20 percent of their 2014
budget on mobility.
Introduction: 2014 predictions slide deck

Mobile technology offers enticing productivity gains and competitive
differentiation, yet it continues to erode the traditional top-down model of enterprise
IT control. In 2014, companies will continue to face the challenges introduced by userdriven adoption of new hardware, apps, and cloud services. They will need to solve
dynamic security and management challenges in order to offer enhanced productivity,
collaboration, and capabilities to their employees.
Introduction: 2014 predictions slide deck

While 2013 has been an exciting and eventful year in enterprise
mobility, 2014 will bring even more change.
Prediction 1:

Wearable
computing
takes off
Prediction 1: Wearable computing takes off

Until recently, wearable computing devices such
as smart watches and head-mounted displays

were seen more often in spy and sci-fi movies
than the real world. Today, Galaxy Gear is a
reality, iWatch rumors abound, and Google is
rolling out its head-mounted Glass product to the
general market in 2014.

6
Prediction 1: Wearable computing takes off

Today’s wearable computers are largely targeted at consumers, but it’s likely that
the market for business-focused wearables will grow. It’s reasonable to
expect that employees will want to use their personal wearables for work just as they
did with consumer-focused mobile devices—but this time, businesses should see it

coming.

7
Prediction 1: Wearable computing takes off

Manufacturers are doing their best to align wearables with their
overall technology portfolios. One strategy is to pair or bundle wearable
devices with smartphones. For example, Samsung has announced the release of
Samsung Galaxy Gear, a smart watch that pairs with Galaxy smartphones.

8
Prediction 1: Wearable computing takes off

With Samsung now having the largest global market share in mobile hardware, this
could propel them ahead in the wearables market. Overall, wearables will

become another way for the largest technology companies to
increase user adoption of their platforms, services, and devices.

9
Prediction 1: Wearable computing takes off

Industry specific scenarios drive
wearable computer adoption
On the surface, smart watches and head-mounted displays may seem like Silicon Valley
extravagances that lack the fundamental utility of a smartphone. However, in addition to
giving information workers faster access to the data already on their smartphones,
wearable computers will be increasingly adopted in industry-specific scenarios.

10
Prediction 1: Wearable computing takes off

For example, look at Motorola’s image of the connected police officer. While few

workers will be this wired any time soon, it demonstrates the range of applications
for the technology. One area of innovation will be devices that

provide real-time information to people who need to keep their
hands free for manual tasks, from repair techs to medical
professionals to warehouse workers.

11
Prediction 1: Wearable computing takes off

Wearable computers may also be used to track personnel,
enabling companies to enforce breaks, reduce accident risk,
and optimize routes. Another potential application is the use of biometric
monitors to reduce health insurance risk.

12
Prediction 1: Wearable computing takes off

Wearables present unique
business challenges
Businesses already face the challenge of managing iOS, Android, Windows, and legacy
mobile devices. Now add to that mix the wide range of wearable computer operating
systems and platforms, and the fact that many wearables are ultra-low-power embedded
devices that don’t support standard security software.

13
Prediction 1: Wearable computing takes off

Changes in user behavior due to wearable computers could be even more
significant. A head-mounted display, for example, could accidentally record and
transmit sensitive information. Privacy issues will also make a formal

entrance.

14
Prediction 1: Wearable computing takes off

Court cases about businesses’ rights to access employees’ personal data may

increase, and the stakes will be higher when “personal data” means capturing one’s
physical movements in detail. In 2014, organizations should begin to

define clear policies concerning privacy and the appropriate use of
wearable computers.

15
Prediction 2:

Security & compliance
challenges continue
to grow
Prediction 2: Security and compliance challenges continue to grow

Not too long ago, most employees had a single desktop PC
that was physically connected to a corporate network.

Today, many employees access these networks
on multiple devices, often over public Wi-Fi
networks. Mobile devices introduce new operating
systems, security models, and threat patterns.

17
Prediction 2: Security and compliance challenges continue to grow

While device-focused attacks are still rare compared to the PC world, they are on the
rise, according to CSO Online. Some devices tend to be targeted more

than others—a lot more according to a report by Kaspersky Lab, which claims that
99 percent of mobile malware targets Android devices.

18
Prediction 2: Security and compliance challenges continue to grow

Security researchers and, unfortunately, cybercriminals will
continue to find innovative ways to compromise mobile
systems, such as the SIM card exploit revealed earlier this year. It is possible
that we will see major mobile security incidents make headlines in 2014, and
there will be many more that are never made public.

19
Prediction 2: Security and compliance challenges continue to grow

The revelations about the degree to which US government agencies have access
to everyday communications may also lead companies to look for ways to
control access to information on mobile devices. Companies can no longer

assume that even the largest IT vendors will keep their data
private.

20
Prediction 2: Security and compliance challenges continue to grow

Users remain the key
to security
User behavior will continue to be the source of most security issues.
Of the top 10 mobile security risks mentioned by the European Union Agency for
Network and Information Security, most can be attributed to a lack of user awareness
and education. The risks include data leakage due to device loss or theft, unintentional
disclosure, malware, and network spoofing.

21
Prediction 2: Security and compliance challenges continue to grow

Companies that want to successfully minimize security risks in
2014 will include user engagement and education in their efforts.

22
Prediction 2: Security and compliance challenges continue to grow

A growing number of organizations already use technological
solutions to confront user-created security issues. For example, data loss
prevention (DLP) technology attempts to reduce unintended data leaks by detecting
sensitive data in email messages and other communications. As mobile usage grows,
companies will evaluate DLP and similar solutions based on their ability to reduce risk
on mobile platforms.

23
Prediction 3:

Competition
drives rapid
changes in the
MDM market
Prediction 3: Competition drives rapid changes in the MDM market

The mobile device management (MDM) market currently
has more than 100 companies competing for a piece of an
increasingly commoditized business, meaning some
consolidation is likely. There are now fewer viable

mobile platforms than there were a year ago.
The remaining players all provide robust management
APIs, which will obligate MDM providers to offer more

than basic hardware management services.

25
Prediction 3: Competition drives rapid changes in the MDM market

MDM providers will increasingly differentiate themselves with advanced and
innovative solutions. Examples include mobile risk management services, enhanced
cloud-based device management interfaces, unified corporate app stores, and
sophisticated user self-service portals. The goal of MDM will shift from

providing fundamental hardware controls to helping increase
mobility return on investment (ROI).

26
Prediction 3: Competition drives rapid changes in the MDM market

Mind the apps
(and the content)
If employees bring multiple devices to work, an endpoint-based management strategy
becomes less efficient than a user-based approach. Employees in bring-your-own-

device (BYOD) scenarios mix personal and business content on their
devices and are hesitant to hand over full control to IT.

27
Prediction 3: Competition drives rapid changes in the MDM market

Additionally, mobile devices are designed to integrate cloud storage and content
sharing services. Enterprises face a choice. They can give employees robust
enterprise content management tools that work with mobile devices, or they can
look for ways to manage employees’ use of public cloud services without
diminishing productivity or invading privacy.

28
Prediction 3: Competition drives rapid changes in the MDM market

Because BYOD blurs the boundaries between personal and

business use, companies will continue to push MDM boundaries by
delivering solutions for mobile application management (MAM) and mobile
content management (MCM).

29
Prediction 3: Competition drives rapid changes in the MDM market

MAM will enable wider adoption of controls at the application layer by supplementing
hardware management with better ways to manage application access and separate
personal and corporate data. As MAM matures, businesses will be better

able to support BYOD and offer employees more freedom while
maintaining company security and manageability.

30
Prediction 3: Competition drives rapid changes in the MDM market

Side by side with MAM services, more companies will adopt MCM
strategies. MCM typically aims to provide secure, controlled mobile access to
corporate resources so that employees don’t rely on consumer-oriented content
sharing platforms. For more insights into how MDM is changing, download the
Enterprise Mobile white paper “Beyond MDM.”

31
Prediction 4:

Managed mobility
services grow increasingly
important to business
success
Prediction 4: Managed mobility services grow increasingly important to business success

As businesses continue to adopt mobile technologies
across their operations, they find it harder to manage and
support mobile devices and services globally in ways that
deliver the highest ROI. Respondents to a study by the
Enterprise Mobility Exchange highlight challenges ranging
from “aligning mobile strategy with the wider business” to
“implementation challenges of ensuring technologies

communicate with each other.”

33
Prediction 4: Managed mobility services grow increasingly important to business success

How will these businesses provide best-in-class mobility support
to their employees? Increasingly, they will take advantage of
managed mobility services (MMS), a term recently coined by analysts to
describe companies that facilitate, advise, and directly assist businesses with their
mobility needs.

34
Prediction 4: Managed mobility services grow increasingly important to business success

Done properly, MMS helps decision makers evolve from working in a
reactive mode toward forming actionable plans that are aligned with
long-term strategy.

35
Prediction 4: Managed mobility services grow increasingly important to business success

MMS makes an impact in 2014
MMS is a growing market that will continue to increase
the value it offers to customers in 2014.

36
Prediction 4: Managed mobility services grow increasingly important to business success

By choosing the right MMS provider, companies will be able to take
advantage of offerings such as:
•
•
•
•
•
•

Enterprise mobility planning—Objective evaluation of key issues in mobility relevant to a
company’s needs.
Mobile application development—Platform-agnostic services that help companies design,
develop, deploy, and manage high-quality apps.
Enterprise mobility deployment—Streamlined acquisition and device deployment across
multiple mobile operating system platforms.
MDM—Evaluation, implementation, and administration of MDM, MAM, and MCM solutions.
Mobile workforce support—Training and support to extend the IT help desk and minimize
downtime.
Mobility monitoring intelligence and analytics—Standardized usage monitoring, hardware
replacement, and expense management to contain costs.

37
Prediction 5:

Operating system
features proliferate
Prediction 5: Operating system features proliferate

As with the PC market, one

of the key dynamics in
mobile technology is between third-party
applications and services and those offered
by original equipment manufacturers (OEMs).
Just as Microsoft began offering a built-in hypervisor as part of
Windows Server, mobile operating system (OS) vendors are rapidly
innovating to boost their advantages against competitors.

39
Prediction 5: Operating system features proliferate

Mobile technology companies are increasingly aligning their mobile offerings with
other services they provide. For example, Google Android 4.4 (KitKat) continues the
trend of deeper integration with Google+, Google Now, and other Google services.
Apple, Amazon, and Microsoft are doing the same. Some of this is driven by
consumerization of IT, but it also demonstrates that mobile players see services

as critical to their competitive strategy.

40
Prediction 5: Operating system features proliferate

How businesses handle these developments remains to be seen. Many companies
have significant investment in Microsoft technologies, which could give the Microsoft
mobile solution set an advantage in the business world.

41
Prediction 5: Operating system features proliferate

One focus is the growing need to separate business and personal data, which once
required custom third-party solutions to implement. Now, Apple offers data
segregation as a platform-level feature with iOS 7, and LG and Samsung provide it as
part of their enterprise security offerings (GATE and Knox, respectively).

42
Prediction 5: Operating system features proliferate

This growing trend is good for businesses, as it is part of the overall
push by device makers to improve their enterprise capabilities and
find revenue streams outside the increasingly saturated consumer
market.

43
Prediction 5: Operating system features proliferate

New features need to be secured
and managed
While mobile platforms increasingly include business-friendly features such as data
segregation, data protection, and single sign on, the market is still clearly

driven by consumer preferences.

44
Prediction 5: Operating system features proliferate

Just as BYOD shifted corporate security strategies by bringing Dropbox and other
sharing services inside the corporate firewall, consumer device features

will continue to create management and security challenges for
businesses.

45
Prediction 5: Operating system features proliferate

One writer predicts that Android will feature universal messaging, real-time location
tracking, enhanced payments services, and other features by 2020. All of these have
potential policy, security, and management implications for businesses as employees
connect Android devices to the corporate network.

46
Prediction 6:

Mobile users
drive cloud
adoption
Prediction 6: Mobile users drive cloud adoption

Cloud computing has generated its fair share of hype, but
it remains a growing phenomenon in the enterprise. While
cloud vendors often cite cost savings and scalability as key
advantages of adopting their solutions, growth in

cloud services will continue to be driven
largely by demand from mobile users.

48
Prediction 6: Mobile users drive cloud adoption

Enterprise cloud storage vendor Box, for example, has grown rapidly not because
companies are divesting themselves of local storage for cost reasons, but because

mobile users want an easy way to share and access files.

49
Prediction 6: Mobile users drive cloud adoption

Providers of cloud services and apps will aggressively roll out new
and powerful features to appeal to mobile business users. They will
also enhance the consistency of the user experience across major device platforms.

50
Prediction 6: Mobile users drive cloud adoption

Gartner recently predicted that the market for cloud-based security-as-a-

service will continue to grow. Innovations in this area will increasingly provide
new ways for companies to authenticate users and secure data and networks across onpremises and cloud-based deployments. These developments may increase the utility of
cloud services for enterprise mobile use.

51
Prediction 7:

Mobile titans
jockey for
position
Prediction 7: Mobile titans jockey for position

What do Palm, Nokia, and BlackBerry (formerly known as
Research in Motion) have in common? They were all vast,
successful, highly profitable enterprises that defined the
mobile technology landscape over the past decade. And
all were (or are in the process of being) sold for a small
fraction of their peak value.

53
Prediction 7: Mobile titans jockey for position

When the divide between business and consumer technology was
wider, vendors could count on winning market share by appealing to
business decision makers with enterprise-friendly features.

54
Prediction 7: Mobile titans jockey for position

In the mobile space today, consumers drive adoption and businesses
play catch up. The remaining players are businesses that have succeeded in building
more than mobile devices. They have created strong brands and rich ecosystems that
keep fickle customers loyal.

55
Prediction 7: Mobile titans jockey for position

Competition drives innovation
Amazon, Apple, Google, Microsoft, and Samsung will continue battling for dominance in
the mobile space. Competition will deliver continued innovations in

hardware, user experiences, cloud services, apps, and content. Some
of these innovations will be a boon to enterprise, while others will create challenges.

56
Prediction 7: Mobile titans jockey for position

Although consumer preferences still drive mobile technology development,

manufacturers are increasingly recognizing enterprise needs. In
any case, while mobile vendors may seem to have secured positions in the mobile
market, their strategic wiggle room is shrinking and there may be further
consolidation in the not-too-distant future.

57
Conclusion: 2014 predictions slide deck

Conclusion
Mobile is a moving target—steady your aim.
In such a fast-moving market, it is challenging to predict how
things will look next quarter, let alone next year. One thing is

certain: enterprises will continue to adopt mobile
technology at a rapid pace. They will need to keep
evolving their approach to security, compliance, management,
and deployment of mobile devices, services, and apps to
maintain ROI and competitive advantage.
Conclusion: 2014 predictions slide deck

Enterprise Mobile is well-positioned to help organizations achieve their mobility goals with a
holistic approach to planning, implementing, and managing mobility environments. Through
our comprehensive portfolio of services, we can simplify your company’s transition

to enterprise mobility today and help you get the most from tomorrow’s
mobile technology innovations.
For more information, visit www.enterprisemobile.com or contact
info@enterprisemobile.com. Or follow us online:

/

/

/

/

59
2014 Predictions for Enterprise Mobility

Contenu connexe

Tendances

IT Touchless Operations
IT Touchless OperationsIT Touchless Operations
IT Touchless Operationsaccenture
 
How to get prepared for SharePoint Syntex
How to get prepared for SharePoint SyntexHow to get prepared for SharePoint Syntex
How to get prepared for SharePoint SyntexNicolas Georgeault
 
Büyük veri(bigdata)
Büyük veri(bigdata)Büyük veri(bigdata)
Büyük veri(bigdata)Hülya Soylu
 
Building successful data science teams
Building successful data science teamsBuilding successful data science teams
Building successful data science teamsVenkatesh Umaashankar
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platformaccenture
 
How enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceHow enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceaccenture
 
Metaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit SuisseMetaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit SuisseHarsha MV
 
Big data and Social Media Analytics
Big data and Social Media AnalyticsBig data and Social Media Analytics
Big data and Social Media AnalyticsSimplify360
 
Building a Data-Driven Culture
Building a Data-Driven CultureBuilding a Data-Driven Culture
Building a Data-Driven CultureLucas Neo
 
Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02DataReportal
 
Fjord Trends 2022: Communications Industry
Fjord Trends 2022: Communications IndustryFjord Trends 2022: Communications Industry
Fjord Trends 2022: Communications Industryaccenture
 
Proximity London - The New Normal
Proximity London - The New NormalProximity London - The New Normal
Proximity London - The New NormalTaylorRowe8
 
Building a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will SupportBuilding a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will SupportReid Colson
 
Digital 2022: Essential TikTok Stats for Q3 2022 v01
Digital 2022: Essential TikTok Stats for Q3 2022 v01Digital 2022: Essential TikTok Stats for Q3 2022 v01
Digital 2022: Essential TikTok Stats for Q3 2022 v01DataReportal
 
Digital 2023 April Global Statshot Report v01 (April 2023)
Digital 2023 April Global Statshot Report v01 (April 2023)Digital 2023 April Global Statshot Report v01 (April 2023)
Digital 2023 April Global Statshot Report v01 (April 2023)DataReportal
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365Robert Crane
 

Tendances (20)

IT Touchless Operations
IT Touchless OperationsIT Touchless Operations
IT Touchless Operations
 
How to get prepared for SharePoint Syntex
How to get prepared for SharePoint SyntexHow to get prepared for SharePoint Syntex
How to get prepared for SharePoint Syntex
 
Digital News Report 2022
Digital News Report 2022Digital News Report 2022
Digital News Report 2022
 
Büyük veri(bigdata)
Büyük veri(bigdata)Büyük veri(bigdata)
Büyük veri(bigdata)
 
Creating a Data Driven Culture
Creating a Data Driven Culture Creating a Data Driven Culture
Creating a Data Driven Culture
 
Building successful data science teams
Building successful data science teamsBuilding successful data science teams
Building successful data science teams
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platform
 
Havas deck
Havas deckHavas deck
Havas deck
 
How enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceHow enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experience
 
Metaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit SuisseMetaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit Suisse
 
Big data and Social Media Analytics
Big data and Social Media AnalyticsBig data and Social Media Analytics
Big data and Social Media Analytics
 
Building a Data-Driven Culture
Building a Data-Driven CultureBuilding a Data-Driven Culture
Building a Data-Driven Culture
 
Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02
 
Fjord Trends 2022: Communications Industry
Fjord Trends 2022: Communications IndustryFjord Trends 2022: Communications Industry
Fjord Trends 2022: Communications Industry
 
Proximity London - The New Normal
Proximity London - The New NormalProximity London - The New Normal
Proximity London - The New Normal
 
Building a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will SupportBuilding a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will Support
 
Digital 2022: Essential TikTok Stats for Q3 2022 v01
Digital 2022: Essential TikTok Stats for Q3 2022 v01Digital 2022: Essential TikTok Stats for Q3 2022 v01
Digital 2022: Essential TikTok Stats for Q3 2022 v01
 
Digital 2023 April Global Statshot Report v01 (April 2023)
Digital 2023 April Global Statshot Report v01 (April 2023)Digital 2023 April Global Statshot Report v01 (April 2023)
Digital 2023 April Global Statshot Report v01 (April 2023)
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 

Similaire à 2014 Predictions for Enterprise Mobility

Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Technology Trends 2013
Technology Trends 2013Technology Trends 2013
Technology Trends 2013IMC Institute
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013IMC Institute
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxSameerShaik43
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperAbhishek Sood
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022Bernard Marr
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxsreevidyaopenteq
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 

Similaire à 2014 Predictions for Enterprise Mobility (20)

Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Security that works
Security that worksSecurity that works
Security that works
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Technology Trends 2013
Technology Trends 2013Technology Trends 2013
Technology Trends 2013
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
 
Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017
 
Top Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 articleTop Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 article
 
Oracle's Top 10 Cloud Predictions
Oracle's Top 10 Cloud PredictionsOracle's Top 10 Cloud Predictions
Oracle's Top 10 Cloud Predictions
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

2014 Predictions for Enterprise Mobility

  • 1. The Future of Enterprise Mobility: Predictions for 2014
  • 2. Introduction: 2014 predictions slide deck Introduction Enterprise mobility is a rapidly evolving area of technology, requiring corporate IT departments to move at a faster pace than they were accustomed to in previous eras. According to a recent survey, 72 percent of IT executive respondents plan to spend more than 20 percent of their 2014 budget on mobility.
  • 3. Introduction: 2014 predictions slide deck Mobile technology offers enticing productivity gains and competitive differentiation, yet it continues to erode the traditional top-down model of enterprise IT control. In 2014, companies will continue to face the challenges introduced by userdriven adoption of new hardware, apps, and cloud services. They will need to solve dynamic security and management challenges in order to offer enhanced productivity, collaboration, and capabilities to their employees.
  • 4. Introduction: 2014 predictions slide deck While 2013 has been an exciting and eventful year in enterprise mobility, 2014 will bring even more change.
  • 6. Prediction 1: Wearable computing takes off Until recently, wearable computing devices such as smart watches and head-mounted displays were seen more often in spy and sci-fi movies than the real world. Today, Galaxy Gear is a reality, iWatch rumors abound, and Google is rolling out its head-mounted Glass product to the general market in 2014. 6
  • 7. Prediction 1: Wearable computing takes off Today’s wearable computers are largely targeted at consumers, but it’s likely that the market for business-focused wearables will grow. It’s reasonable to expect that employees will want to use their personal wearables for work just as they did with consumer-focused mobile devices—but this time, businesses should see it coming. 7
  • 8. Prediction 1: Wearable computing takes off Manufacturers are doing their best to align wearables with their overall technology portfolios. One strategy is to pair or bundle wearable devices with smartphones. For example, Samsung has announced the release of Samsung Galaxy Gear, a smart watch that pairs with Galaxy smartphones. 8
  • 9. Prediction 1: Wearable computing takes off With Samsung now having the largest global market share in mobile hardware, this could propel them ahead in the wearables market. Overall, wearables will become another way for the largest technology companies to increase user adoption of their platforms, services, and devices. 9
  • 10. Prediction 1: Wearable computing takes off Industry specific scenarios drive wearable computer adoption On the surface, smart watches and head-mounted displays may seem like Silicon Valley extravagances that lack the fundamental utility of a smartphone. However, in addition to giving information workers faster access to the data already on their smartphones, wearable computers will be increasingly adopted in industry-specific scenarios. 10
  • 11. Prediction 1: Wearable computing takes off For example, look at Motorola’s image of the connected police officer. While few workers will be this wired any time soon, it demonstrates the range of applications for the technology. One area of innovation will be devices that provide real-time information to people who need to keep their hands free for manual tasks, from repair techs to medical professionals to warehouse workers. 11
  • 12. Prediction 1: Wearable computing takes off Wearable computers may also be used to track personnel, enabling companies to enforce breaks, reduce accident risk, and optimize routes. Another potential application is the use of biometric monitors to reduce health insurance risk. 12
  • 13. Prediction 1: Wearable computing takes off Wearables present unique business challenges Businesses already face the challenge of managing iOS, Android, Windows, and legacy mobile devices. Now add to that mix the wide range of wearable computer operating systems and platforms, and the fact that many wearables are ultra-low-power embedded devices that don’t support standard security software. 13
  • 14. Prediction 1: Wearable computing takes off Changes in user behavior due to wearable computers could be even more significant. A head-mounted display, for example, could accidentally record and transmit sensitive information. Privacy issues will also make a formal entrance. 14
  • 15. Prediction 1: Wearable computing takes off Court cases about businesses’ rights to access employees’ personal data may increase, and the stakes will be higher when “personal data” means capturing one’s physical movements in detail. In 2014, organizations should begin to define clear policies concerning privacy and the appropriate use of wearable computers. 15
  • 16. Prediction 2: Security & compliance challenges continue to grow
  • 17. Prediction 2: Security and compliance challenges continue to grow Not too long ago, most employees had a single desktop PC that was physically connected to a corporate network. Today, many employees access these networks on multiple devices, often over public Wi-Fi networks. Mobile devices introduce new operating systems, security models, and threat patterns. 17
  • 18. Prediction 2: Security and compliance challenges continue to grow While device-focused attacks are still rare compared to the PC world, they are on the rise, according to CSO Online. Some devices tend to be targeted more than others—a lot more according to a report by Kaspersky Lab, which claims that 99 percent of mobile malware targets Android devices. 18
  • 19. Prediction 2: Security and compliance challenges continue to grow Security researchers and, unfortunately, cybercriminals will continue to find innovative ways to compromise mobile systems, such as the SIM card exploit revealed earlier this year. It is possible that we will see major mobile security incidents make headlines in 2014, and there will be many more that are never made public. 19
  • 20. Prediction 2: Security and compliance challenges continue to grow The revelations about the degree to which US government agencies have access to everyday communications may also lead companies to look for ways to control access to information on mobile devices. Companies can no longer assume that even the largest IT vendors will keep their data private. 20
  • 21. Prediction 2: Security and compliance challenges continue to grow Users remain the key to security User behavior will continue to be the source of most security issues. Of the top 10 mobile security risks mentioned by the European Union Agency for Network and Information Security, most can be attributed to a lack of user awareness and education. The risks include data leakage due to device loss or theft, unintentional disclosure, malware, and network spoofing. 21
  • 22. Prediction 2: Security and compliance challenges continue to grow Companies that want to successfully minimize security risks in 2014 will include user engagement and education in their efforts. 22
  • 23. Prediction 2: Security and compliance challenges continue to grow A growing number of organizations already use technological solutions to confront user-created security issues. For example, data loss prevention (DLP) technology attempts to reduce unintended data leaks by detecting sensitive data in email messages and other communications. As mobile usage grows, companies will evaluate DLP and similar solutions based on their ability to reduce risk on mobile platforms. 23
  • 25. Prediction 3: Competition drives rapid changes in the MDM market The mobile device management (MDM) market currently has more than 100 companies competing for a piece of an increasingly commoditized business, meaning some consolidation is likely. There are now fewer viable mobile platforms than there were a year ago. The remaining players all provide robust management APIs, which will obligate MDM providers to offer more than basic hardware management services. 25
  • 26. Prediction 3: Competition drives rapid changes in the MDM market MDM providers will increasingly differentiate themselves with advanced and innovative solutions. Examples include mobile risk management services, enhanced cloud-based device management interfaces, unified corporate app stores, and sophisticated user self-service portals. The goal of MDM will shift from providing fundamental hardware controls to helping increase mobility return on investment (ROI). 26
  • 27. Prediction 3: Competition drives rapid changes in the MDM market Mind the apps (and the content) If employees bring multiple devices to work, an endpoint-based management strategy becomes less efficient than a user-based approach. Employees in bring-your-own- device (BYOD) scenarios mix personal and business content on their devices and are hesitant to hand over full control to IT. 27
  • 28. Prediction 3: Competition drives rapid changes in the MDM market Additionally, mobile devices are designed to integrate cloud storage and content sharing services. Enterprises face a choice. They can give employees robust enterprise content management tools that work with mobile devices, or they can look for ways to manage employees’ use of public cloud services without diminishing productivity or invading privacy. 28
  • 29. Prediction 3: Competition drives rapid changes in the MDM market Because BYOD blurs the boundaries between personal and business use, companies will continue to push MDM boundaries by delivering solutions for mobile application management (MAM) and mobile content management (MCM). 29
  • 30. Prediction 3: Competition drives rapid changes in the MDM market MAM will enable wider adoption of controls at the application layer by supplementing hardware management with better ways to manage application access and separate personal and corporate data. As MAM matures, businesses will be better able to support BYOD and offer employees more freedom while maintaining company security and manageability. 30
  • 31. Prediction 3: Competition drives rapid changes in the MDM market Side by side with MAM services, more companies will adopt MCM strategies. MCM typically aims to provide secure, controlled mobile access to corporate resources so that employees don’t rely on consumer-oriented content sharing platforms. For more insights into how MDM is changing, download the Enterprise Mobile white paper “Beyond MDM.” 31
  • 32. Prediction 4: Managed mobility services grow increasingly important to business success
  • 33. Prediction 4: Managed mobility services grow increasingly important to business success As businesses continue to adopt mobile technologies across their operations, they find it harder to manage and support mobile devices and services globally in ways that deliver the highest ROI. Respondents to a study by the Enterprise Mobility Exchange highlight challenges ranging from “aligning mobile strategy with the wider business” to “implementation challenges of ensuring technologies communicate with each other.” 33
  • 34. Prediction 4: Managed mobility services grow increasingly important to business success How will these businesses provide best-in-class mobility support to their employees? Increasingly, they will take advantage of managed mobility services (MMS), a term recently coined by analysts to describe companies that facilitate, advise, and directly assist businesses with their mobility needs. 34
  • 35. Prediction 4: Managed mobility services grow increasingly important to business success Done properly, MMS helps decision makers evolve from working in a reactive mode toward forming actionable plans that are aligned with long-term strategy. 35
  • 36. Prediction 4: Managed mobility services grow increasingly important to business success MMS makes an impact in 2014 MMS is a growing market that will continue to increase the value it offers to customers in 2014. 36
  • 37. Prediction 4: Managed mobility services grow increasingly important to business success By choosing the right MMS provider, companies will be able to take advantage of offerings such as: • • • • • • Enterprise mobility planning—Objective evaluation of key issues in mobility relevant to a company’s needs. Mobile application development—Platform-agnostic services that help companies design, develop, deploy, and manage high-quality apps. Enterprise mobility deployment—Streamlined acquisition and device deployment across multiple mobile operating system platforms. MDM—Evaluation, implementation, and administration of MDM, MAM, and MCM solutions. Mobile workforce support—Training and support to extend the IT help desk and minimize downtime. Mobility monitoring intelligence and analytics—Standardized usage monitoring, hardware replacement, and expense management to contain costs. 37
  • 39. Prediction 5: Operating system features proliferate As with the PC market, one of the key dynamics in mobile technology is between third-party applications and services and those offered by original equipment manufacturers (OEMs). Just as Microsoft began offering a built-in hypervisor as part of Windows Server, mobile operating system (OS) vendors are rapidly innovating to boost their advantages against competitors. 39
  • 40. Prediction 5: Operating system features proliferate Mobile technology companies are increasingly aligning their mobile offerings with other services they provide. For example, Google Android 4.4 (KitKat) continues the trend of deeper integration with Google+, Google Now, and other Google services. Apple, Amazon, and Microsoft are doing the same. Some of this is driven by consumerization of IT, but it also demonstrates that mobile players see services as critical to their competitive strategy. 40
  • 41. Prediction 5: Operating system features proliferate How businesses handle these developments remains to be seen. Many companies have significant investment in Microsoft technologies, which could give the Microsoft mobile solution set an advantage in the business world. 41
  • 42. Prediction 5: Operating system features proliferate One focus is the growing need to separate business and personal data, which once required custom third-party solutions to implement. Now, Apple offers data segregation as a platform-level feature with iOS 7, and LG and Samsung provide it as part of their enterprise security offerings (GATE and Knox, respectively). 42
  • 43. Prediction 5: Operating system features proliferate This growing trend is good for businesses, as it is part of the overall push by device makers to improve their enterprise capabilities and find revenue streams outside the increasingly saturated consumer market. 43
  • 44. Prediction 5: Operating system features proliferate New features need to be secured and managed While mobile platforms increasingly include business-friendly features such as data segregation, data protection, and single sign on, the market is still clearly driven by consumer preferences. 44
  • 45. Prediction 5: Operating system features proliferate Just as BYOD shifted corporate security strategies by bringing Dropbox and other sharing services inside the corporate firewall, consumer device features will continue to create management and security challenges for businesses. 45
  • 46. Prediction 5: Operating system features proliferate One writer predicts that Android will feature universal messaging, real-time location tracking, enhanced payments services, and other features by 2020. All of these have potential policy, security, and management implications for businesses as employees connect Android devices to the corporate network. 46
  • 48. Prediction 6: Mobile users drive cloud adoption Cloud computing has generated its fair share of hype, but it remains a growing phenomenon in the enterprise. While cloud vendors often cite cost savings and scalability as key advantages of adopting their solutions, growth in cloud services will continue to be driven largely by demand from mobile users. 48
  • 49. Prediction 6: Mobile users drive cloud adoption Enterprise cloud storage vendor Box, for example, has grown rapidly not because companies are divesting themselves of local storage for cost reasons, but because mobile users want an easy way to share and access files. 49
  • 50. Prediction 6: Mobile users drive cloud adoption Providers of cloud services and apps will aggressively roll out new and powerful features to appeal to mobile business users. They will also enhance the consistency of the user experience across major device platforms. 50
  • 51. Prediction 6: Mobile users drive cloud adoption Gartner recently predicted that the market for cloud-based security-as-a- service will continue to grow. Innovations in this area will increasingly provide new ways for companies to authenticate users and secure data and networks across onpremises and cloud-based deployments. These developments may increase the utility of cloud services for enterprise mobile use. 51
  • 53. Prediction 7: Mobile titans jockey for position What do Palm, Nokia, and BlackBerry (formerly known as Research in Motion) have in common? They were all vast, successful, highly profitable enterprises that defined the mobile technology landscape over the past decade. And all were (or are in the process of being) sold for a small fraction of their peak value. 53
  • 54. Prediction 7: Mobile titans jockey for position When the divide between business and consumer technology was wider, vendors could count on winning market share by appealing to business decision makers with enterprise-friendly features. 54
  • 55. Prediction 7: Mobile titans jockey for position In the mobile space today, consumers drive adoption and businesses play catch up. The remaining players are businesses that have succeeded in building more than mobile devices. They have created strong brands and rich ecosystems that keep fickle customers loyal. 55
  • 56. Prediction 7: Mobile titans jockey for position Competition drives innovation Amazon, Apple, Google, Microsoft, and Samsung will continue battling for dominance in the mobile space. Competition will deliver continued innovations in hardware, user experiences, cloud services, apps, and content. Some of these innovations will be a boon to enterprise, while others will create challenges. 56
  • 57. Prediction 7: Mobile titans jockey for position Although consumer preferences still drive mobile technology development, manufacturers are increasingly recognizing enterprise needs. In any case, while mobile vendors may seem to have secured positions in the mobile market, their strategic wiggle room is shrinking and there may be further consolidation in the not-too-distant future. 57
  • 58. Conclusion: 2014 predictions slide deck Conclusion Mobile is a moving target—steady your aim. In such a fast-moving market, it is challenging to predict how things will look next quarter, let alone next year. One thing is certain: enterprises will continue to adopt mobile technology at a rapid pace. They will need to keep evolving their approach to security, compliance, management, and deployment of mobile devices, services, and apps to maintain ROI and competitive advantage.
  • 59. Conclusion: 2014 predictions slide deck Enterprise Mobile is well-positioned to help organizations achieve their mobility goals with a holistic approach to planning, implementing, and managing mobility environments. Through our comprehensive portfolio of services, we can simplify your company’s transition to enterprise mobility today and help you get the most from tomorrow’s mobile technology innovations. For more information, visit www.enterprisemobile.com or contact info@enterprisemobile.com. Or follow us online: / / / / 59