SlideShare une entreprise Scribd logo
1  sur  18
Key Trends and Opportunities in Business Mobility and Enterprise Communications
1      Key Trends in 2011 Rise of Handheld Computers BYOD “Bring Your Own Device” The Consumerization of Enterprise IT      Key Challenges for IT Meeting User Expectations Increased Support and Maintenance Costs New Security and Compliance Risks       The Options for IT Factors to Consider Approaches To Consumerization Enterprise Mobilization Strategy      Conclusions and Final Remarks 2 3 4 Agenda
1  Key Trends in 2011
Three Key Trends In 2011 1 Smartphones and tablets are the new PC Consumers are adopting smartphones faster than just about any other tech product in history. 2 Bring Your Own Device is changing how we work Employees now expect to be able to use the smartphones and tablets they bought for personal use. 3 Consumer Technology is influencing the enterprise Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.
75% 61% 95% US corporations where employees use tablets for work purposes. Strategy Analytics via PCWorld April 2011 Information Workers Using Self-purchased Technology For Work IDC survey of IT Consumerization Trends March 2011 Enterprises with 'Bring Your Own Device' policies Aberdeen data via ZDNet March 2011
“ Employers don’t know  how many or what consumer technologies are in use.  Workers report using consumer devices attwice the rateemployers reported. Survey of IT Consumerization Trends IDC, March 2011
2  Key Challenges for IT
Key Challenges For IT 1 Shift to a more consumer-oriented IT focus IT needs to bridge the growing gap between employee and IT interests. 2 Consumerization can increase IT costs dramatically. An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly. 3 New security and compliance risks Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.
“ IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.
3  The Options for IT
Factors To Consider Security Requirements Does the company work with sensitive data? Is the company risk-averse? Industry compliance and regulation Mobility Desktop Computer VS Mobile Devices Can mobile applications help the company ’s employees, customers, and value and supply chain partners? What functionalities does each user group need mobilized? What device types, capabilities and hardware need to be enabled? Company Culture Tech-savy VS Tech-challenged Flexible working culture that allows home office work
Approaches To Consumerization Companyowned High BYOD Consumerization Security Risks High Low Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)
“ The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service. Magic Quadrant for PC Configuration Life Cycle Management Tools Gartner, January 2011
4 Conclusions and Final Remarks
Enterprise Mobility Initiatives Support more smartphones, tablets, and other devices Deploymobile applications Establishmobility policies Securedata from criminals, malware and other threats Offerthe sort of technology experience users have come to expect from consumer technologies
“ CIOs must get ahead of the curve by coming to  terms with what is valuable about consumerization. Handled properly, it can increase productivity and even lower IT costs. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010
Thank You Raul Castanon-Martinez http://www.linkedin.com/in/rcastanon http://newchannelbuzz.com/ http://twitter.com/newchannelbuzz

Contenu connexe

Tendances

Tendances (18)

Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
Global Technology Outlook
Global Technology Outlook Global Technology Outlook
Global Technology Outlook
 
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
 
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
 
Top 5 ICT Issues for Indonesia to address
Top 5 ICT Issues for Indonesia to addressTop 5 ICT Issues for Indonesia to address
Top 5 ICT Issues for Indonesia to address
 
The present and future of consumer IoT
The present and future of consumer IoTThe present and future of consumer IoT
The present and future of consumer IoT
 
My 2010 Trends
My 2010 TrendsMy 2010 Trends
My 2010 Trends
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
 
Role of it in finance
Role of it in financeRole of it in finance
Role of it in finance
 
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
Emerging Technologies: Changing how we live, work and play  EY-Mint Emerging ...
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
How smart, connected products are transforming companies presentation (edit...
How smart, connected products are transforming companies   presentation (edit...How smart, connected products are transforming companies   presentation (edit...
How smart, connected products are transforming companies presentation (edit...
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
 
Digital leadership in disruptive changes
Digital leadership in disruptive changesDigital leadership in disruptive changes
Digital leadership in disruptive changes
 

En vedette

Mobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based SolutionsMobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based Solutions
Raúl Castañón Martínez
 

En vedette (6)

In-app purchases
In-app purchasesIn-app purchases
In-app purchases
 
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic UncertaintyMobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
 
Mobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based SolutionsMobility Era Demands Flexible API-based Solutions
Mobility Era Demands Flexible API-based Solutions
 
Mobile Apps Monetization
Mobile Apps MonetizationMobile Apps Monetization
Mobile Apps Monetization
 
Bots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for ITBots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for IT
 
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceMobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
 

Similaire à Key Trends and Opportunities in Business Mobility and Enterprise Communications

Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
OKTOPUS Consulting
 
Top 10-technology-tr
Top 10-technology-trTop 10-technology-tr
Top 10-technology-tr
Nissar Ahamed
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
Транслируем.бел
 

Similaire à Key Trends and Opportunities in Business Mobility and Enterprise Communications (20)

Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Adopt new technology for 2011 and beyond
Adopt new technology for 2011 and beyondAdopt new technology for 2011 and beyond
Adopt new technology for 2011 and beyond
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
 
Mobilidade
MobilidadeMobilidade
Mobilidade
 
ict.......pptx
ict.......pptxict.......pptx
ict.......pptx
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
Top 10-technology-tr
Top 10-technology-trTop 10-technology-tr
Top 10-technology-tr
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Tech trends 2010
Tech trends 2010Tech trends 2010
Tech trends 2010
 
The IT archipelago
The IT archipelagoThe IT archipelago
The IT archipelago
 
The Internet of Things; a multi-trillion dollar opportunity
The Internet of Things; a multi-trillion dollar opportunityThe Internet of Things; a multi-trillion dollar opportunity
The Internet of Things; a multi-trillion dollar opportunity
 
Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
 Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A... Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
Capgemini Consulting: “The Internet of Things: Are Organizations Ready For A...
 
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsIndustry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Intel
IntelIntel
Intel
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 

Plus de Raúl Castañón Martínez

Plus de Raúl Castañón Martínez (18)

CPaaS Is Turning Business Communications Inside Out
CPaaS Is Turning Business Communications Inside OutCPaaS Is Turning Business Communications Inside Out
CPaaS Is Turning Business Communications Inside Out
 
Speech Technologies Inside the Enterprise
Speech Technologies Inside the EnterpriseSpeech Technologies Inside the Enterprise
Speech Technologies Inside the Enterprise
 
How CPaaS is Emerging as a Catalyst for Digital Transformation
How CPaaS is Emerging as a Catalyst for Digital TransformationHow CPaaS is Emerging as a Catalyst for Digital Transformation
How CPaaS is Emerging as a Catalyst for Digital Transformation
 
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
Second-Wave Mobility: How Mobile-Native Communications Enables the Virtual Wo...
 
The CPaaS Opportunity for Service Providers
The CPaaS Opportunity for Service ProvidersThe CPaaS Opportunity for Service Providers
The CPaaS Opportunity for Service Providers
 
Deep Work in the Era of Real-Time Communications
Deep Work in the Era of Real-Time CommunicationsDeep Work in the Era of Real-Time Communications
Deep Work in the Era of Real-Time Communications
 
The state of the CPaaS market and digital transformation
The state of the CPaaS market and digital transformationThe state of the CPaaS market and digital transformation
The state of the CPaaS market and digital transformation
 
Enterprise Use Cases for Speech Technologies
Enterprise Use Cases for Speech TechnologiesEnterprise Use Cases for Speech Technologies
Enterprise Use Cases for Speech Technologies
 
How Mobile Transforms the Enterprise
How Mobile Transforms the EnterpriseHow Mobile Transforms the Enterprise
How Mobile Transforms the Enterprise
 
Latin America Social Networking
Latin America Social NetworkingLatin America Social Networking
Latin America Social Networking
 
Infographic: Fixed and Mobile Network Traffic H2 2012
Infographic: Fixed and Mobile Network Traffic H2 2012Infographic: Fixed and Mobile Network Traffic H2 2012
Infographic: Fixed and Mobile Network Traffic H2 2012
 
Here's why data is the new mantra in Latin America
Here's why data is the new mantra in Latin AmericaHere's why data is the new mantra in Latin America
Here's why data is the new mantra in Latin America
 
Latin America 2013 Telecommunications Market Key Statistics
Latin America 2013 Telecommunications Market Key StatisticsLatin America 2013 Telecommunications Market Key Statistics
Latin America 2013 Telecommunications Market Key Statistics
 
2009 IBC VAS Mobile Forum LATAM
2009 IBC VAS Mobile Forum LATAM2009 IBC VAS Mobile Forum LATAM
2009 IBC VAS Mobile Forum LATAM
 
2009 Telecom Outlook
2009 Telecom Outlook2009 Telecom Outlook
2009 Telecom Outlook
 
iPhone For LATAM
iPhone For LATAMiPhone For LATAM
iPhone For LATAM
 
Voice Mail Strategy Chile
Voice Mail Strategy ChileVoice Mail Strategy Chile
Voice Mail Strategy Chile
 
Instant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenuesInstant SMS: Bringing SMS to the next phase and increasing service revenues
Instant SMS: Bringing SMS to the next phase and increasing service revenues
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Key Trends and Opportunities in Business Mobility and Enterprise Communications

  • 1. Key Trends and Opportunities in Business Mobility and Enterprise Communications
  • 2. 1 Key Trends in 2011 Rise of Handheld Computers BYOD “Bring Your Own Device” The Consumerization of Enterprise IT Key Challenges for IT Meeting User Expectations Increased Support and Maintenance Costs New Security and Compliance Risks The Options for IT Factors to Consider Approaches To Consumerization Enterprise Mobilization Strategy Conclusions and Final Remarks 2 3 4 Agenda
  • 3. 1 Key Trends in 2011
  • 4.
  • 5. Three Key Trends In 2011 1 Smartphones and tablets are the new PC Consumers are adopting smartphones faster than just about any other tech product in history. 2 Bring Your Own Device is changing how we work Employees now expect to be able to use the smartphones and tablets they bought for personal use. 3 Consumer Technology is influencing the enterprise Innovations in information and communication technology have shifted to the consumer, while corporate IT remains trapped behind firewalls and other data security restrictions.
  • 6. 75% 61% 95% US corporations where employees use tablets for work purposes. Strategy Analytics via PCWorld April 2011 Information Workers Using Self-purchased Technology For Work IDC survey of IT Consumerization Trends March 2011 Enterprises with 'Bring Your Own Device' policies Aberdeen data via ZDNet March 2011
  • 7. “ Employers don’t know how many or what consumer technologies are in use. Workers report using consumer devices attwice the rateemployers reported. Survey of IT Consumerization Trends IDC, March 2011
  • 8. 2 Key Challenges for IT
  • 9. Key Challenges For IT 1 Shift to a more consumer-oriented IT focus IT needs to bridge the growing gap between employee and IT interests. 2 Consumerization can increase IT costs dramatically. An increased number and diversity of devices can increase support and maintenance costs; development of “consumer-oriented” services and applications can be costly. 3 New security and compliance risks Opening the corporate IT environment to personal devices increases security risks and the potential for data leakage and malicious attacks.
  • 10. “ IT needs to balance meeting the demands of business and introduction of new technologies while maintaining service levels in an increasingly complex environment with endless combinations of platforms,systems and applications, security threats and new deploymentalternatives.
  • 11. 3 The Options for IT
  • 12. Factors To Consider Security Requirements Does the company work with sensitive data? Is the company risk-averse? Industry compliance and regulation Mobility Desktop Computer VS Mobile Devices Can mobile applications help the company ’s employees, customers, and value and supply chain partners? What functionalities does each user group need mobilized? What device types, capabilities and hardware need to be enabled? Company Culture Tech-savy VS Tech-challenged Flexible working culture that allows home office work
  • 13. Approaches To Consumerization Companyowned High BYOD Consumerization Security Risks High Low Adapted from Friendly Takeover: The Consumerization of Corporate IT, Booz & Company (2010)
  • 14. “ The PCCLM market continues to mature; however, most of the vendors decreased in Completeness of Vision, because they are behind the market in meeting several emerging requirements, including non-Windows device management, desktop virtualization management and software as a service. Magic Quadrant for PC Configuration Life Cycle Management Tools Gartner, January 2011
  • 15. 4 Conclusions and Final Remarks
  • 16. Enterprise Mobility Initiatives Support more smartphones, tablets, and other devices Deploymobile applications Establishmobility policies Securedata from criminals, malware and other threats Offerthe sort of technology experience users have come to expect from consumer technologies
  • 17. “ CIOs must get ahead of the curve by coming to terms with what is valuable about consumerization. Handled properly, it can increase productivity and even lower IT costs. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010
  • 18. Thank You Raul Castanon-Martinez http://www.linkedin.com/in/rcastanon http://newchannelbuzz.com/ http://twitter.com/newchannelbuzz
  • 19. “ Companies that make the shift to consumer-oriented IT will see real benefits in the form of lower costs and happier, more productive employees. Companies that don’tface a future in which employees will do it stealthily, leading to technological chaos and security issues. Friendly Takeover: The Consumerization of Corporate IT Booz & Company, 2010

Notes de l'éditeur

  1. The smartphone revolution of the last three years has changed how mobile workers operate.
  2. Consumers are adopting smartphones faster than just about tech product in history.Smartphones will exceed 420 million devices in 2011, nearly 28% of the global handset market.(IMS Research, http://imsresearch.com/press-release/Global_Smartphones_Sales_Will_Top_420_Million_Devices_in_2011_Taking_28_Percent_of_all_Handsets_According_to_IMS_Research)More than likely, these devices are already being brought into the workplace.New information technology is emerging first in the consumer market and then spreading into business organizations
  3. A recent IDC survey found that 95% of respondents have used technology they purchased themselves for work. (“Consumerization of IT: 95% of Information Workers Use Self-Purchased Technology for Work”http://www.readwriteweb.com/enterprise/2011/03/consumerization-of-it-95-of-in.phpAccording to Aberdeen data (from late 2010 and 2011 surveys), almost 75% of companies allow employee-owned smartphones and/or tablets to be used at work. 25% give employees a whitelist of allowed devices and almost half let employees bring in and use any device.(“75% of Enterprises Have 'Bring Your Own Device' Policies. What That Means” http://www.zdnet.com/blog/sybase/75-of-enterprises-have-bring-your-own-device-policies-what-that-means-charts/1025), via Simply Security Report: ‘BYOD’ is changing workplaces http://www.simplysecurity.com/2011/06/09/report-byod-consumerization-is-changing-workplaces/A report from Strategy Analytics shows that 61% of U.S. corporation have found that their employees are already using tablets for work purposes(“Ready or not, iPad, other tablets are in the enterprise”, http://www.pcworldme.net/2011/04/15/ready-or-not-ipad-other-tablets-are-in-the-enterprise/)
  4. It is clear that there is a disconnect between employees and employers about how consumer technologies are used in the enterprise.95% of employees use self-purchased technologies for work, 70% employers want to buy standardized technologies for them.
  5. A consumer-oriented IT focus is more than just aiming to please the end user but rather, leveraging new technologies to improve employee productivity and reduce IT costs. Mobile professionals spend time away from their desk and require tools that will let them do their job: field sales, field service, production, consultants, managers. The question is how can IT create the right environment for them?Increased IT costs - One of the reasons IT might be unwilling to allow personal devices are the added support and maintenance costs due to increased complexity caused by more heterogeneous computing environments. In addition, there is the possibility to go overboard and try to compete with consumer products through the development of “consumer-oriented” services and applications.
  6. End users and technology are pulling the organization one way and security needs, compliance are pulling the other way.
  7. SecuritySensitive data – depends on the industry, for example retail, health care, finance may demand privacy and a higher level of security requirements than other industriesIndustry compliance – a complex legal and compliance environment require a higher level of security
  8. Possible scenarios:Traditional approach (seal off corporate IT) = Low IT Security Risks, Low User Freedom / Consumerization, essentially banning the use of consumer-oriented IT and personal devices at work.Open environment = High IT Security Risks, High User Freedom / ConsumerizationThe opposite scenario would be opening the organization with a computing environment that is easily accessed and user-determined.Take no action = Ignore IT consumerization altogether. This has the potential to shift to High IT Security Risks as the end user will tend to move towards “BYOD” and eventually to “self configuration”Ideally, the organization should move toward high consumerization / low security risks, either through company owned or BYOD, providing high mobility to employees that can benefit from itAdditional scenarios:BYOD + corporate apps, BYOD + corporate desktop = Low IT Security Risks, High User Freedom
  9. MagicQuadrant reference interviews revealed that consumerization is the No. 2 challenge they faced in2010; consumerizationwasn't in the top five last year. The advent of the iPad is the catalyzing factor, surveysshow that somewhere between 50% and 75% of desktop groups have received requests foriPad support.The iPad in the enterprise phenomenon has also driven users to request support for new handheld devices, such as the iPhone or the Android phone, leading enterprises to support a greater variety of devices. The primary mobile device management (MDM) concern is dataprotection. IT organizations want to ensure that user data is secure if the device is lost or stolen.Organizations are starting to treat smartphones (and now tablets) the same way they treat PCs.Systems Infrastructure SoftwareChange and Configuration Management Software (CCM)Secure Content and Threat Management (SCTM)Security and Vulnerability Management Software (SVM)Problem Management Software (PM)Application and User Session Virtualization (AV)Security Products and ServicesSecurity information and event management (SIEM)Proactive endpoint risk management (PERM )Forensics and incident investigation (FII)Policy and complianceSecurity systems and configuration management (SSCM)Device vulnerability assessment (VA), Application vulnerability assessment (VA )
  10. The smartphone revolution of the last three years has changed how mobile workers operate.
  11. The Evolution of Enterprise Mobility, Pyxis Mobile 2011Enterprises are leveraging mobility to improve operations and how they interact with customers, employees and suppliers