SlideShare une entreprise Scribd logo
1  sur  12
Enterprise mobility strategy  RahulSethi - Principal Mobiangle.com sales@mobiangle.com 408-459-0657
Why do enterprises need a mobile strategy? Mobility is an integral and growing part of the majority of businesses An integrated mobile strategy brings obvious benefits Cost/resourcing Greater business control An empowered, more efficient, effective workforce
Four grades of enterprise mobile strategy Most companies sit here today
The enterprise challenge  CEO/CFO User IT department
The emergence of wireless islands Teleworker Small /remote office Piecemeal approach results in wireless islands and leads to security, quality and cost issues Road warrior Central office
User profiles need to move between islands Static role Mobile centric Desk Desk Mobile Floor Office Home Home Desk Desk Mobile Mobile Office Home Office Semi-mobile roles Semi-static role
An enterprise mobility strategy is more than mobile
Some key steps in implementing a mobile strategy Future proofing Security Billing Cost minimisation Access away from the core User mobility profiling User data access requirements Assessment of what is in place - networks, devices
Security Security is a major issue for IT departments Wireless network security should offer same level of protection as wired Multi-layered defence strategy Not just perimeter based Range of security measures Access controls VPNs Rogue detection tools Chain only as strong as the weakest link
Future proofing New technologies - LTE - WiMax Integrated vs siloed Complementary vs competing How are partners riding the wave of development? - strategic - tactical
Summary Mobility strategy needs to be holistic Proactive rather than reactive approach Complementary not competing technologies – horses for courses Knowledge and consideration of future wireless technologies essential – mapped onto current and evolving future needs
Next Steps – Lets connect in person!!!

Contenu connexe

Tendances

Unleashing Business Innovation with Integrated Service Management - IBM Smart...
Unleashing Business Innovation with Integrated Service Management - IBM Smart...Unleashing Business Innovation with Integrated Service Management - IBM Smart...
Unleashing Business Innovation with Integrated Service Management - IBM Smart...IBM Sverige
 
Cmgt 554 week 3 dq 1
Cmgt 554 week 3 dq 1Cmgt 554 week 3 dq 1
Cmgt 554 week 3 dq 1kjaisuo
 
029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2
029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2
029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2Patrick Moerkerken
 
ICAB - ITK Chapter 3 class 5 - Management of IT
ICAB - ITK Chapter 3 class 5 - Management of ITICAB - ITK Chapter 3 class 5 - Management of IT
ICAB - ITK Chapter 3 class 5 - Management of ITMohammad Abdul Matin Emon
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : ProductivityAGILLY
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...Enterprise Mobile
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpYann Hermouet
 
[ TET Presentation ]
[ TET Presentation ][ TET Presentation ]
[ TET Presentation ]Videoguy
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policiesmrmwood
 
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyMIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyQuEST Forum
 

Tendances (13)

Unleashing Business Innovation with Integrated Service Management - IBM Smart...
Unleashing Business Innovation with Integrated Service Management - IBM Smart...Unleashing Business Innovation with Integrated Service Management - IBM Smart...
Unleashing Business Innovation with Integrated Service Management - IBM Smart...
 
Cmgt 554 week 3 dq 1
Cmgt 554 week 3 dq 1Cmgt 554 week 3 dq 1
Cmgt 554 week 3 dq 1
 
029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2
029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2
029_UC_EXPO_Arkadin_PowerPoint_Presentation_FinalApprovedpptx_2
 
ICAB - ITK Chapter 3 class 5 - Management of IT
ICAB - ITK Chapter 3 class 5 - Management of ITICAB - ITK Chapter 3 class 5 - Management of IT
ICAB - ITK Chapter 3 class 5 - Management of IT
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
 
Destination CRM
Destination CRMDestination CRM
Destination CRM
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_Enterp
 
[ TET Presentation ]
[ TET Presentation ][ TET Presentation ]
[ TET Presentation ]
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions InquisitivelyMIRAI - Managing Industry Restructuring and Adoptions Inquisitively
MIRAI - Managing Industry Restructuring and Adoptions Inquisitively
 
Consumer Identity and Access Management (CIAM)
Consumer Identity and Access Management (CIAM)Consumer Identity and Access Management (CIAM)
Consumer Identity and Access Management (CIAM)
 

En vedette

Research - Android Apps
Research - Android AppsResearch - Android Apps
Research - Android Appsmobiangle
 
Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015
Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015
Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015SEOGOOGLE
 
Modul ix dan x algo
Modul ix dan x algoModul ix dan x algo
Modul ix dan x algoSTMIK AKAKOM
 
Coesão e coerência
Coesão e coerênciaCoesão e coerência
Coesão e coerênciaRossana Silva
 
Estudos pregressivos livro i mazas (www.sheetmusic-violin.blogspot.com)
Estudos pregressivos livro i   mazas (www.sheetmusic-violin.blogspot.com)Estudos pregressivos livro i   mazas (www.sheetmusic-violin.blogspot.com)
Estudos pregressivos livro i mazas (www.sheetmusic-violin.blogspot.com)William Soph
 
Mobiangle - Corporate
Mobiangle - CorporateMobiangle - Corporate
Mobiangle - Corporatemobiangle
 

En vedette (11)

Марафон важных дел:15 слайдов
Марафон важных дел:15 слайдовМарафон важных дел:15 слайдов
Марафон важных дел:15 слайдов
 
Research - Android Apps
Research - Android AppsResearch - Android Apps
Research - Android Apps
 
photo
photophoto
photo
 
Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015
Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015
Cho thuê trang phục noel gia re hcm, thuê trang phục noel 2015
 
Modul ix dan x algo
Modul ix dan x algoModul ix dan x algo
Modul ix dan x algo
 
Coesão e coerência
Coesão e coerênciaCoesão e coerência
Coesão e coerência
 
New branding flexible working presentation
New branding flexible working presentationNew branding flexible working presentation
New branding flexible working presentation
 
Estudos pregressivos livro i mazas (www.sheetmusic-violin.blogspot.com)
Estudos pregressivos livro i   mazas (www.sheetmusic-violin.blogspot.com)Estudos pregressivos livro i   mazas (www.sheetmusic-violin.blogspot.com)
Estudos pregressivos livro i mazas (www.sheetmusic-violin.blogspot.com)
 
Redacción científica
Redacción científicaRedacción científica
Redacción científica
 
Mobiangle - Corporate
Mobiangle - CorporateMobiangle - Corporate
Mobiangle - Corporate
 
Nano-Clear Fluoropolymer Coating
Nano-Clear Fluoropolymer CoatingNano-Clear Fluoropolymer Coating
Nano-Clear Fluoropolymer Coating
 

Similaire à Research - Enterprise Mobility

Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Developing effective mobile policy
Developing effective mobile policyDeveloping effective mobile policy
Developing effective mobile policyWendyvanmeer
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Ahmed Banafa
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Understanding the Enterprise
Understanding the EnterpriseUnderstanding the Enterprise
Understanding the Enterpriseevancmiller
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...Unified Communications Online
 
Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...Unified Communications Online
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
The mobile workforce – A real IT challenge
The mobile workforce – A real IT challengeThe mobile workforce – A real IT challenge
The mobile workforce – A real IT challengeExponential_e
 
Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)itnewsafrica
 
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISORising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISOSamsung Business USA
 
It days 2015 digital transformation and workplace
It days 2015   digital transformation and workplaceIt days 2015   digital transformation and workplace
It days 2015 digital transformation and workplacePaperjam_redaction
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
AuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDFAuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDFAuroIN
 

Similaire à Research - Enterprise Mobility (20)

Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Enterprise Mobility
Enterprise MobilityEnterprise Mobility
Enterprise Mobility
 
Developing effective mobile policy
Developing effective mobile policyDeveloping effective mobile policy
Developing effective mobile policy
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 
Ahmed Banafa EMM
Ahmed Banafa EMMAhmed Banafa EMM
Ahmed Banafa EMM
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Understanding the Enterprise
Understanding the EnterpriseUnderstanding the Enterprise
Understanding the Enterprise
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...
 
Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...Get closer to your customers through simplified & effective real time collabo...
Get closer to your customers through simplified & effective real time collabo...
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
The mobile workforce – A real IT challenge
The mobile workforce – A real IT challengeThe mobile workforce – A real IT challenge
The mobile workforce – A real IT challenge
 
Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)
 
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISORising to the Challenge of Mobile Security: The Mobile Aware CISO
Rising to the Challenge of Mobile Security: The Mobile Aware CISO
 
It days 2015 digital transformation and workplace
It days 2015   digital transformation and workplaceIt days 2015   digital transformation and workplace
It days 2015 digital transformation and workplace
 
Security
SecuritySecurity
Security
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
AuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDFAuroIN - Enterprise mobility strategy | PDF
AuroIN - Enterprise mobility strategy | PDF
 

Plus de mobiangle

On Mobile - Website Strategy - Luxury Products
On Mobile - Website Strategy - Luxury ProductsOn Mobile - Website Strategy - Luxury Products
On Mobile - Website Strategy - Luxury Productsmobiangle
 
SaaS, MaaS, Cloud Capability
SaaS, MaaS, Cloud CapabilitySaaS, MaaS, Cloud Capability
SaaS, MaaS, Cloud Capabilitymobiangle
 
Tier2 Technical Contracting
Tier2  Technical ContractingTier2  Technical Contracting
Tier2 Technical Contractingmobiangle
 
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testingmobiangle
 
Technical Competency
Technical CompetencyTechnical Competency
Technical Competencymobiangle
 
On mobile - Product Strategy
On mobile - Product StrategyOn mobile - Product Strategy
On mobile - Product Strategymobiangle
 

Plus de mobiangle (7)

On Mobile - Website Strategy - Luxury Products
On Mobile - Website Strategy - Luxury ProductsOn Mobile - Website Strategy - Luxury Products
On Mobile - Website Strategy - Luxury Products
 
SaaS, MaaS, Cloud Capability
SaaS, MaaS, Cloud CapabilitySaaS, MaaS, Cloud Capability
SaaS, MaaS, Cloud Capability
 
Tier2 Technical Contracting
Tier2  Technical ContractingTier2  Technical Contracting
Tier2 Technical Contracting
 
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testing
 
Technical Competency
Technical CompetencyTechnical Competency
Technical Competency
 
Fact Sheet
Fact SheetFact Sheet
Fact Sheet
 
On mobile - Product Strategy
On mobile - Product StrategyOn mobile - Product Strategy
On mobile - Product Strategy
 

Dernier

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Research - Enterprise Mobility

  • 1. Enterprise mobility strategy RahulSethi - Principal Mobiangle.com sales@mobiangle.com 408-459-0657
  • 2. Why do enterprises need a mobile strategy? Mobility is an integral and growing part of the majority of businesses An integrated mobile strategy brings obvious benefits Cost/resourcing Greater business control An empowered, more efficient, effective workforce
  • 3. Four grades of enterprise mobile strategy Most companies sit here today
  • 4. The enterprise challenge CEO/CFO User IT department
  • 5. The emergence of wireless islands Teleworker Small /remote office Piecemeal approach results in wireless islands and leads to security, quality and cost issues Road warrior Central office
  • 6. User profiles need to move between islands Static role Mobile centric Desk Desk Mobile Floor Office Home Home Desk Desk Mobile Mobile Office Home Office Semi-mobile roles Semi-static role
  • 7. An enterprise mobility strategy is more than mobile
  • 8. Some key steps in implementing a mobile strategy Future proofing Security Billing Cost minimisation Access away from the core User mobility profiling User data access requirements Assessment of what is in place - networks, devices
  • 9. Security Security is a major issue for IT departments Wireless network security should offer same level of protection as wired Multi-layered defence strategy Not just perimeter based Range of security measures Access controls VPNs Rogue detection tools Chain only as strong as the weakest link
  • 10. Future proofing New technologies - LTE - WiMax Integrated vs siloed Complementary vs competing How are partners riding the wave of development? - strategic - tactical
  • 11. Summary Mobility strategy needs to be holistic Proactive rather than reactive approach Complementary not competing technologies – horses for courses Knowledge and consideration of future wireless technologies essential – mapped onto current and evolving future needs
  • 12. Next Steps – Lets connect in person!!!