ENTERPRISE MOBILITY TRENDS

Similar documents
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Mobile Devices prioritize User Experience

3-Part Guide to Developing a BYOD Strategy

Embracing the Mobile Imperative

Securing Today s Mobile Workforce

MaaS360 Secure Productivity Suite

As Enterprise Mobility Usage Escalates, So Does Security Risk

2013 InterWorks, Page 1

Integrated Access Management Solutions. Access Televentures

The Device Has Left the Building

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

Taking Back Control of Your Network With SD-LAN

Mobile Security using IBM Endpoint Manager Mobile Device Management

How to Evaluate a Next Generation Mobile Platform

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

2018 Report The State of Securing Cloud Workloads

BYOD: BRING YOUR OWN DEVICE.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10

Shadow IT in the Enterprise

Securing BYOD With Network Access Control, a Case Study

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

A Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst

Introduction to Device Trust Architecture

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Make security part of your client systems refresh

A Guide to Closing All Potential VDI Security Gaps

Bring your own device: a major security concern

Enterprise Redefined, Mobility Your Way

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Samsung and Financial Services. Enhance the customer experience with Samsung s innovative Financial Services offerings

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

The security challenge in a mobile world

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

INDIA The Changing Face of the Workplace: Going Light and Mobile

HOW TO ENABLE AFFORDABLE ENTERPRISE VIDEO FOR EVERYONE

Five Tips to Mastering Enterprise Mobility

Delivering the Wireless Software-Defined Branch

The Connected Worker and the Enterprise of Things

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

One of the most challenging tasks for today s app developers is to ensure that users are actively engaging with their app.

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Securing Health Data in a BYOD World

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

The Next Generation of Mobile Learning. Tamar Elkeles, Qualcomm Kevin Oakes, i4cp

Securing Institutional Data in a Mobile World

Cloud-Enable Your District s Network For Digital Learning

CIPHERPOST PRO. A Profitable, Essential Value-Add for Office 365

Consumer Opinions and Habits A XIRRUS STUDY

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

WHITE PAPER. Good Mobile Intranet Technical Overview

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

IT Security: Managing a New Reality

RHM Presentation. Maas 360 Mobile device management

GLOBAL PKI TRENDS STUDY

THE NEW REALITY IN WI-FI: DEALING WITH THE DEVICE INVASION. Philip Scott Xirrus

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

BroadSoft UC-One User Experience Apps for the Anywhere Workplace

Cisco Borderless Mobility. Kim Min Se Technical Marketing Engineer Borderless Networks

Get Connected: Building your Digital Workplace

Cisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

The Monetisation of Portability and Verification in an A2P SMS World

Mobile Security / Mobile Payments

How to Secure Your Cloud with...a Cloud?

BYOD Business year of decision!

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

The future of UC&C on mobile

Cisco VXI Smart Solution with VMware View

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

The State of the Trust Gap in 2015

Mobile Learning Trends & Realities. Tamar Elkeles, Ph.D. Chief Learning Officer

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Managed Wi-Fi. Connect whenever, wherever

Securing Digital Transformation

The Etihad Journey to a Secure Cloud

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Version 11

Rethink Enterprise Endpoint Security In The Cloud Computing Era

CLOSING IN FEDERAL ENDPOINT SECURITY

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

Better skilled workforce

BELTUG Market Trends Survey Results V-ICT-OR members - August 2015

October 2016 Issue 07/16

6 Significant reasons to embark and establish a mobile VoIP business

Securing Office 365 with MobileIron

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Cisco Borderless Networks Value Proposition

BYOD... or CYOD? 2 BILLION 5 BILLION. The Choice is Yours MOBILE DEVICES WORLDWIDE BY 2015 MOBILE DEVICES WORLDWIDE BY 2020

Protecting Health Information

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

Transcription:

ENTERPRISE MOBILITY TRENDS Raghuram Nair, Nandakishore Bellore

Enterprise Mobility has emerged as a top technology trend globally. Every enterprise with a mobile workforce has an imperative to deploy a successful mobile strategy. The need for a mobile strategy has risen majorly due to the proliferation of smart phones and tablets. The lines between official and personal space has shrunken as employees use the same device to access both official and personal content. Many employees bring in different mobile devices to the workplace and managing them has become a big challenge for enterprises worldwide. A proper and comprehensive enterprise mobile strategy helps enterprises not only in establishing the ground rules, but also in leveraging mobile technologies to the enterprise s advantage. Mobile strategy should facilitate greater participation by its employees which will ensure inclusive enterprise work culture. This can be achieved by allowing employees to bring their own mobile devices through BYOD initiatives. This provides flexibility, removes bottlenecks, encourages collaboration, and increases productivity of their workforce without compromising on security and obfuscating user experience. Enterprise IT should focus on being an enabler for user productivity by being less restrictive. Enforcing security without obfuscating user experience shall be the primary objective of Enterprise IT. This white paper outlines the emerging trends that can be potential challenges for Enterprise IT.

CURRENT MOBILITY TRENDS

1 BYOD Management Support BYOD is the biggest change in client computing since the introduction of the PC. Gartner research indicates 38% of surveyed CIOs will cease to provide personal devices to their employees by 2016. However, IT is reluctantly embracing BYOD policies that satisfy the relentless employee demand to use personally owned devices. The implementation of BYOD programs exacerbates the challenges of information security, device management, and workspace delivery. Unfortunately, endpoint security controls, MDM tools and workspace delivery mechanisms are inconsistently implemented across the myriad of mobile platforms. IT should collaborate with users and line of business managers to proactively create policies, implement programs, and anticipate future requirements for BYOD. 2 Infrastructure Setup Many users are pushing IT to deploy a pervasive wireless infrastructure that serves both business and personal devices, while expecting wireless LANs (WLAN) to provide fast, predictable behavior, just like a wired LAN. As enterprises increasingly rely on WLANs for mission-critical communication, challenges of network design, network management, and problem diagnosis become more complex.

Unfortunately, many WLANs were not designed to provide mission-critical services and are plagued with issues such as poor performance, insufficient coverage, or lack of service for employee personal devices. Enterprises must also deal with unique demands that BYOD strategies place on site communications infrastructures. They may need to increase network capacity, manage bandwidth, segregate BYOD devices from enterprise devices, add IP voice services and expand site mobile access. 3 Identity and Access Management Enterprises must be able to authenticate users and grant access to appropriate business resources. There are three aspects of IAM to focus on: single sign-on, adaptive access control, and privacy. Small device sizes make entering strong passwords difficult and users want to sign on once to access the resources needed to do their jobs. Adaptive access control, which uses additional contextual information such as user location, behavioral patterns and many other factors, can be used to increase identity assurance and reduce mobile usage risk. Although location data can strengthen authentication surety, it also can raise privacy concerns. 4 Workspace Container Secure workspaces, or containers, used for isolating corporate applications (apps) and data on mobile devices are becoming a mainstream approach to mobile security strategies.

While software solutions have been on the market for several years, and have even been available as carrier services (as dual persona solutions), adoption has been slow. Workspace provides complete separation of corporate and personal data on devices, securing corporate resources, and maintaining employee privacy. It enables organizations to standardize enterprise security and data loss prevention strategies across mobile devices through containerization. It includes the essential applications for conducting business while being mobile. All data sent to/from the application and all data that resides within the application are protected. From a single application, employees can enjoy access to corporate email, calendar, contacts, the intranet, and documents, whether online or offline, and maintain their privacy. 5 Mobile Application Development Gartner 1 predicts that through 2014, improved JavaScript performance will begin to push HTML5 and the browser as a mainstream enterprise application development environment. As a consequence, it was suggested that developers focus on expanding user interface models including richer voice and video that can connect people in new and different ways. Apps will grow and applications will shrink, continuing a trend that has been documented for a while now. The market for creating apps continues to be very fragmented (Gartner estimates that there are over 100 potential tool vendors), and consolidation is not likely to happen in earnest for a while. It is suggested that the next evolution in user experience will be to leverage intent, inferred from emotion and actions, to motivate changes in end-user behavior.

6 Mobile Security As Mobile usage overtakes PC, mobile security platform weaknesses are giving rise to new threats. In 2014 hackers/criminals will increasingly target mobile email, apps, platforms, wallets, and app stores. Convergence of mobile, social, and cloud will challenge security approaches to mobility. Mobile computing devices should be more secure than traditional user computing devices by 2014. CISOs and enterprise decision makers need to focus on strengthening application configuration, improving mobile testing, and monitoring emerging technologies. From the very start, security is being designed into mobile device applications. However, new techniques such as application sandboxing, digital signing, dual personas, and the ability to remotely wipe the whole device, are being pioneered on mobile platforms. Mobile devices can also commonly provide bio contextual information and authentication elements that can be leveraged to replace passwords used in desktop computing. Consider elements like physical location, network identification, voice recognition, eye, or facial recognition techniques that will pose bigger challenges for enterprises to secure their mobile environment.

The future of Enterprise Mobility is moving from basic device and app management to advance technological trends. Enterprises need to embrace some of the following future technological challenges in terms of support and management. FUTURE MOBILITY TRENDS

1 Choose Your Own Device The new buzzword in enterprise mobility is a mobile device policy that offers employees a choice of company-approved devices, paired with pre-determined operating systems. The employee typically purchases the device. The organization can retain the ownership of the device, but that s more often called COPE (Company Owned Personally Enabled) 2. Employees can choose from the pool of approved devices, pick a data plan, add accessories, and purchase apps. Provisioning of the selected device enforces pre-set permissions and grants access to the company s enterprise app store. Once deployed, the devices may be used for both personal and company projects. 2 Wearable Mobile Devices Wearable Mobile Devices also known as Wearable Technologies are devices that can gain the functionality that are normally expected from smartphones, tablets, and other mobile devices. 75% of Americans are aware that wearable technology exists, and it s this fact that is expected to drive the sale of wearable technology from $1.4 billion in 2014 to a whopping $50 billion by 2018. That s over 280% growth in four years. Like smartphones and tablet PCs preceding them, the popularity of wearable technology is spurred on by functionality and utility. However, unlike those devices, wearable technology seems to be most useful for young men and women looking to improve their professional lives.

In a recent survey gauging the importance of wearable technology, one third of respondents from the United Kingdom and the United States stated that they believe wearable technology, whether it s a smart watch or Google Glass, has helped them develop their career. No doubt realizing the potential benefits, an estimated 6% of businesses now offer their employees wearable technology for professional use. 3 Personal Cloud Storage Consumers have been using cloud services and accessing storage in the cloud for years without realizing it. Email, social networking, and online banking services are the most popular services. Smartphones and tablets take this dependence on cloud services to a new level. Personal cloud storage (PCS) provides server space for individuals to store data, photos, videos, and other files. Google plans a cloud-centered future with Google Play and its market-leading Android mobile OS. Today, mobile devices combined with the cloud can fulfill most computing tasks, and any tradeoffs are outweighed in the minds of the user by the convenience and flexibility provided by the mobile devices. Research Reference 1. Gartner 2. Maas360 and Zco Corporation

ABOUT THE AUTHORS Raghuram Nair AVP - Mobility, CSS Corp 3 Raghu has 18 years of experience in the IT industry in leadership roles spanning business consulting, market strategy and delivery management for enterprise customers and mass-market consumers across global markets. He has had the opportunity to build and deliver differentiated IP & business models across enterprise and consumer mobility. Nandakishore Bellore Senior Domain Expert, CSS Corp 3 Nandakishore is a Senior Mobility Expert with 16 years of experience in IT Industry and more than 6 years into Infrastructure practice, pre-sales, solutioning and consulting. He is Instrumental in initiating the Mobile Device Management practice as part of CSS Corp Mobility Services. He is currently involved as Solution Architect in providing solutions for E-Mobile Mobility Services.