Mobility and Support: Impact and Opportunity

Similar documents
Securing Today s Mobile Workforce

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

Mobile Security / Mobile Payments

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

State of SMB IT 1H 2012

Introduction to Device Trust Architecture

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

Securing Health Data in a BYOD World

MSU IT Update. Rob McCurdy Chief Information Officer

Managing EUC Threats. 3 Simple Ways To Improve Endpoint SECURITY

TRUSTED MOBILITY INDEX

Protecting Health Information

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO

Security Solutions for Mobile Users in the Workplace

The Mobilization of Cash Management The Journey, the Destination and the Future

Brother Mobility Solutions for Business

Mobility, Security Concerns, and Avoidance

Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD

ACHIEVING FIFTH GENERATION CYBER SECURITY

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Combating Cyber Risk in the Supply Chain

Dal Web alle Apps. Michele Marrone. 24 November 2010

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Secure Mobility through Mobile Device Management

3-Part Guide to Developing a BYOD Strategy

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Technology Security Failures Common security parameters neglected. Presented by: Tod Ferran

STRATEGIC PLAN

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers

Report to the Strategic Development Committee

The Future of Mobile Device Management

Cyber Security. It s not just about technology. May 2017

AKAMAI CLOUD SECURITY SOLUTIONS

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Cybersecurity Session IIA Conference 2018

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

Text Messaging Helps Your Small Business Perform Big

2017 THALES DATA THREAT REPORT

Extending Enterprise Applications to Mobile - Key Considerations. Zensar Technologies Sep 2011

CO-OP Mobile: Mobile App for ipads. April 18, 2013

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise.

New World, New IT, New Security

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Digital Crime and Cybersecurity. Scott D. Ramsey, Managing Director May 2017

Protect Your Organization from Cyber Attacks

CRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

Mobile Device policy Frequently Asked Questions April 2016

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Compliance in 5 Steps

Security Awareness Training Courses

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

Emerging Technologies The risks they pose to your organisations

U.S. Mobile Benchmark Report

Cyber Security: It s all about TRUST

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Healthcare HIPAA and Cybersecurity Update

Make security part of your client systems refresh

RSA Data Loss Prevention (DLP)

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Mobile Device Management: A Real Need for the Mobile World

Internet of Things Toolkit for Small and Medium Businesses

State of Mobile Commerce. Q

Connected & Smart Home Research Package

Mobile Technology meets HIPAA Compliance. Tuesday, May 2, 2017 MT HIMSS Conference

2018 THALES DATA THREAT REPORT

B.Y.O.D Bring Your Own Device

Higher Education Privacy Update

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

ISACA West Florida Chapter - Cybersecurity Event

Mobile Device Management

Get Smart about Backup & Recovery

The SD-WAN security guide

Digital transformation in the Networked Society. Milena Matic Strategy, Marketing & Communications June 2016

CYBERSECURITY SAVE YOUR BOTTOM LINE IBC Annual Convention Anne Benigsen, Bankers Bank of the West

Prepared for: June 18, 2014

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

It s About the Data, Stupid.

This Quick Take. Slide 1. Slide 2. Slide 3. Quick Takes QR Codes in Professional Development

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

Technology and the New DMO

Spotlight Report. Information Security. Presented by. Group Partner

The First Six Steps to Securing Remote Locations 1

Cyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:

white paper SMS Authentication: 10 Things to Know Before You Buy

Mobile Device Management: Strategies for Success. Speaker: Keith Leone

Key Authentication Considerations for Your Mobile Strategy

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

Operating System Support Plan for Test Delivery System

A Portrait of Today s Tablet User

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Appography: the Bibliography for the Twenty- First Century

Transcription:

Mobility and Support: Impact and Opportunity May 18, 2016 Roy Atkinson Senior Writer/Analyst, HDI roy.atkinson@ubm.com

About 15 years experience as a practitioner White papers, SupportWorld articles, research reports HDI and FUSION Conference Faculty International Certification Standards Committee (ICSC) Chapter Advisor - HDI Northern New England Advanced Management Strategy Tulane University Freeman Graduate School of Business Twitter: @HDI_Analyst @RoyAtkinson

Description of Today s Presentation How have mobile devices and mobility itself affected the support center? What are some opportunities presented by mobility for the support center and desktop support? Are mobile apps currently being used for support? Is it a good channel? Is it working?

Significant Dates March 4, 2002 BlackBerry 5810 June 29, 2007 iphone April 3, 2010 ipad October 22, 2015???

Which Devices Are Mobile Devices? Your organization decides For our purposes, smartphones & tablets are the primary forms of mobile devices. So far

Impact: The Past 2010 HDI fields first survey on mobile devices 2011 - White paper: The Mobility Revolution and Its Consequences for Support 2012 HDI fields another survey on mobile devices; The Mobility Revolution Redux white paper 2013 HDI fields Using Mobile devices to Provide End-user Support survey; Mobile Device Support: Where Are We Now? survey/report; Every Business Is a Mobile Business

In every support environment, from higher education to healthcare to manufacturing, mobility can be a benefit to both productivity and profitability; but it can also be a treadmill of keeping up with rapidly changing platforms, standards, and applications. from The Mobility Revolution and Its Consequences for Support, 2010

In the beginning, we were caught up in devicewrangling. Luke Wroblewski Creative Commons

2010

2011

Deeper analysis of the survey data validates and reinforces the importance of well defined policies. In both 2010 and 2011, those organizations with well defined policies were more likely to feel like they are keeping up with the pace of emerging technologies. Jenny Rains; HDI Research Corner, January 2012

2013: Opportunity Dawns 64% of support staff were using mobile devices to provide support 45% of organizations used a mobile app for screensharing and remote support

HDI 2015 Support Center Practices & Salary Report

Factoid About 15% of all tickets involve supporting a mobile device.

During an analyst call on October 22, 2015, Google CEO Sundar Pichai reported: Threshold there are now more Google mobile searches than desktop searches worldwide.

Opportunity excellent customer service means providing 24/7 availability, real-time interaction, social media interface, timely resolution, and minimal or no wait times. Judy Philbin, MHI Global

Growing Mobile Contacts Percent of tickets through each channel HDI 2015 Support Center Practices & Salary Report

Mobile App for Support The ability to leverage a mobile device for IT support is clearly important to our customers. - Cheryl Fletterik of PwC in SupportWorld

Mobility and Consumerization The Mobile Revolution is not a result of the consumerization of IT, but rather one of the causes of the consumerization of IT. RA in 2012

In organizations using mobile devices, 68% of staff are able to access monitoring alerts, 59% provide remote support through remote control and screen sharing, 53% manage tickets through mobile devices, and 52% access the knowledge base. HDI Desktop Support Advisory Board: A Revised Road Map for Desktop Support

What We Now Know Mobile is the future present Apps are powerful Websites must be responsive The technology should fit the need

We re Only Beginning Location Motion NFC Web Email Text Voice Audio Photo Video Apps Social

First, we ll see a time when your ID badge is in your mobile device. Then we ll see a time when your mobile device is indistinguishable from your ID badge. Image: Creative Commons: Travis Goodspeed

If your front page is mobile-friendly and the rest of your site isn t, you are making a promise to your constituents and then breaking it.

3 Things 1. Security 2. Security 3. Security

Security 1,023,108,267 records breached in 2014. 5.2 million smartphones were lost or stolen in the U.S. in 2014. #1 - IT s weakest security links are perceived as mobile devices, followed by social media. 75% year-over-year increase in U.S. mobile malware rates in 2014. Most recent stats on VMware AirWatch

Mobile Security Threats Retail mobile payments vs. hackers + PCI DSS Mobile web browser hacking Remote device hijacking and eavesdropping Venture Beat

Mobile Security Concerns Healthcare mobile devices vs. HIPAA Legal lost device vs. discovery DDoS attacks The Internet of Things (IoT)

Bigger question: Where is your intellectual property?

Where s Our Stuff?

Policy Development Lifecycle Evaluation Strategic Phase Service delivery Defining the Problem Presenting Recommendations to Decision Makers Developing and Analyzing Alternatives

Policy Considerations What are the organization s goals? How are people using their devices? What can be enforced, and how? How do we communicate the policy? How can technology help?

BYOD IT departments can support almost three times as many users in BYOD programs than in company-purchased tablet programs. Jeff Brandt in SupportWorld

What Next? Internet of Things Image: Creative Commons Ged Carroll

Internet of Things

Internet of Things What s been holding up the works? App for car App for lamp App for thermostat App for refrigerator App for coffee pot App for apps

This Is Changing Things

Internet of Things Healthcare to be a prime beneficiary Recording and monitoring patient records without human intervention Operational efficiency Enhanced asset monitoring and tracking Source: Harman

Internet of Things Business and Government Smart Parking Structural health Traffic congestion Smart lighting Waste management Air pollution Source: libelium Creative Commons: Keoni Cabral

What Have We Learned? It s not about the device It is about the data and the applications

What Can We Apply? Have clear, well-defined, enforceable policies Discover early how you might use a new trend or technology to improve support

Thank you! roy.atkinson@ubm.com