managing mobile devices in the enterprise

27
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Monica Basso Twitter: @Monikino Rob Smith Twitter: @Mastidon Managing Mobile Devices in the Enterprise @GARTNER_INC

Upload: others

Post on 03-Feb-2022

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Managing Mobile Devices in the Enterprise

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2011 Gartner, Inc. and/or its affiliates. All rights reserved.

Monica Basso

Twitter: @Monikino

Rob Smith

Twitter: @Mastidon

Managing Mobile Devices in the Enterprise

@GARTNER_INC

Page 2: Managing Mobile Devices in the Enterprise

Gartner at a Glance

950 Analysts

13,000 Client

Organizations

200,000+ Client

Interactions

Vertical Coverage

in Nine Industries

5,500 Benchmarks

10,200 Media

Inquiries

World's Largest

Community of CIOs

70+ Conferences

75% of Global 500

2,100 Consulting

Engagements

Clients in 85 Countries

72% of Fortune 1000

500 Consultants

Page 3: Managing Mobile Devices in the Enterprise

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2013 Gartner, Inc. and/or its affiliates. All rights reserved.

Monica Basso

Twitter: @Monikino

Rob Smith

Twitter: @Mastidon

Managing Mobile Devices in the Enterprise

Page 4: Managing Mobile Devices in the Enterprise

Mobility Leads in CIO Agendas for 2013

CIO Technologies

Ranking 2012 2011 2010 2009

Ranking of technologies CIOs selected as one of their top five priorities in 2013.

* Not an option in that year

2013

Analytics and business intelligence 1 1 5 5 1

Mobile technologies 2 2 6 12

Cloud computing (SaaS, IaaS, PaaS) 3 3 1 2 16

Collaboration technologies (workflow) 4 4 8 11 5

Legacy modernization 5 6 7 15 4

IT management 6 7 4 10 *

CRM 7 8 18 * *

Virtualization 8 5 2 1 3

Security 9 10 12 9 8

ERP applications 10 9 13 14 2

2013 Global CIO Top 10 Technologies

(+) MDM, MAM, EFSS, MADP Driving Interest

Page 5: Managing Mobile Devices in the Enterprise

Key Issues

1. What are the key mobile trends that enterprises face?

2. How can enterprises manage and secure their mobile users, devices, data, and applications?

3. What are the best practices when managing enterprise mobile users?

Page 6: Managing Mobile Devices in the Enterprise

Key Issues

1. What are the key mobile trends that enterprises face?

2. How can enterprises manage and secure their mobile users, devices, data, and applications?

3. What are the best practices when managing enterprise mobile users?

Page 7: Managing Mobile Devices in the Enterprise

Mobile Device Trends Notebooks Are in the Minority

Information Obtained From

Gartner Shipment Forecast:

Desk-based PCs, Notebooks,

Ultramobiles, and Tablets,

Worldwide, 2011 to 2017,

2Q13 Update.

Smartphone

Notebook

Ultramobile

Premium tablet

Utility tablet

Basic tablet

Smartphones

Mobile PCs

Tablets

0

1 bn

2 bn

3 bn

4 bn

5 bn

6 bn

2013 2014 2015 2016 2017

Installed base of smart devices 2013 to 2017

By 2014, 80% of businesses will support a workforce using media tablets.

Page 8: Managing Mobile Devices in the Enterprise

Platform Trends 2015 There's Space for Three Players

0% 20% 40% 60% 80% 100%

Greater China

Emerging APAC

Mature APAC

North America

Western Europe

0% 20% 40% 60% 80% 100%

Greater China

Emerging APAC

Mature APAC

North America

Western Europe

Gartner, Forecast for Device Shipments by Operating System, Worldwide, 2Q13

Handsets

Table

ts

Feature phone

Other OS

BlackBerry

Windows

iOS

Android

Page 9: Managing Mobile Devices in the Enterprise

Bring Your Own Will Become the Norm

Average: 33%

Average: 47%

"When will your organization cease to provide personal devices?"

Source: Bring Your Own Device: The Facts and the Future, David A. Willis, 11 April 2013, G00250384

n = 2,053 CIOs; Worldwide

38%

Today 2020 2016

45%

No BYOD

All BYOD

Mixed

40%

15%

6%

Page 10: Managing Mobile Devices in the Enterprise

The New App-centric Reality

By 2016, there will be more than 300 billion app downloads from

mobile app stores yearly.

By 2015, 60% of organizations will use private app stores to deliver

business apps on media tablets and smartphones

Consumer

Services Enterprise

Services • From a web-centric to an app-centric Internet

• Primary entry point for people to access complex data

• Mask the complexity of IT system and information, build simplicity in them

• Simple apps discovery through app stores

Storage Storage

MDM MDM

File Sync

File Sync &Share

Enterprise

Collaboration Enterprise

Collaboration

Virtualization Virtualization

Public

Public App Stores

Enterprise

Enterprise Content Mng

Corporate Apps Corporate Apps

Supply Supply

Chain

SFA, ERP, HR SFA, ERP, HR

Social Networks

Social Networks

Page 11: Managing Mobile Devices in the Enterprise

Personal Cloud File Services Empower Mobile Device Users … and Bedevil IT

• File sync and sharing

• Freeware

• Simplicity

• New collaboration styles

• File sync and sharing

• Freeware

• Simplicity

• New collaboration styles

• BYOD

• Lack of IT control

• Security and compliance risks

• Fragmentation of storage and content

• BYOD

• Lack of IT control

• Security and compliance risks

• Fragmentation of storage and content By 2016, the average personal

cloud will synchronize and orchestrate at least six different

device types.

Page 12: Managing Mobile Devices in the Enterprise

Key Issues

1. What are the key mobile trends that enterprises face?

2. How can enterprises manage and secure their mobile users, devices, data, and applications?

3. What are the best practices when managing enterprise mobile users?

Page 13: Managing Mobile Devices in the Enterprise

Enterprise Mobility Management: Many Threats, Solutions, Compromises

MDM — Manage the device

Containerization — Manage the corporate footprint on a device

App wrapping

Managed zones

Virtualization

MAM — Manage the app

MCM — Manage content

IAM — Manage the access identity

Virtual Desktop — Manage nothing

..........

Selected Technology Approaches

• Mix trusted and untrusted apps on the

same device

• Minimize disruption to personal apps,

behavior, and use cases

• Support a wide range of devices

• Don't compromise usability of device

or applications

• Corporate management won't destroy

personal information

What Does the User Want?

Page 14: Managing Mobile Devices in the Enterprise

MDM Styles: Heavyweight vs. Lightweight

MDM rich client

MDM small agent +

OS native APIs

MDM small agent +

OS native APIs +

MAM

MDM Server

Platform

Heavyweight MDMHeavyweight MDM

Large MDM Footprint

Lightweight MDMLightweight MDM

Small MDM Footprint

Lightweight MDM + MAMLightweight MDM + MAM

Corporate container, proprietary applications

(e.g., email client), container management focus

Native applications (e.g., email) + wrapped corporate applications,

device management focus

Native applications (e.g., email), device management focus

Containerization

By 2014, mobile devices will enforce containerization of applications and data through native hardware and OS functions. Source: G00226447 (November 2011)

Page 15: Managing Mobile Devices in the Enterprise

Choose Technology To Secure Apps & Content

Virtual corporate

device on a personal one

Zero Footprint

on the device

• Desktop app

•infrastructure

• Desktop app availability

• Expensive infrastructure

• Provides no offline access

• E.g.: Citrix, VMware, Wyse

VDI/HDV

available on

• Strong data

• Immature, device-driven, not available on all OSes.

• Strong data separation.

• Eg: VMware, ARM, GD, RedBend

Mobile Hypervisors

•Technology,

• Must build, re-compile apps with company-specific APIs.

• Eg.: Good Technology, AirWatch, OpenPeak, Fixmo

Application Specific

Containers

content and

• Limiting based on content and applications

• Legality may be in question.

• Eg.: Mocana

Application Neutral

Containers

• Easy to use,

• Easy to use, secure, low cost, widely available.

• Poor user experience

• No offline access, yet.

• Eg.: Safari, iExplorer

Web

Browsers

• Based on OS APIs, depend

• Based on OS APIs, depend /vary on OS and version

• Policy-driven

• Full device lock

• Eg.: AirWatch, MobileIron, Citrix

Pure MDM

MDM

Page 16: Managing Mobile Devices in the Enterprise

Magic Quadrant for Mobile Device Management Software, 2013

Inclusion Criteria – technical req.:

• Enterprise-class branded, multiplatform MDM software or SaaS; focus on mobility

• Specific MDM product focus, or a primary focus on MDM in another product set (messaging or security)

• Made up of the four MDM critical components software, hardware, network, security management

• Support for three different mobile OS platforms (not versions)*

Inclusion Criteria – business req.:

• Product Criteria

• Have at Least 500,000 Devices Licensed

• Five Referenceable Accounts

• 200 MDM customers minimum

• One Customers with 20,000 Seats or More

• No More Than 65% of Revenue in One Main Geographic Region or Market

• At Least $8 Mln Revenue in MDM

• General Availability by 1Q 2013

(Source: From "Magic Quadrant for Mobile Device Management Software,― 23 May 2013, G00249820)

Page 17: Managing Mobile Devices in the Enterprise

Magic Quadrant for Mobile Device Management Software

Critical Capabilities:

• Device mgmt. — e.g., asset mgmt, provisioning, support

• Policy enforcement & compliance

• Mobile security mgmt — e.g., remote wipe, encryption, containerization

• Mobile software mgmt — e.g., private appstore, upgrades, app distribution

• Mobile content mgmt. — e.g., EFSS

• Scalability

• Delivery models — e.g., SaaS

• Analytics

From "Magic Quadrant for Mobile Device Management Software," 23 May 2013, G00249820

MDM Is Evolving Into a Broader Enterprise Management Platform

Page 18: Managing Mobile Devices in the Enterprise

Key Issues

1. What are the key mobile trends that enterprises face?

2. How can enterprises manage and secure their mobile users, devices, data, and applications?

3. What are the best practices when managing enterprise mobile users?

Page 19: Managing Mobile Devices in the Enterprise

Mobility Management Strategy: Key Steps

Assess Your Needs & Risks

Build User Profiles

Create Mobile Policies

Select MDM Tools

Page 20: Managing Mobile Devices in the Enterprise

Segmenting Your Users

Smartphone

Notebook

Media Tablet

Desktop PC

HVD

Profile A

Roles ……. …….

Notebook + Smartphone

Profile B

Roles ……. …….

Desktop PC + Smartphone

Profile C

Roles ……. …….

Tablet PC

Profile D

Roles ……. …….

Desktop PC

Profile E

Roles ……. …….

Smartphone

Profile F

Roles ……. …….

HVD + Tablet PC

(From "Segmenting Users for Mobile and Client Computing," 23 February 2012, G00227122)

Page 21: Managing Mobile Devices in the Enterprise

Policies to Regulate the Consumer Mobility

Costs

Compliance

People Technology

Security

Operations

Provisioning, De-commissioning,

Auditing, Reporting, Self-service,

Patches/Upgrades, Maintenance,

Levels of Support (e.g., user

portals, trouble shooting).

Provisioning, De-commissioning,

Auditing, Reporting, Self-service,

Patches/Upgrades, Maintenance,

Levels of Support (e.g., user

portals, trouble shooting).

Mobile Data and

Corporate Server

Protection (e.g.,

monitor and filter

accesses to servers).

Application Delivery

(e.g., OTA s/w

distribution, private

application stores).

Containerization of

corporate footprints

on personal devices.

Mobile Data and

Corporate Server

Protection (e.g.,

monitor and filter

accesses to servers).

Application Delivery

(e.g., OTA s/w

distribution, private

application stores).

Containerization of

corporate footprints

on personal devices.

Liability, Contracts,

Compliance, Health

and Safety,

Ownership, Benefits,

Taxes, Accessibility

(e.g., email archiving

and retrieval, local

data encryption).

Liability, Contracts,

Compliance, Health

and Safety,

Ownership, Benefits,

Taxes, Accessibility

(e.g., email archiving

and retrieval, local

data encryption).

Internal Communication,

Demand Management,

Privacy, Policy Sharing,

Training, Work-Life

Balance, Rewards.

Internal Communication,

Demand Management,

Privacy, Policy Sharing,

Training, Work-Life

Balance, Rewards.

Voice/Data Costs, Insurance,

Warranty, Device Costs,

Deployment Costs. Policies

Include Inventory, Reporting,

Alerts, Policy Enforcement.

Voice/Data Costs, Insurance,

Warranty, Device Costs,

Deployment Costs. Policies

Include Inventory, Reporting,

Alerts, Policy Enforcement.

Supported Devices, Data Plans,

Applications, Services,

Infrastructure, and IT Integration.

Supported Devices, Data Plans,

Applications, Services,

Infrastructure, and IT Integration.

Page 22: Managing Mobile Devices in the Enterprise

Mobile Enterprise Strategy Is a Process Updated Every Six Months

Typically internal

Typically external

Typically mixed internal/external

Demand

What must we

deliver?

Risk Management

Suppliers, apps, ...

Governance Financial metrics,

KPIs, ROI

Supply

Tools, techniques,

sourcing, skills

Typical projects to address delta current -> desired

Mobile App Dev

Architecture, MADP, MAM, Corp App Store

UCC Integration

SharePoint, Lync and so on

Intranet Access

VPN, ID/Authentication

Enterprise File Sharing and Synchronization

Solutions

Mobility Center of Excellence

MDM

Sourcing, Delivery

Managed Mobility Services

Full Life Cycle Management

BYOD

Eligibility, Policy, Contract

Mobile Worker Segmentation

Four to Seven Profiles

Page 23: Managing Mobile Devices in the Enterprise

The Different Forms of BYOD

Transfer of Responsibility for Device(s) to the Employee Financial compensation through stipend or rewrite of employee

agreement/salary increase

Hybrid Models Personal device used with

corporate subscription Corporate device used with personal apps and services

Additional Device Personal device used in addition to corporate device(s)

Mobilization of "Last" User Tier

Users that never would qualify for a

corporate device or stipend now having

personal devices on approved list

Page 24: Managing Mobile Devices in the Enterprise

Recommendations

Don't treat all users the same way — segment your base based on geography, platform, data needs, security, and costs.

Identify security and compliance requirements for mobile deployments — and set policies to manage risks.

Choose your management approach, lightweight versus heavyweight, before starting evaluations.

Investigate MDM as-a-service options for agility and costs optimization.

Select MDM and security capabilities to enforce mobile policies.

Plan for the future evolution of MDM into the enterprise mobile management, and the convergence with broader system management for all endpoints.

Page 25: Managing Mobile Devices in the Enterprise

Recommended Gartner Research IT Market Clock for Enterprise Mobility, 2013

Monica Basso, Bryan Taylor (G00252106)

Bring Your Own Device: The Facts and the Future David Willis (G00250384)

Magic Quadrant for Mobile Device Management Software Phillip Redman, John Girard, Monica Basso (G00230508)

Critical Capabilities for Mobile Device Management Monica Basso, Phillip Redman (G00230106)

How to Use Dual-Persona Technologies for Mobile Management and Security Rob Smith, Leif-Olof Wallin(G00252621)

MarketScope for Enterprise File Synchronization and Sharing Monica Basso, Jeffrey Mann

Segmenting Users for Mobile and Client Computing

Monica Basso, Federica Troni (G00227122)

Toolkit: Segmenting Users for Mobile and Client Computing

Federica Troni, Monica Basso (G00232237)

For more information, stop by Experience Gartner Research Zone.

Page 26: Managing Mobile Devices in the Enterprise
Page 27: Managing Mobile Devices in the Enterprise

• Visit gartner.com/webinars

– Today's presentation is available to download on the Attachment

Tab of our webinar portal or will be available shortly on our

webinar page

– Check out the schedule of upcoming Gartner webinars (plus on-

demand webinars) and don‘t forget to share these resources with

your colleagues

• Contact your Gartner account executive with any additional

questions, comments or for a complimentary copy of today's

presentation

Simple steps for increasing the value

of today's webinar experience

26