managing mobile devices in the enterprise
TRANSCRIPT
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2011 Gartner, Inc. and/or its affiliates. All rights reserved.
Monica Basso
Twitter: @Monikino
Rob Smith
Twitter: @Mastidon
Managing Mobile Devices in the Enterprise
@GARTNER_INC
Gartner at a Glance
950 Analysts
13,000 Client
Organizations
200,000+ Client
Interactions
Vertical Coverage
in Nine Industries
5,500 Benchmarks
10,200 Media
Inquiries
World's Largest
Community of CIOs
70+ Conferences
75% of Global 500
2,100 Consulting
Engagements
Clients in 85 Countries
72% of Fortune 1000
500 Consultants
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2013 Gartner, Inc. and/or its affiliates. All rights reserved.
Monica Basso
Twitter: @Monikino
Rob Smith
Twitter: @Mastidon
Managing Mobile Devices in the Enterprise
Mobility Leads in CIO Agendas for 2013
CIO Technologies
Ranking 2012 2011 2010 2009
Ranking of technologies CIOs selected as one of their top five priorities in 2013.
* Not an option in that year
2013
Analytics and business intelligence 1 1 5 5 1
Mobile technologies 2 2 6 12
Cloud computing (SaaS, IaaS, PaaS) 3 3 1 2 16
Collaboration technologies (workflow) 4 4 8 11 5
Legacy modernization 5 6 7 15 4
IT management 6 7 4 10 *
CRM 7 8 18 * *
Virtualization 8 5 2 1 3
Security 9 10 12 9 8
ERP applications 10 9 13 14 2
2013 Global CIO Top 10 Technologies
(+) MDM, MAM, EFSS, MADP Driving Interest
Key Issues
1. What are the key mobile trends that enterprises face?
2. How can enterprises manage and secure their mobile users, devices, data, and applications?
3. What are the best practices when managing enterprise mobile users?
Key Issues
1. What are the key mobile trends that enterprises face?
2. How can enterprises manage and secure their mobile users, devices, data, and applications?
3. What are the best practices when managing enterprise mobile users?
Mobile Device Trends Notebooks Are in the Minority
Information Obtained From
Gartner Shipment Forecast:
Desk-based PCs, Notebooks,
Ultramobiles, and Tablets,
Worldwide, 2011 to 2017,
2Q13 Update.
Smartphone
Notebook
Ultramobile
Premium tablet
Utility tablet
Basic tablet
Smartphones
Mobile PCs
Tablets
0
1 bn
2 bn
3 bn
4 bn
5 bn
6 bn
2013 2014 2015 2016 2017
Installed base of smart devices 2013 to 2017
By 2014, 80% of businesses will support a workforce using media tablets.
Platform Trends 2015 There's Space for Three Players
0% 20% 40% 60% 80% 100%
Greater China
Emerging APAC
Mature APAC
North America
Western Europe
0% 20% 40% 60% 80% 100%
Greater China
Emerging APAC
Mature APAC
North America
Western Europe
Gartner, Forecast for Device Shipments by Operating System, Worldwide, 2Q13
Handsets
Table
ts
Feature phone
Other OS
BlackBerry
Windows
iOS
Android
Bring Your Own Will Become the Norm
Average: 33%
Average: 47%
"When will your organization cease to provide personal devices?"
Source: Bring Your Own Device: The Facts and the Future, David A. Willis, 11 April 2013, G00250384
n = 2,053 CIOs; Worldwide
38%
Today 2020 2016
45%
No BYOD
All BYOD
Mixed
40%
15%
6%
The New App-centric Reality
By 2016, there will be more than 300 billion app downloads from
mobile app stores yearly.
By 2015, 60% of organizations will use private app stores to deliver
business apps on media tablets and smartphones
Consumer
Services Enterprise
Services • From a web-centric to an app-centric Internet
• Primary entry point for people to access complex data
• Mask the complexity of IT system and information, build simplicity in them
• Simple apps discovery through app stores
Storage Storage
MDM MDM
File Sync
File Sync &Share
Enterprise
Collaboration Enterprise
Collaboration
Virtualization Virtualization
Public
Public App Stores
Enterprise
Enterprise Content Mng
Corporate Apps Corporate Apps
Supply Supply
Chain
SFA, ERP, HR SFA, ERP, HR
Social Networks
Social Networks
Personal Cloud File Services Empower Mobile Device Users … and Bedevil IT
• File sync and sharing
• Freeware
• Simplicity
• New collaboration styles
• File sync and sharing
• Freeware
• Simplicity
• New collaboration styles
• BYOD
• Lack of IT control
• Security and compliance risks
• Fragmentation of storage and content
• BYOD
• Lack of IT control
• Security and compliance risks
• Fragmentation of storage and content By 2016, the average personal
cloud will synchronize and orchestrate at least six different
device types.
Key Issues
1. What are the key mobile trends that enterprises face?
2. How can enterprises manage and secure their mobile users, devices, data, and applications?
3. What are the best practices when managing enterprise mobile users?
Enterprise Mobility Management: Many Threats, Solutions, Compromises
MDM — Manage the device
Containerization — Manage the corporate footprint on a device
App wrapping
Managed zones
Virtualization
MAM — Manage the app
MCM — Manage content
IAM — Manage the access identity
Virtual Desktop — Manage nothing
..........
Selected Technology Approaches
• Mix trusted and untrusted apps on the
same device
• Minimize disruption to personal apps,
behavior, and use cases
• Support a wide range of devices
• Don't compromise usability of device
or applications
• Corporate management won't destroy
personal information
What Does the User Want?
MDM Styles: Heavyweight vs. Lightweight
MDM rich client
MDM small agent +
OS native APIs
MDM small agent +
OS native APIs +
MAM
MDM Server
Platform
Heavyweight MDMHeavyweight MDM
Large MDM Footprint
Lightweight MDMLightweight MDM
Small MDM Footprint
Lightweight MDM + MAMLightweight MDM + MAM
Corporate container, proprietary applications
(e.g., email client), container management focus
Native applications (e.g., email) + wrapped corporate applications,
device management focus
Native applications (e.g., email), device management focus
Containerization
By 2014, mobile devices will enforce containerization of applications and data through native hardware and OS functions. Source: G00226447 (November 2011)
Choose Technology To Secure Apps & Content
Virtual corporate
device on a personal one
Zero Footprint
on the device
• Desktop app
•infrastructure
•
•
• Desktop app availability
• Expensive infrastructure
• Provides no offline access
• E.g.: Citrix, VMware, Wyse
VDI/HDV
•
available on
• Strong data
•
• Immature, device-driven, not available on all OSes.
• Strong data separation.
• Eg: VMware, ARM, GD, RedBend
Mobile Hypervisors
•
•Technology,
• Must build, re-compile apps with company-specific APIs.
• Eg.: Good Technology, AirWatch, OpenPeak, Fixmo
Application Specific
Containers
•
content and
•
•
• Limiting based on content and applications
• Legality may be in question.
• Eg.: Mocana
Application Neutral
Containers
• Easy to use,
•
•
•
• Easy to use, secure, low cost, widely available.
• Poor user experience
• No offline access, yet.
• Eg.: Safari, iExplorer
Web
Browsers
• Based on OS APIs, depend
•
•
•
• Based on OS APIs, depend /vary on OS and version
• Policy-driven
• Full device lock
• Eg.: AirWatch, MobileIron, Citrix
Pure MDM
MDM
Magic Quadrant for Mobile Device Management Software, 2013
Inclusion Criteria – technical req.:
• Enterprise-class branded, multiplatform MDM software or SaaS; focus on mobility
• Specific MDM product focus, or a primary focus on MDM in another product set (messaging or security)
• Made up of the four MDM critical components software, hardware, network, security management
• Support for three different mobile OS platforms (not versions)*
Inclusion Criteria – business req.:
• Product Criteria
• Have at Least 500,000 Devices Licensed
• Five Referenceable Accounts
• 200 MDM customers minimum
• One Customers with 20,000 Seats or More
• No More Than 65% of Revenue in One Main Geographic Region or Market
• At Least $8 Mln Revenue in MDM
• General Availability by 1Q 2013
(Source: From "Magic Quadrant for Mobile Device Management Software,― 23 May 2013, G00249820)
Magic Quadrant for Mobile Device Management Software
Critical Capabilities:
• Device mgmt. — e.g., asset mgmt, provisioning, support
• Policy enforcement & compliance
• Mobile security mgmt — e.g., remote wipe, encryption, containerization
• Mobile software mgmt — e.g., private appstore, upgrades, app distribution
• Mobile content mgmt. — e.g., EFSS
• Scalability
• Delivery models — e.g., SaaS
• Analytics
From "Magic Quadrant for Mobile Device Management Software," 23 May 2013, G00249820
MDM Is Evolving Into a Broader Enterprise Management Platform
Key Issues
1. What are the key mobile trends that enterprises face?
2. How can enterprises manage and secure their mobile users, devices, data, and applications?
3. What are the best practices when managing enterprise mobile users?
Mobility Management Strategy: Key Steps
Assess Your Needs & Risks
Build User Profiles
Create Mobile Policies
Select MDM Tools
Segmenting Your Users
Smartphone
Notebook
Media Tablet
Desktop PC
HVD
Profile A
Roles ……. …….
Notebook + Smartphone
Profile B
Roles ……. …….
Desktop PC + Smartphone
Profile C
Roles ……. …….
Tablet PC
Profile D
Roles ……. …….
Desktop PC
Profile E
Roles ……. …….
Smartphone
Profile F
Roles ……. …….
HVD + Tablet PC
(From "Segmenting Users for Mobile and Client Computing," 23 February 2012, G00227122)
Policies to Regulate the Consumer Mobility
Costs
Compliance
People Technology
Security
Operations
Provisioning, De-commissioning,
Auditing, Reporting, Self-service,
Patches/Upgrades, Maintenance,
Levels of Support (e.g., user
portals, trouble shooting).
Provisioning, De-commissioning,
Auditing, Reporting, Self-service,
Patches/Upgrades, Maintenance,
Levels of Support (e.g., user
portals, trouble shooting).
Mobile Data and
Corporate Server
Protection (e.g.,
monitor and filter
accesses to servers).
Application Delivery
(e.g., OTA s/w
distribution, private
application stores).
Containerization of
corporate footprints
on personal devices.
Mobile Data and
Corporate Server
Protection (e.g.,
monitor and filter
accesses to servers).
Application Delivery
(e.g., OTA s/w
distribution, private
application stores).
Containerization of
corporate footprints
on personal devices.
Liability, Contracts,
Compliance, Health
and Safety,
Ownership, Benefits,
Taxes, Accessibility
(e.g., email archiving
and retrieval, local
data encryption).
Liability, Contracts,
Compliance, Health
and Safety,
Ownership, Benefits,
Taxes, Accessibility
(e.g., email archiving
and retrieval, local
data encryption).
Internal Communication,
Demand Management,
Privacy, Policy Sharing,
Training, Work-Life
Balance, Rewards.
Internal Communication,
Demand Management,
Privacy, Policy Sharing,
Training, Work-Life
Balance, Rewards.
Voice/Data Costs, Insurance,
Warranty, Device Costs,
Deployment Costs. Policies
Include Inventory, Reporting,
Alerts, Policy Enforcement.
Voice/Data Costs, Insurance,
Warranty, Device Costs,
Deployment Costs. Policies
Include Inventory, Reporting,
Alerts, Policy Enforcement.
Supported Devices, Data Plans,
Applications, Services,
Infrastructure, and IT Integration.
Supported Devices, Data Plans,
Applications, Services,
Infrastructure, and IT Integration.
Mobile Enterprise Strategy Is a Process Updated Every Six Months
Typically internal
Typically external
Typically mixed internal/external
Demand
What must we
deliver?
Risk Management
Suppliers, apps, ...
Governance Financial metrics,
KPIs, ROI
Supply
Tools, techniques,
sourcing, skills
Typical projects to address delta current -> desired
Mobile App Dev
Architecture, MADP, MAM, Corp App Store
UCC Integration
SharePoint, Lync and so on
Intranet Access
VPN, ID/Authentication
Enterprise File Sharing and Synchronization
Solutions
Mobility Center of Excellence
MDM
Sourcing, Delivery
Managed Mobility Services
Full Life Cycle Management
BYOD
Eligibility, Policy, Contract
Mobile Worker Segmentation
Four to Seven Profiles
The Different Forms of BYOD
Transfer of Responsibility for Device(s) to the Employee Financial compensation through stipend or rewrite of employee
agreement/salary increase
Hybrid Models Personal device used with
corporate subscription Corporate device used with personal apps and services
Additional Device Personal device used in addition to corporate device(s)
Mobilization of "Last" User Tier
Users that never would qualify for a
corporate device or stipend now having
personal devices on approved list
Recommendations
Don't treat all users the same way — segment your base based on geography, platform, data needs, security, and costs.
Identify security and compliance requirements for mobile deployments — and set policies to manage risks.
Choose your management approach, lightweight versus heavyweight, before starting evaluations.
Investigate MDM as-a-service options for agility and costs optimization.
Select MDM and security capabilities to enforce mobile policies.
Plan for the future evolution of MDM into the enterprise mobile management, and the convergence with broader system management for all endpoints.
Recommended Gartner Research IT Market Clock for Enterprise Mobility, 2013
Monica Basso, Bryan Taylor (G00252106)
Bring Your Own Device: The Facts and the Future David Willis (G00250384)
Magic Quadrant for Mobile Device Management Software Phillip Redman, John Girard, Monica Basso (G00230508)
Critical Capabilities for Mobile Device Management Monica Basso, Phillip Redman (G00230106)
How to Use Dual-Persona Technologies for Mobile Management and Security Rob Smith, Leif-Olof Wallin(G00252621)
MarketScope for Enterprise File Synchronization and Sharing Monica Basso, Jeffrey Mann
Segmenting Users for Mobile and Client Computing
Monica Basso, Federica Troni (G00227122)
Toolkit: Segmenting Users for Mobile and Client Computing
Federica Troni, Monica Basso (G00232237)
For more information, stop by Experience Gartner Research Zone.
• Visit gartner.com/webinars
– Today's presentation is available to download on the Attachment
Tab of our webinar portal or will be available shortly on our
webinar page
– Check out the schedule of upcoming Gartner webinars (plus on-
demand webinars) and don‘t forget to share these resources with
your colleagues
• Contact your Gartner account executive with any additional
questions, comments or for a complimentary copy of today's
presentation
Simple steps for increasing the value
of today's webinar experience
26