how to create the perfect solution - mcrinc · d echnoloy ow to create the perfect solution 2 ......

17
Sponsored by: MDM Technology: How to Create the Perfect Solution Copyright ©2014 CBS Interactive Inc. All rights reserved.

Upload: ngoque

Post on 07-May-2018

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

Sponsored by:

MDM Technology: How to Create the Perfect Solution

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Page 2: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

2

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Contents

Introduction ................................................................................................................ 3

Unavoidable: 62 percent of companies to allow BYOD by year’s end .......................... 4

Four stages to conquer mobile content management ................................................. 7

Research: 41 percent increasing IT security budget in 2014 ..................................... 10

PwC: Software at the forefront of tech M&A activity in 2014 ..................................... 13

7 things to think about with enterprise mobile service architecture ............................ 14

Five Takeaways ........................................................................................................ 16

About Skyhook and ZDNet ........................................................................................ 17

This document is comprised of CBS Interactive editorial material and has been written and compiled by CBSi editors and

affiliates. While Skyhook may have had input on the topic and title of the guide and is the exclusive sponsor, CBSi has

maintained editorial control of the content in this guide.

Page 3: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

3

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Introduction By the end of 2014, 62% of organizations will institute Bring Your Own Device policies. This means

a constantly mobile, constantly connected workforce will be armed with crucial business data at all

times. The ability to manage and protect the devices carrying this data will be a critical aspect of any IT

department’s operations. Fortunately, there are technology companies that are simplifying and securing the

management of mobile devices.

Mobile Device Management (MDM) services and technology

providers must understand the needs, risks and day-to-

day processes of the organizations they serve. They must

understand how and why devices are being used in order to

provide seamless and secure technology. This can be a tricky

process, especially as mobile needs change industry-wide,

and as the mobile workforce increases in size.

If your organization is looking for more information on building

out your MDM technology, this Tech Roundup is the perfect

resource for you. Packed with articles from pre-eminent editors

and bloggers on the leading IT media outlets, TechRepublic

and ZDNet, this editorial reference guide provides you

with objective information on MDM technology done right.

In addition to leading editorial, we’ll offer you several key

takeaways to consider as you improve your solution. u

Mobile Device Management

(MDM) services and technology

providers must understand the

needs, risks and day-to-day

processes of the organizations

they serve.

Page 4: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

4

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Unavoidable: 62 percent of companies to allow BYOD by year’s endBy Teena Hammond

As employees bring their personal smartphones, tablets and laptops to the office, or use them offsite as

they take their work home, IT departments are grappling with the growing Bring Your Own Device (BYOD)

trend.

This change in how people work and the devices

they’re working on is leading to many IT departments

setting BYOD guidelines to protect company security as

employees access email and other potentially proprietary

data on their own devices. By setting guidelines, access

to data is controlled and productivity can be extended to

these devices.

Get a head start on launching a BYOD program with TechRepublic’s ready-made BYOD policy. To better understand how IT departments are approaching BYOD, we invited TechRepublic and ZDNet

members to take a BYOD Business Strategy Survey. A wide array of responses was received with more

than 1,000 people worldwide participating. The following are just two surprising facts we discovered:

More than 44 percent of organizations already allow BYOD and another 18 percent plan to move to BYOD by the end of 2013.

More than 44 percent of

organizations already allow

BYOD and another 18 percent

plan to move to BYOD by the

end of 2013.

Page 5: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

5

Copyright ©2014 CBS Interactive Inc. All rights reserved.

BYOD isn’t new for those who allow it, with 61 percent of companies with policies already in place having those policies for more than a year.

Page 6: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

6

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Respondents also revealed their reasons for not adopting a BYOD policy. Security topped the list, but

there were other, less obvious, motives. For companies with policies in place, our research uncovered the

following:

• Brand/Type of device most often issued by the company

• Device brand restrictions

• Percentage of employees who participate in the program

• Type of personal devices used most often for work

• Security approaches

• Hardware/Service plan costs (i.e. who’s paying)

Whatever position your company takes on BYOD, whether to allow it or not, the information in this report

can help you develop a BYOD plan that serves both the organization and employees. u

Page 7: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

7

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Four stages to conquer mobile content managementBy Teena Hammond

Mobile content management (MCM) is becoming more important as a platform for enterprises as mobility

and Bring Your Own Device (BYOD) provide the technology framework for today’s workforce. Naturally, this

means that the market is quickly flooding with MCM solutions from mainstream collaboration tools vendors

and mobile app developers. Even the mobile device management (MDM) players are getting into the act.

I must also note that my recent research into MCM also shows it is converging with mobile collaboration in

both product roadmaps and how enterprise mobile users are interacting with corporate content from their

mobile devices.

I put my analysis of MCM in front of Yaacov Cohen, CEO of harmon.ie, a collaboration tools provider

focusing on Office 365.

Stage 1: Rogue IT or Shadow IT - Free cloud storage phase

The first stage of mobile content management considered by some on the market as Rogue IT (otherwise

known as ShadowIT). This is where mobile users with a little bit of knowledge begin putting corporate

documents into personal cloud storage accounts on Dropbox, Google Drive, Box, or OneDrive (formerly

SkyDrive).

Two reports that can speak more to risks of the Rogue IT stage are:

• The High Cost of Mobile Business Users’ Rogue IT Practices (PDF) from harmon.ie

• State of the Enterprise Information Landscape (PDF) from Huddle, a collaboration platform that

challenges SharePoint

While consumer cloud vendors including Dropbox and Box have released two-factor authentication, it

doesn’t mean users are going to implement security measures especially if they are using free storage

without the blessing of corporate management

The security risks inherent with stage 1 mean enterprises don’t want to stay here long. Likewise, the

requisite endpoint security needs to be in place or else elements of stage 1 could remain in place.

Page 8: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

8

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Stage 2: Cloud solutions, mobile device management and intelligent mobile apps

With Office 365, Huddle, and RedHost taking collaboration to the

cloud, stage 2 means that an enterprise can approach MCM in a

more mature manner with user privileges, true file locking, content

version control, and intelligent mobile apps from innovative

platform and third party vendors. Stage 2 is more about control

and collaboration, less about the ad hoc convenient file storage

that marks stage 1.

Today’s cloud collaboration platforms mean their own class of

intelligent mobile apps. I’ve written about harmon.ie’s SharePoint client offerings on both iOS and Android.

Colligo is also doing some excellent work with Colligo Briefcase. Huddle’s mobile app includes a patent

pending document recommendation engine and improvements on the mobile app are certain to play into

Huddle’s overall product roadmap.

Traditional MDM vendors including MobileIron, AirWatch, and Good have their own app stores now.

Vendors including harmon.ie have released secure versions of their apps that integrate directly with the

MDM solution.

As MCM gains more intelligence in stage 2, Mobile Identity Management becomes an option as distinct

requirements for device security and cloud access grow for enterprises.

Tom Kemp, CEO of Centrify, a leading identity tools vendor that support mobile and cloud application said,

“First and foremost, ensure the device is secure. Second, you want mobile application management to

deploy the app to the device, then the next thing is what people really want is that people don’t want to

always have to enter their username and password when they access files.”

Stage 3: Cloud, MDM, intelligent mobile apps, and social

The introduction of an enterprise social component to MCM marks stage 3.

“I would say if you are serious about collaboration – your second stage – you need social,” adds Cohen. He

labels it a natural evolution because it takes mobile users beyond the document and fosters brainstorming

You can have social interactions, and say ‘hey, why don’t you update this slide.” You can already look at

that as the third one.

The social component that arrives with stage 3 is especially important as companies turn to mobile first

strategies, geographically dispersed workforces, and contractors to serve their customers.

Today’s cloud

collaboration platforms

mean their own class of

intelligent mobile apps.

Page 9: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

9

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Stage 4: Emergence of context and location-based technologies in MCM

“Context or intelligence is the next generation,” says Cohen. “Nobody is really doing it.”

His look into the future of context is the content being brought to the mobile user when they need it. His

example to me was an employee has an important meeting with a manager or executive. A mobile content

management solution pushes the latest documents you have rights to on the collaboration platform and

even recent enterprise social posts from the meeting attendees. He also predicts that the REST API will

play a role in the future phase and query Salesforce and perhaps other backend systems for data pertinent

to the meeting. This data would in turn appear on the mobile devices of authorized meeting attendees.

It could even be location-based. Cohen points to where a

mobile device’s location can help drive further contextual

information

Stage 4 wasn’t in my original article. It’s Cohen’s

suggestion to me and matches other activity I’m seeing

in the market, so I added it to my original three stages. For example, I recently got a briefing from Blake

Brannon, global sales engineering manager for Air Watch about recent updates to the Air Watch Content

Locker. Geographic-base security called Geo-fencing is part of the product enabling enterprises to lock

down corporate content by geographic location. Other vendors are moving in a similar direction. Look for

an upcoming TechRepublic post from me about the AirWatch Content Locker.

Final thoughts

Through changing business rules, technology, or security concerns, the state of mobile content

management is continuously evolving. Enterprises need to manage their mobile content management

requirements from inception through the next generation technology options that stage 4 offers a mobile

workforce. u

“Context or intelligence is the

next generation,” says Cohen.

“Nobody is really doing it.”

Page 10: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

10

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Research: 41 percent increasing IT security budget in 2014By Teena Hammond

Security is always a concern for IT professionals, and media news reports of breaches and leaks, combined

with internal threats, have further increased worries.

A recent Tech Pro Research survey focused on IT security. The survey attracted 244 respondents from

around the globe and from organizations of all sizes. The resulting report, IT Security: Concerns, budgets,

trends and plans, focuses on the key findings from the survey.

Budgets were a hot subject. Overall, 41 percent of survey respondents said they will increase their IT

security budget next year. This is a 16 percent increase compared to the number of budgets that rose in

2013. In addition, only 11 percent of all respondents said they plan to decrease their security budget next

year.

About two-thirds of the respondents said they are now more

concerned with security, following media reports of breaches and

leaks. However, only large organizations with more than 1,000

employees are planning to improve IT security controls. Smaller

companies are lagging behind in the implementation of IT security

controls.

Security projects were also discussed, with the top project for 2014

remaining the same as 2013: the development of better risk management processes.

41 percent of survey

respondents said they will

increase their IT security

budget next year.

Page 11: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

11

Copyright ©2014 CBS Interactive Inc. All rights reserved.

One of the top security concerns for businesses in 2014 will be Bring Your Own Device (BYOD). Lack of

employee awareness regarding social engineering attacks was the number-one concern in 2013, but this

moved to joint second place for 2014, with BYOD taking the top slot. BYOD has been such an ongoing

topic that Tech Pro Research has created a ready-made BYOD policy that companies can download to use

as their own policy.

Page 12: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

12

Copyright ©2014 CBS Interactive Inc. All rights reserved.

The report also addresses the following IT security topics:

• Employee awareness challenges

• Improved risk management leads

• Managing internal threats

• Moving to risk management

• BYOD challenges u

Page 13: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

13

Copyright ©2014 CBS Interactive Inc. All rights reserved.

PwC cited that software

accounted for 35 percent of

technology M&A volume in 2013.

PwC: Software at the forefront of tech M&A activity in 2014 By Rachel King

This might seem rather obvious following Facebook’s astounding and ginormous acquisition of WhatsApp

on Wednesday, but mergers and acquisitions in the tech world are poised to stay strong this year.

That’s the major takeaway from the latest recap and forecast from PricewaterhouseCoopers, which published

both its US Technology Deals Insights 2013 Year in Review and 2014 Outlook reports on Thursday.

Following some missteps and disappointments in 2011 and 2012, analysts from the global consulting firm

repeatedly predicted better things throughout 2013 as far as both tech M&A and IPO activity were concerned.

PwC was right for the most part, although the Deal Insights report noted that the cumulative technology

deal value for 2013 closed at $99.8 billion, down three percent from 2012.

Nevertheless, PwC pointed toward “an abundance of cash reserves from technology majors and record

levels of private equity capital” at the end of the year, which they believe have set the stage for an uptick in

technology deals this coming year.

But where the money is going might still come as a bit of a surprise -- at least to those only paying attention

to flashy trends and big-number predictions. (See: Varying forecasts for the number of connected devices

expected to take over the world between 2017 and 2020.)

Rather than mobile and big data, which are arguably the buzzwords du jour in enterprise technology, plain

old software is still the ringleader as analysts argue that this sector will remain at the forefront of tech deals.

That’s because software, as it expands into the cloud to be delivered as a service, helps fuel and power

these other verticals.

PwC cited that software accounted for 35 percent of technology M&A volume in 2013. That pace should

continue, but expect some alterations.

For one, analysts proposed that the “lines between the

Software and Internet sectors continue to fade,” which

means combined sub-sector deals will likely decline.

However, software is getting a boost as hardware M&A

activity looks mixed.

To fill in the gaps (such as infusing intelligence and automation into more critical processes), PwC

concluded that there will be “more software acquisitions that enable users to orchestrate traditional

hardware tasks with software.” u

Page 14: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

14

Copyright ©2014 CBS Interactive Inc. All rights reserved.

7 things to think about with enterprise mobile service architectureBy Joe McKendrick

In a recent article posted in Service Technology, Drs. Longji Tang of Hunan University, and Wei-Tek Tsai of

Arizona State University propose “Enterprise Mobile Service Architecture (EMSA),” which they describe as a

new enterprise architectural approach for mobile system integration.

“EMSA is a hybrid architectural style composed of enterprise mobile computing, enterprise SOA, as well

as enterprise cloud service architecture,” Tang and Tsai state. The greatest distinction from a traditional

architecture supporting PC-based clients is that the success of mobile depends on the vendors providing

the backbone services.

Here are the seven key “views” that comprise a well-functioning EMSA:

Enterprise Mobile Service: This comes from the provider side. The manufacturers of mobile devices

often provide built-in services, such as native SMS service, email service, mobile web services, and cloud

services, the authors point out.

Enterprise Mobile Service Consumer: This is the application, not the user. Enterprise mobile service

consumer can be defined as any mobile application or user interface that is provisioned in the mobile

devices, and that can access and consume enterprise mobile services.

Enterprise Mobile Service Data and Mobile Context: Mobile computing is different from traditional

distributed computing in that data and the context of data is constantly changing, versus working from a

stationary PC. “The ‘mobile context’ is a dynamic data set,” influenced by users’ tendency to roam, thereby

quickly passing from one environment to another. “Context-awareness is defined as a service capacity with

full awareness of current service execution environment that includes location, time, and user information.”

Enterprise Mobile Service Process: The role of the device in completing business processes. The

EMSP is an extension of the general enterprise service process (ESP), “a set of composed and managed

services for completing a complex business process, such as online shopping or shipping workflow, or any

business transaction process.”

Enterprise Mobile Service Infrastructure: The EMSI is an extension of SOA infrastructure. Tang and

Tsai state. However, the performance and reliability of mobile clients are dependent on the backbones of

mobile network providers.

Page 15: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

15

Copyright ©2014 CBS Interactive Inc. All rights reserved.

Enterprise Mobile Service Management: While following general SOA management principles,

EMSM also addresses specific aspects and principles “based on mobile constraints, specifically on

mobility, real-time, and highly dynamic behaviors.” Such constraints include the fragmentation seen

across the mobile space in terms of form factors, operating systems and browsers -- as well as the

routing of Web content through operator networks.

Enterprise Mobile Service Quality Attributes: These track closely to enterprise SOA quality

attributes, including performance, reliability, scalability, reusability, maintainability, security, cost, and

interoperability. u

Page 16: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

16

Copyright ©2014 CBS Interactive Inc. All rights reserved.

FIVE TAKEAWAYSFive points you should take away from this reference guide:

1. Be Excited: BYOD is quickly becoming the norm. Your services will be needed more in the

coming year than they were in previous years. Get your team up-to-speed and be prepared to

deliver your services to more organizations, to more employees, on many more devices.

2. Be Safe: Organizations are more cognizant of security concerns than they’ve ever been. When

they come to you for your expertise, they’re going to want you to lead them toward a more secure

mobile ecosystem. Do what it takes to guarantee their data doesn’t end up in the wrong hands.

3. Be Diverse: Your clients will view their mobile architecture through many different lenses, from

the applications they run, to the data they’re able to collect, to the infrastructure the systems are

built on. It’s your job to ensure that all of these variables interconnect seamlessly. Do what it takes

to provide one cohesive management solution.

4. Be Nimble: Over the past five years, we’ve seen how much the mobile landscape has changed.

In the next five years, mobile adoption and functionality will look radically different than it does

today. You must stay ahead of these trends and guarantee the same level of MDM expertise

regardless of where the technology takes the industry.

5. Be Innovative: The organizations that dictate the pace and adoption of new MDM technologies

will be the first stop for businesses looking to advance their mobile strategies. Make sure

that you’re striving to achieve new advancements, rather than simply catching up to current

technology. You may stumble along the way, but your successes will overshadow your failures. u

Page 17: How to Create the Perfect Solution - MCRinc · D echnoloy ow to Create the Perfect Solution 2 ... companies to allow BYOD by year ... research into MCM also shows it is converging

MDM Technology: How to Create the Perfect Solution

17

Copyright ©2014 CBS Interactive Inc. All rights reserved.

About ZDNet

ZDNet (www.zdnet.com) is where technology means business. The site attracts an

enthusiastic and interactive audience of business technology influencers, many of

whom visit for the latest coverage and analysis of how technology impacts business.

Business leaders and decision makers including CEOs, CIOs and IT professionals

at all levels value the site due to its extensive resources, enabling them to make the

most out of technology for their business challenges.

About Skyhook

Skyhook is the big data company that is continuously reinventing location. With

more than a billion geo-located Wi-Fi access points, 7 billion+ monthly location

requests, 10s of millions of devices, 2.5 million geofencable points of interest, 1

billion+ geolocated IP addresses and 30 million+ cell towers, Skyhook technology

enables businesses to gain unprecedented levels of insight to optimize mobile

experiences, provide the right content when it’s needed and certify that someone

is where they say they are. For MDM providers, Skyhook’s SDK ports easily to any

operating system or platform on all smartphones, tablets, and laptops, allowing for

better UX, new revenue models and improved app integration. Learn more about

how Skyhook serves MDM and MAM providers.