Do you want to know the real difference between “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)?” Do you want to know the role of enterprise mobility in BYO and the consumerization of IT? Are you looking for insights into enterprise mobility in application and desktop delivery? Are you looking for an independent overview of the Enterprise Mobility Management (EMM) solutions and curious about the different features and functions of each EMM vendor offering? If so, the EMM Smackdown whitepaper is a MUST read! In the current market there is an increasing demand for unbiased information about EMM solutions. This white paper focuses on solutions that we anticipate will have an important role in Enterprise Mobility Management.
The Bento Box Bliss of Enterprise Mobility
Enterprise Mobility, big data (and analytics), social collaboration, cloud computing and management are the top priorities of IT Executives in 2013 and 2014. The ultimate strategic objective for "tomorrow’s workspace" is to empowering end user by providing access to Windows, web, and mobile applications so they can access data and IT systems from both private and public datacenters regardless of the device or location. While tomorrow’s workspace is directly attached to the end user, it’s important to understand the role of "tomorrow's datacenter" and "tomorrows IT organization" to use the full potential.
What are the key components in tomorrow’s workspace?
- It is all about "Me:" User, Business Consumers.
- ANYx7 (Device, Screen, Location, OS, Application, Browser) Online/Offline, Managed/Un-Managed.
- Access: Data, Apps, Identity, Aggregated, Networking.
- Apps: Apps, Applications, Web/SaaS, Mobile.
- Devices; three screens + Hybrids.
- Managed; None/nothing, Device, Apps, Data.
- SelfService; IT Store.
- Context Aware: personalized.
- Collaboration; Social, Unified Communications, Mesh.
A bento is a single-portion takeout or home-packed meal common in Japanese cuisine. A traditional bento box or container holds a variety of delicious food. Japanese homemakers often spend time and energy on a carefully prepared lunch box for their spouse, child or themselves. Enterprise Mobility, or MobileIT is also a bento box. It consists of a variety of solutions so Business Consumers can access data and information systems regardless of the device or location enabled via a range of application delivery solutions.
“In a time of rapid change, standing still is the most dangerous course of action” and “when opportunity comes, it’s too late to prepare”
We hope that this whitepaper will be helpful so you are fully prepared for ‘tomorrow’s workspace’.
Mobile IT Strategy
The growing reality of Consumerization of IT and the increased use of personal mobile devices at work is causing many IT organizations to re-evaluate traditional IT operations, support, and management methods. A good strategy for how to support these users is important to prevent unwanted challenges.
We see many organizations primarily focusing on (EMM) features, products and vendors and lacking a clear and profound overall vision and strategy. This approach is not good or bad it depends on what the goal of the organization is. When the organization needs a point solution, the various vendors and corresponding products can help to solve this issue and fill-in the demands. When the organization is investigating possibilities, advantages, use cases and functionality of Enterprise Mobility Management”, a profound vision and strategy should be in place.
The following discussions and corresponding topics should be part of Mobile IT strategy:
- What types of device should be covered e.g. smartphones, tablets , laptops?
- What type of operating systems and devices need to be supported?
- Who owns the device?
- Do you allow personal devices (BYOD)
- What happens to uses personal applications and data?
- What level of support should be provided for personal devices?
- Is Company-Owned Personally Enabled devices? (COPE) an option?
- Is the Mobile IT strategy focused on Device, Application or Information/Data manage-ment?
- With personal devices, are users self-supporting?
- What happens with lost or stolen devices - can the data be wiped – full or selective?
- What is your ‘Application delivery’ strategy? Do you want to deliver Windows applica-tions and desktops, native rich mobile apps, classic web/SaaS applications and/or HTML5 based applications to various devices?
- What type of applications do users need to be more productive? E-mail, browser, fileSync, productivity suites, Line of Business Applications?
- Are you planning to develop your own mobile apps (in-house or through ISV)?
- Do you want to support internal web applications to mobile devices?
- Will users accept a third-party email client for corporate email?
- Is Unified Communications part of the MobileIT strategy?
- What is the (business) applications vendor support policy for EMM?
- Who owns the data, if corporate data is stored on the user’s personal device?
- What information do users want to access on their mobile devices? Do you want to separate personal and corporate information on the device?
- Are there any regulations about storing information on the device?
- Do you want to prevent users sharing corporate data with personal applications?
- Do you need encryption on the device or on specific content?
Secure Access and Networking
- What is the impact of Secure Access and Secure Networking solutions on mobile devices while connecting to hosted apps or desktops? What will the user experience be like with these secure access solutions?
- What are the performance, authentication, security, manageability and availability requirements for Secure Access and Networking?
- Do you want to give devices and/or applications Secure Access to corporate resources? Do the current Secure Access solutions meet the requirements? What will the User Experience be like?
- Do you need 2-factor authentication for application delivery? If so, does the solution integrate in the Enterprise Mobility Management solution?
Policies and regulations
- Do you have a mail / messaging security policy?
- Do you have a data security policy?
- Is encryption of email attachments secure enough to comply with your security policy?
- Do you have a need to block certain mobile device capabilities, like the camera or specific software?
- Are specific security or compliance regulations set for your region?
- What information do you want/need to monitor from the device?
- Who is the owner of the MobileIT strategy? What are the goals?
- What is the business-case? What do you expect as a ROI?
- What do you want to achieve, a business enabler, overall cost of ownership (TCO) and cost reducer?
- Do you understand the EMM vendor vision, strategy and roadmap?
- Is there a validated design for the Enterprise Mobility Management solution?
- Do you want the Enterprise Mobility Management solution as a public cloud service or hosted and maintained in your own private datacenter?
- Is the IT department able to adopt the technology with right knowledge and skills? What subject matter experts are needed to get and keep the EMM solution up and running in production environment? Is this expertise available? Who has overview of the complete EMM solution stack?
- Is the EMM vendor a financially healthy organization? Is this important in evaluation of the vendor and the solution?
- Is there a huge ecosystem with partners, consultancy, training and education around the EMM solution? Is this important for you?
- Is C-level management, Security, Networking, HR, Application Delivery, Workspace Support and overall the business consumer involved in the MobileIT strategy?
- There is not a standard for Mobile Application Management solutions, using MAM solutions for application delivery is a long-term commitment.
- How do you make sure the solution meets the User Experience so the solution will be adopted?
Bottom Line: Mobile IT strategy is teamwork. Success = Vision x Execution x Adoption.
Get a head start! Download our complete, in-depth, and independent whitepaper. We try to provide accurate, clear, complete and usable information. We appreciate your feedback. If you have any comments, corrections or suggestions for improvements of this document we want to hear from you! Feedback!? firstname.lastname@example.org or email@example.com follow Peter and Ruben on Twitter @Rspruijt or @PeterSterk