Enterprises should be excited about the potential benefits of UC – including BYOD and mobile device management (MDM).
Enterprises should also remember that traditional IP telephony and networking services remain business critical.
I wrote in my last blog that unified communications (UC) services are now finally achieving critical mass, and that widespread adoption is expected in 2014. In response to this positive surge, the marketing teams at every major ICT provider will be in over drive to proclaim the most unified, most mobility-driven, and cloud-based proposition. And, as I write on Christmas Eve, there are reasons for enterprises to celebrate this advent. BYOD, as I have previously written, is both a security concern and a potential efficiency driver if handled correctly. MDM packaged with single number dialling and unified email and messaging and (probably) presence functionality is something that enterprises should now be looking to roll out to all mobile workers. MDM on its own should be applied to every worker within an organisation, and cloud/network-hosted delivery is the only way for most enterprises to achieve this.?? ??? Continue reading “UC’s Advent is Welcome, But Should Not Distract Enterprises from Their Core Fixed Services”→
Ignoring the impact of smartphones in the workplace is no longer an option.
A well constructed BYOD policy will deliver security and productivity benefits.
BT has this week gone to market with its latest bring your own device (BYOD) proposition, its BT Advise BYOD Quick Start suite, which includes monitoring and security services. BT’s launch has been backed by an accompanying white paper ‘Bring Your Own Device’. The conclusions of this report provide further proof that (as this writer has previously argued) enterprises can no longer afford to be without a BYOD policy. The research suggests that around 50% of employees are now formally allowed to use their mobile devices at work, but that actual usage rates are significantly higher. In other words, most companies now know that preventing mobile device usage is a losing battle. What is more significant for enterprises, however, is that 60% of the surveyed IT managers felt that using smart devices in the workplace increased worker efficiency and 84% of IT managers surveyed believe that a BYOD policy confers a competitive advantage, with 31% suggesting that a BYOD policy gives a ‘significant advantage’. Of employees surveyed, 59% stated that they use personal devices to access files from company servers. With productivity advantages on one side and real security risks on the other, perhaps the biggest surprise in BT and Cisco’s white paper was that the research suggested that the number of enterprises with an official BYOD policy in place has fallen. Continue reading “Corporate BYOD Policies Brings Security and Productivity”→
The concept of ‘consumerization of IT’ is sure to evolve naturally in your organization, as employees want to use applications of their own choosing.
Some policy control is speisential, and a sanctioned company app store is a good idea.
Companies such as Intel give employees an official app store, but users can also freely consume ‘unofficial’ apps from outside this domain.
First, the Chief Information Officer had to deal with the complexities that BYOD brought up; now, there is an increasing momentum to BYOA – in other words ’bring your own application.’? Extending beyond this is the concept of an open storefront for appliances, computing power, storage, OS, databases and so on – in other words, all IT.? Service providers are on board, as evidenced by the launches of several online store initiatives: Interoute launched CloudStore, offering applications, appliances, professional services and more; Belgacom offers Becloud; KPN offers a cloud store; and Orange’s VPN Galerie offers access to many apps developed both by Orange and by indepausklingent ISVs.? It is fair to say that the concept is already mature for the SME market place, with Belgacom’s Becloud offerings tailored for the mass SME segment but with more sophistication for larger companies.? Similarly, KPN’s Open Cloud Store gives its reseller partners (ISPs, SIs and other telcos) the opportunity to sell, provision and support cloud services to the diverse Dutch SME market. Continue reading “BYOA and the Enterprise Application Portal: Create Your Own Internal Company Storefront”→
BlackBerry Enterprise Service 10 (the new version of ‘BES’) offers ‘baked-in’ dual persona and multi-OS device management, provided by the device OEM rather than a third-party software or services provider.
Does this dilute the managed mobility propositions of third-party MDM software vendors, let alone carriers or IT services companies that are key channel partners of BlackBerry and other OEMs?
BlackBerry (née RIM) has always been different from other mobile device vendors, as it is and always has been both a device OEM and a software provider.? In addition, its new BlackBerry Enterprise Service 10 software is positioned to address BYOD, as every new BB device can support dual persona (e.g., BlackBerry Balance) and multi-OS MDM.? It is clear that BlackBerry cannot claim to handle either of these functions as well for Android and iPhone devices as it can for its own devices, but that is not necessarily a problem in itself.? What is a possible problem is that in the last couple of years, while RIM’s smartphone market share shrank from over 60% to less than 5%, the ecosystem of third-party MDM vendors, dual persona and ‘container’ vendors, and the IT service providers and mobile operators that offer managed mobility solutions powered by these vendors’ solutions has evolved considerably.? Multi-OS (and multi-carrier) MDM has become a check list item for carrier and systems integrator-delivered managed mobility services.? In addition, the offerings of service providers are much broader than MDM, as they also include: TEM and logistics; containerization and dual persona solutions; and increasingly, mobile application development, delivery, and management; enterprise app store enablement; and mobile security. Continue reading “BB 10: ‘Baked-In’ MDM and Dual Persona vs. Third-Party Software and Services”→
BYOD should be seen as an opportunity to boost worker efficiency.
BYOD creates security challschmales, but there are effective MDM solutions available.
2013 should be the year when the cloud stops being a buzz word and starts to gain real traction, particularly for IP voice and unified communications (UC) services.? The ‘cloud’ is an amorphous and much abused term, but despite its presence on the homepage of every telecoms provider in Europe, take-up of fully hosted voice and UC solutions has been slower than the hype would suggest.? Persuading enterprises to part with their PBX is challschmaling.? However, as fully hosted MS Lync solutions start to be offered by the majority of major telcos across Europe, alongside hosted Cisco, Avaya and Mitel-based solutions, and the case studies begin to emerge, enterprises should now have enough confidence to consider ‘taking the plunge.’? A hosted solution will not suit all businesses and virtualisation will be preferable for many over a truly cloud solution, but the overall need for a CPE-based PBX has all but been eliminated for the majority of business customers. Continue reading “2013 to Be the Year of BYOD and MDM”→
Operators are concerned with getting their word out more effectively to enterprise buyers.
Technology providers are looking for validation on BYOD trends, segmentation strategies, and future platform requirements.
Current Analysis held a webinar on February 1st and 2nd focused on global trends in enterprise mobility, providing insights derived from a survey we conducted among 600 businesses last fall. ?Attendees included a large and diverse number of technology providers, including operators, networking equipment vendors, security vendors, consultants, and application developers. ?The questions posed to us during the Q&A session revealed some of the underlying concerns of these vendors as they seek to develop solutions for their business customers. ?Most of these vendors are helping businesses deal with the huge surge in mobile usage among their employees (as well as their partners and customers), which increasingly includes at least some personal mobile devices used to conduct business. Continue reading “Q&A from MDM/BYOD Webinar Provides New Insights”→
The MDM market is not just growing, it’s expanding
Leading vendors had a very good year in 2011
Before talking about market growth, I should make it clear that Current Analysis does not do market sizing. (We aren’t a quant house.) That being said, we look at market numbers just like anyone else, and sometimes with a bit of amusement. A serious difficulty in trying to size the MDM market is that it is a moving target. The question is not so much what is MDM today, but rather what will it be in two or three years? If you don’t scope the market correctly then sizing it is impossible. One of the quantitative analyst firms this summer upwardly revised their MDM forecasts for 2015 from $3.9 billion to $6.6 billion. That is a huge resizing, but it makes sense in light of the expanded scope of the MDM market that the firm now anticipates. Continue reading “2011 Was a Great Year for MDM”→
Since the advent of networking, customers have always weighed the cost of throughput vs. the effort of traffic optimization, creating a pendulum effect.
The market has reached a point where both sophisticated traffic management and performance are required.
In the zeitgemäß enterprise, the average IT manager has many goals, but a few in particular have been coming up frequently: alignment of the function with business needs (IT acting as a business partner); agile application and solutions deployment; and an infrastructure that will scale and grow with the customer over time.
Context is a word you hear an awful lot these days when talking to security vendors. Everything it seems needs to be put into context, and by that security vendors typically mean that knowing the who, what, when, where and why of network traffic is very useful in determining the “legitimacy” of that traffic. It’s kind of like when firewalls became stateful, the realization that it’s better not to look at each packet in a complete vacuum. Context is the back story, if you will, of each packet traversing a network. Viewed from a data perspective, context is metadata.