Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
Taming Mobility
Cyber Technology Conference
Chris KoenemanSVP Tangoe
2Confidential Information.
Latest Trends in Mobility
Two Types of Solutions Used to Tame Mobility
The Latest on BYOD
3Confidential Information.
The Three Big Shifts in Enterprise Mobility
1990sCell PhonesNokiaMotorola
2000sMobile EmailBlackberry
2010sMobile InternetAppleAndroid
4Confidential Information.
Growing Influence of Mobility
20172.89 BILLION smartphones in use globally.
2018Mobile internet traffic overtook PC internet traffic.
20204.3 BILLION mobile subscribers, 10.8 BILLION mobile connected devices.
5Confidential Information.
vv
Growing Influence of Mobility
of enterprises believe mobility is a top priority.
71% 63%of enterprises believe mobility is the biggest factor in helping them gain a competitive advantage.
6Confidential Information.
Anytime, Anywhere WorkforceIn 2016, 45% of the workforce became “Anytime, Anywhere”
Office-Based Workforce
55%
MobileWorkforce
45%
2011 2012 2016
23% 29%
7Confidential Information.
Top Reasons for Mobility EmphasisCIONET Survey
72%customer relations
63%sales increase
79%employee success
74%cost savings
8Confidential Information.
Mobile-Focused Businesses Outperform Their Peers
26%more profitable
9%more revenue
12%higher market value
9Confidential Information.
Mobile Investment BenefitsTop reported benefits that drive mobility investments, according to IT Leader Survey by Apperian
New revenue of service delivery opportunities
Competitive advantage
Platform usage
Increased employee satisfaction
v v
v v
Cost savings
Improved business processes
v
v
10Confidential Information.
Staffing for Mobility SupportMobility is becoming more complex and required full-time staff is increasing
2.9 3.2
3.6
4
5
Number of full-time employees required per 1,000 connected devices
2016
11Confidential Information.
Mobile Device Total Cost of OwnershipBased on Total Cost of Ownership of Mobile Devices By Gartner
12Confidential Information.
Cost
Impact on Productivity
HI
LO
HILO
Invest in OptimizationSunset
Invest in ExpansionMonitor
Mobility Prioritization
13Confidential Information.
TAMING MOBILITY
Two Complementary Solutions
Mobile Device ManagementMobility Management Software
14Confidential Information.
Mobile Device Management
Secured mobile device access to sensitive internal networks and resources
Unified Endpoint Management
A universal security platform that manages all devices and operating systems in any use case
Focus to secure rogue “non-managed” devices that were accessing corporate resources
Enterprise Mobility Management
Expanded IT’s control beyond the device level and added data-level DLP controls and application data management
Consumer devices created a greater need for access to corporate date in order to enable the mobile workforce
A unified platform management system eliminates the need for multiple systems to manage endpoint devices
15Confidential Information.
2019: Laptop management will be more like mobility management
Corporations Transition from Windows 7 to 10
Unified Endpoint Management (UEM)UEM is the convergence of management tools for all enterprise computer devices—smartphones, tablets, laptops, and just about everything.
Microsoft leverages its strength in desktop OS
16Confidential Information.
employees
finance
IT
data
HR
expenses security
updates
Corporate mobility is complicated
17Confidential Information.
MMS – DIY
MMS adoption is running parallel to CRM adoption
18Confidential Information.
SaaS basedNot an app on the deviceNot a premises based applicationCloud based
Executes actionsWorkflows Single consoleConsolidated reports
Centralizes mobility informationMatches devices to individualsIntegrates with mobile carrier dataIntegrates with MDM
Mobility Management Software
19Confidential Information.
ACTI
VITY
TIME
Conventional view of mobility
Deployment
Identified need
RFP
SelectVendor
Configure
End User Receives Device
End UserSupport
Policy Adherence
Break/FixReplace
20Confidential Information.
ACTI
VITY
TIME
Mobility management software brings efficiencies to ongoing management
Deployment Deployment
SAVI
NG
S
Policy Adherence
Asset Management
ExpenseManagement
WorkflowManagement
Visibility
Cost Savings
Automation
21Confidential Information.
29%
71%
Self-developed Vendor-provided
Source of MMS/TEM platform
MMS – DIY or Buy?
22Confidential Information.
23Confidential Information.
COBOCompany OwnedBusiness OnlyTraditional model
COPECompany Owned Personally Enabled
BYODOwned by the individualHas to be managedCould be CYOD
Device Ownership Models
24Confidential Information.
vv
BYOD: Support Intensive?
Data source: MOBI
Corporate Liable
average annual calls per device
2
average annual call time per device
13 minutes
BYOD
average annual calls per device
1.5
average annual call time per device
18 minutes
COBO and COPE are the most commonly established policies
Q4: Which, if any, of the following mobile device policies does your company currently have in place? Respondents: 100 [Large 49, SMB 51; Senior 47, Mid-level 53]
40%
29%
56%
66%
Bring Your Own Device (BYOD) Choose Your Own Device (CYOD) Company Owned, PersonallyEnabled (COPE)
Company Owned, Business Only(COBO)
Mobile Device Policies
1.9Avg. # of
Policies in place
BYOD is on the rise
q1: Which of the following, if any, are part of your digital transformation strategy? Respondents: 40 [Among those that have BYOD]
70%
30%
0%
Increase Holding Steady Decrease
Future of BYOD at Company
BYOD is typically managed using a MMS/ TEM Platform
Q6: Do you use a MMS/TEM platform to manage BYOD? Respondents: 40 [Among those that have BYOD]
78%
15%
5%
Yes No Unsure
Use of MMS/TEM platform to Manage BYOD