Showing posts with label BYOD. Show all posts
Showing posts with label BYOD. Show all posts

Friday, September 14, 2012

The Key to BYOD? It’s the Data, Of Course

This article was originally posted on the Chief Mobility Officer Blog presented by Visage
http://visagemobile.com/mobilityblog/2012/09/13/the-key-to-byod-its-the-data-of-course/ 

The Key to BYOD? It’s the Data, Of Course

Millions of smartphones have invaded the workplace in recent years — and millions more are on the way. But it’s not the devices themselves that deserve so much of the chatter surrounding “BYOD.” Yes, legions of workers have made their smartphones and tablets integral parts of both their professional and personal lives. But for CIOs and CEOs, it isn’t the device they’re bringing that matters at all — it’s the invaluable data streams that course through them when they’re on the job.
Everyone can discuss and debate which device, what platform, which apps — but at a higher level, the end-game is all about the data. Forward-thinking technology managers are looking to get access to actionable mobility data to drive business, not just distribute phones. After all, the devices are simply the empty conduits of that data. And the data holds the keys to streamlining communication, tracking user behavior, managing costs and a host of other key business functions.

Smart Mobile Management

With the proliferation of smartphones and ease of access to data, companies are managing BYOD policies whether they want to admit it or not. Some are implementing new processes to get on top of all that data and put it to work. Others aren’t yet up to speed — and are increasingly prone to leaving their organizations vulnerable to security breaches, out-of-control spending and behavior, and unclear (or nonexistent) employee communication policies.
Smart mobility management means having the tools and technology to securely manage the constant data exchanges between your mobile workforce, back-end systems and inventory, assets, customer services, and more. The process needs to consider personal privacy, ease of adoption, and effective management of company data. Where can mobility data make a difference to the bottom line? Naturally, it varies from industry to industry. In just one sector —  field service — here’s what mobility data is helping enable:
  1. Improved visibility to work assigned to field service crews, which fosters reduced fuel costs, travel times, and first-time fix rates.
  2. Improved job assignments based on immediate availability, current location, or skill set.
  3. Increased productivity due to more efficient planning of resources.
  4. Improved inventory control with real-time visibility into parts on hand.
  5. Increased collection rates with mobile invoicing at the time of service.
  6. Improved customer interactions, with access to historical data that enables sales professional to follow up on services offered.
New companion strategies to BYOD, including Mobile Application Management (MAM) and Mobile Device Management (MDM), are evolving to help companies manage their data.These solutions provide ways to distribute applications and data to approved employee devices, corporate- or personally owned, while providing tools to support them in the field. Companies can set data encryption criteria, establish role-based access to data, and set parameters for deleting data or decommissioning a device from the system.
Ultimately, BYOD and companion mobility strategies are all about empowering your business and employees by securely delivering the right data, at the right time, to the right employee and device.
MoreHow to Safeguard Your Mobile Devices Against Security Breaches and Outages.

Image used under Creative Commons by Flickr user TIC Colombia.


Jody Sedrick
Enterprise Mobility Strategist, Follow me on Twitter: @jodysedrick and @zenewareinc

Thursday, May 24, 2012

IBM bans Siri - loose lips a security risks


A new wrinkle was introduced in the BYOD argument today as IBM announced they are banning use of SIRI in its networks viewing SIRI as a potential security risk.
Where's the rub?

Siri captures your voice input and sends the data to Apple's servers in North Carolina where it processes the voice inputs to send the query results back to the device. It is unclear who has access to this information and for how long.  IBM is concerned that anyone with access to these servers could glean information from these transmissions.

While IBM is prohibiting the use of Siri within their networks what happens when an IBM employee is off campus? They still have access to Siri.

I've noticed  a greater concern about BYOD the past couple of months. This puts a new wrinkle in the BYOD argument.  While on the surface BYOD seems a great idea with the promise of greater employee productivity, IT costs being shifted to employees and worker satisfaction. There are significant risks that are bubbling to the surface that companies are have ing to address with stronger BYOD policies.

IBM's banning Siri highlights the criticality of protecting company data. It is imperative that companies establish BYOD policies that address company needs and provide clear acceptable policies for a personal device. IBM is finding this balance is a  little difficult to manage  and in the end zipping the lips of Siri. 

I'm curious to see what other BYOD policy changes are coming down the pike.


Jody Sedrick
Follow me on Twitter: @jodysedrick and @zenewareinc

Thursday, May 3, 2012

Enterprise Mobility - "While we are benefiting, it's a mobility mess!"


This morning I visited with a significantly larger enterprise client that has divisions that provide services in  mining, oil and gas exploration, environmental impact studies, building engineering, water conservation and more. In our conversation he commented, "My biggest challenge is that we have come to realize we all have all these disparate mobile solutions that service individual business silos, but can not interact with each other. Each division is running their own mobile strategy. Some have mobile apps, some are still on spread sheets, others have no mobile solution but considering and I just learned we currently have two MEAP solutions running. And we haven't even discussed the mobile device issues. While we are all benefiting individually, it's a mobility mess."

In my experience companies who have rolled out mobile solutions have deployed them in an opportunistic fashion. Typically a field manager has caught the mobile vision early. Through his ingenuity, tenacity and budget maneuvering has implemented a mobile solution specific to his group. The positive impact of his mobile solution inevitably catches the eye and envy of other departments who eagerly clamor to adopt mobile solutions.

While this approach provides a strong, quantifiable internal use case for mobile solutions it often leads to a reevaluation of the first mobile solution. Especially, if the first mobile implementation only addressed a specific business need, was limited in scope, didn't plan for the broader needs of the company and was not scalable.

Developing a strategic plan is critical for the on-going adoption of enterprise mobile solution. The key is understanding "why you are going mobile". Evaluate what you trying to accomplish from an enterprise level all the way down to the individual level. Then develop a strategy that addresses this across the enterprise. Companies need to focus on the following key areas
  1. Identify key business processes that will benefit from mobilization.
  2. Determine how individual mobile projects integrate with a central mobile management, backend databases and security infrastructure?
  3. Establish security policies for data accessibility, network accessibility, application distribution, device management, BYOD policies, etc.
  4. Identify supported mobile devices; SmartPhone, TabletsPCs, Rugged devices
  5. What supporting hardware is needed? Mobile Printing, GPS, RFID, etc.
  6. Determine if mobile apps will be available on different mobile form factors; SmartPhone, TabletPCs, Rugged devices, etc.
  7. Identify mobile user roles. User will roles determine data accessibility, security rules, appropriate device options.
  8. Determine if mobile roles are transactional, informational or collaborative
  9. Identify if mobile business processes and user roles are B2B, Internally driven or B2c
  10. How many mobile users are targeted?
  11. How will deployment and support of mobile users scale over-time?
  12. What mobile architecture do you need to have in place?
  13. How will mobile apps be developed, deployed and managed? Who will oversee this?
  14. What types of apps will be supported? Custom-built, off-the shelf, modified mobile app templates, HTML5 mobile apps
  15. Determine how success will be measured
Yes enterprise mobility brings new challenges and opportunities. Investing the time to conduct a full enterprise mobility assessment and developing the appropriate strategic mobility plan is critical for long-term sustainability and scalability of mobile solutions in the enterprise.

Like my client said, "We've been dabbling in mobility long enough. It's time to get serious and unify our mobile strategy and get out of this mobility mess."


Jody Sedrick
Follow me on Twitter: @jodysedrick and @zenewareinc

Monday, February 27, 2012

BYOD - fast becoming the norm for enterprise mobility

BYOD a growing trend
Aruba Networks published a survey this week that shows 85% of hospitals allow physicians and staff to use their personal mobile devices for work activities. The adoption of BYOD, "bring your own device" is fast becoming the norm the adoption of mobility solutions into the enterprise.

This trend obviously causes challenges for network administrators who are tasked with building out network capabilities, securely providing access to key data and managing a range of mobile devices.  Gartner has long reported that the consumerization of IT is one of the biggest challenges for IT departments for the next 10 years. 35% of the Aruba Networks study respondents reported they plan on building out their current wireless and hard-wired infrastructures within the coming year to support the increased demand of "use your own device".

With the increased drive to mobilize more segments of business, is a BYOD policy right for you?

As companies evaluate and implement BYOD policies they are reaping benefits in the following areas"
  • Provides the benefit of reducing capital expenditures
  • Extends user choices beyond the standard corporate devices. 
  • Increased mobility and productivity. 70% of employees with Smartphones check their corporate email outside of business hours. 43% connect to get ahead of the workload for the following day.
  • When workers use their own devices IT support calls are diminished from 4.5 times per month to 2.5 and tend to focus solely on corporate access
  • High job satisfaction
As you implement BYOD policies consider the following:
  • Who is permitted to have a business supported mobile device? Generally this is determined by organizational role.
  • What devices are supported? Previously BlackBerry held this space but now with BYOD you must consider iOS, Android, Windows Phone etc.
  • Who pays for the device and on-going expenses
  • Some enterprises may want to enforce acceptable use of a device. Enforceability concerns need to be considered.
  • What apps are you going to support?
  • Where are apps acquired?
  • User responsibilities

Cloud based CRM, Work Management Systems, MAM (Mobile App Management), and MDM (Mobile Device Management) solutions are certainly facilitating the trend for adoption of BYOD. With the increased ability to securely distribute and manage corporate data at the point of interaction the adoption of mobile solutions is increasingly more appealing and critical.



Jody Sedrick
Follow me on Twitter: @jodysedrick and @zenewareinc
LinkedIn Profile