Enterprise Mobile Application Technologies TechRadar

Pamela Heiligenthal

I am launching an upcoming TechRadar methodology report that will look at the technologies that enable enterprises to deploy, monitor and manage mobile applications and company-owned devices, as well best practices to help refine our research.

I've identified eight technologies in this space:

  • Beta Distribution Tools
  • Enterprise Application Stores
  • Enterprise Mobile Management
  • Image Management and Configuration
  • Mobile Application Management
  • Mobile Application Performance Management
  • Mobile Device Management
  • Mobile Operations Management

Ultimately, we hope to accurately predict the long-term viability and business value of each technology over the next 5-10 years.

Your level of insight would be invaluable for me to complete this research. If you are interested in participating, feel free to leave a comment below or send an email to pheiligenthal@forrester.com and I will send you the details.

In appreciation for your time, we will provide you with a courtesy copy of the final report. Credit for your company’s participation will also be attributed unless you wish to remain anonymous.

Are Passwords Dead? Take the Forrester Password Usage & Trends Survey!

Merritt Maxim

To paraphrase the great humorist Mark Twain, rumors of the death of passwords have been greatly exaggerated. While people lament the challenges and problems posed by passwords, they remain a core authentication and security technology.

My colleague Andras Cser and I have been fielding so many client inquiries around passwords that we are undertaking a quantitative, anonymous survey from end user organizations to gauge their current password policies and usage. This online survey asks about your organization’s current password policies and challenge as well as the future role of passwords in your organization. We also are using the survey to gain perspectives on the future of passwords and how other technologies might replace passwords completely.

The survey is completely confidential, but participants who provide contact details will receive a complimentary copy of the report when it’s published later this year.

You can access the survey here:

http://forr.com/PWTrends2015

We look forward to your responses!

Here Come The Insights Ecosystem (s)

Ted Schadler

In doing research on why big data is not enough and customer insights teams are disconnected from business operations, Brian Hopkins and I came across three hugely important things happening:

  1. Firms are adopting systems of insight -- insights teams with business, data, and developer skills using an insights-to-execution process and taking advantage of a new insights architecture. This is what our new big idea report is about.
  2. Service providers are building insights practices with reusable technology, reusable insights models (including some with cognitive capabilities), and reusable engagement models for an industry or business function. Deloitte Digital and now IBM specialize in this, but many other service providers are recrafting their analytics practices to jump in.
Read more

Forrester’s Security & Risk Analyst Spotlight – Martin Whitworth

Stephanie Balaouras
Once a month, my co-research director and partner in crime, Chris McClean, and I will use our blog to highlight one of the 26 people who collaborate to deliver our team’s research and services and always make Chris and I look really, really good. Each “Analyst Spotlight” includes an informational podcast and an offbeat interview with the analyst. This month’s Analyst Spotlight features our newest analyst, Martin Whitworth. Based in London and bringing experience as a CISO and Head of Security across several industries, Martin will cover the most pressing issues keeping CISOs reaching for another bourbon on the rocks, including security strategy, maturity, skills and staffing, business alignment, and everyone’s favorite pastime, reporting to the board. 
 
Martin Whitworth Image Prior to joining Forrester, Martin served as CISO and senior security leader for a number of blue chip organizations, including Coventry Building Society, Steria Group, UK Payments Council, British Energy/EDF Nuclear Generation, and GMAC. In these roles, he developed and executed a variety of security strategies and programs, and he has extensive experience successfully engaging business and board-level stakeholders. He also has considerable experience as a trusted advisor to security leader peers in the public and private sectors internationally, as well as advising standards and regulatory bodies.
 
Read more

Huawei Defends Its Pole Position In The Race Of Network Solutions Providers In Europe

Dan Bieler

Several Forrester analysts attended Huawei’s 12th global analyst summit in Shenzhen recently. This post will focus on the perspective of European CIOs; in our view, they should take note of Huawei due to the firm’s growing strength in the European enterprise segment. For Forrester’s global perspective on the event, please refer to our upcoming report. For European CIOs, the main takeaways of the analyst summit are that Huawei is:

  • Strengthening its financial performance. Huawei’s enterprise divisions — which the firm just announced in 2011 — impresses with its strong growth rates. Huawei grew its enterprise activities by 27% to $3.1 billion in 2014; two-thirds of that growth came from outside China, with Europe accounting for the largest share of that. Huawei’s goal is to grow its enterprise business to $10 billion by 2019. Outside of China — which still accounts for 38% of Huawei’s revenues — EMEA will continue to play a critical role for Huawei, as it accounts for 35% of revenues. In EMEA, Huawei reported revenue growth of 20%.
Read more

Do You Have An Effective Privacy Organization?

Heidi Shey

A guest post from researcher Enza Iannopollo.

Upcoming changes to privacy regulation in the EU as well as rising business awareness that effective data privacy means competitive differentiation in the market makes privacy a business priority today. And this is not only relevant for tech giants: protecting both customer and employee privacy is a business priority for companies of all sizes and across industries.

But where do you start? Many companies start by hiring a chief privacy officer. Some have built brand-new privacy teams that manage privacy for the whole firm, while others prefer a decentralized model where responsibilities are shared across teams. What are the pros and cons of each approach? Which organizational structure would better meet the needs of your firm?

And when your privacy organization is in place, how do you establish smooth collaboration with other teams like marketing and digital, for example? Too often we hear that privacy teams do not have the visibility that they need into the data-driven initiatives happening within the company. When this happens, privacy organizations are less effective and the business risks failing its customers, undermining their expectation for privacy.

Read more

Expand Your Big Data Capabilities With Unstructured Text Analytics

Boris Evelson
Beware of insights! Real danger lurks behind the promise of big data to bring more data to more people faster, better, and cheaper: Insights are only as good as how people interpret the information presented to them. When looking at a stock chart, you can't even answer the simplest question — "Is the latest stock price move good or bad for my portfolio?" — without understanding the context: where you are in your investment journey and whether you're looking to buy or sell. While structured data can provide some context — like checkboxes indicating your income range, investment experience, investment objectives, and risk tolerance levels — unstructured data sources contain several orders of magnitude more context. An email exchange with a financial advisor indicating your experience with a particular investment vehicle, news articles about the market segment heavily represented in your portfolio, and social media posts about companies in which you've invested or plan to invest can all generate much broader and deeper context to better inform your decision to buy or sell. 
 
But defining the context by finding structures, patterns, and meaning in unstructured data is not a simple process. As a result, firms face a gap between data and insights; while they are awash in an abundance of customer and marketing data, they struggle to convert this data into the insights needed to win, serve, and retain customers. In general, Forrester has found that: 
 
  • The problem is not a lack of data. Most companies have access to plenty of customer feedback surveys, contact center records, mobile tracking data, loyalty program activities, and social media feeds — but, alas, it's not easily available to business leaders to help them make decisions. 
Read more

Predicting A New Business Paradigm For Financial Services

Nigel Fenwick
How will digital disrupt the financial services industry over the next 10 years?
 
Over the past couple of days, I’ve been meeting with clients at Forrester’s Forum For Technology Leaders in Orlando. Clients mostly want to know how digital will impact their business. My approach in responding to this question is to think like the CEO of the company in question: First, understand the customer’s desires; then figure out how those desires can best be met profitably — I imagine how future technology changes might create new sources of customer value.
 
We’ve already seen massive change in the financial services sector: Technology is dramatically changing our customer experience and helping firms educate their customers. What more is yet to come? And what will companies need to do to win customers in the future?
 
While this is a complex question, it’s not hard to imagine a very different reality to the one that exists today:
 
Read more

What A Teenaged Driver Can Teach You About Access Governance

Merritt Maxim

Most parents cheerfully mark the key milestones in their child’s path to adulthood: first step,first word, first school, first sleepover, first broken bone, and so on. But for many parents, no milestone causes as much anxiety as “first-time driver,” which is bestowed on all USA-based teenagers upon their16th birthday.

While surviving the experience of having our child become a driver may seem far removed from the world of access governance and entitlement certification, I found some parallels between managing a teenaged driver and managing the access rights and IT privileges of the end users in your organization. You can read more about it in my latest report, “Wake-Up Call: Poorly Managed Access Rights Are A Breach Waiting To Happen,” but here is a quick preview.

A common problem facing parents of teenaged drivers and IT organizations is that they have properly authorized users but often lack visibility into actual usage of those access rights. In the case of the teenaged drivers, parents often seek data around vehicle usage (Where did it go? At what time and at what speed?). For IT security professionals, organizations can no longer rely purely on static lists of authorized users and their access rights. So, just the way parents can impose mileage restrictions (reading the odometer to limit the distance a car can go in a given night) or fuel restrictions, an IT security team cansupplement access governance processes with additional usage data such as:

1.       Has the employee accessed the application/system during the last certification period?

2.       How often did the employee use the given entitlement?

Read more

Digital Insights Are the New Currency of Business

Ted Schadler

All the big data technology in the world won't close the gaps between data and action. One global bank told us, "even with all the capabilities and tools in place, we are drowning in data and starving for insight."

To harness the power of all your data to attract and serve customers -- to be a digital business -- you also need a new way of consistently harnessing insights that matter: insights teams using an insights-to-execution process anchored by a new digital insights architecture. We call this combination of people, process, and technology "systems of insight" (see Figure 1).

Brian Hopkins and I just released a Forrester report called "Digital Insights Are the New Currency of Business" for CIOs. I've never worked harder or longer on a 16-page document: one year, 75 drafts, and help from 25 colleagues spanning business, marketing, data, and technology.

What we found is that successful firms go beyond big data and business intelligence practices to build the business discipline and technology to harness insights and consistently turn data into action. This approach works by linking business actions back to data and discovering and testing insights to take action (see Figure 2).
 
Systems of insight embody five essential advances over previous approaches:
 
Read more