My colleague Dan Bieler laid out the overall impressions on his take of the MWC. I fully agree with his view, noticing the number of cars being displayed as attractors to make up for the lost appeal of devices.
My questions were more focused on the impact of announcements and innovation in the enterprise sector. Here is what I took in that respect from Barcelona:
Enterprise providers are preoccupied with mobile integration beyond MDM. Complexity of enterprise content integration into different mobile architectures dominated the agenda of many providers. In this context, everyone in the services arena talks about being a leader for the “end to end” value proposition. The overstretched term “end to end” means different things to different people. Vendors talk about technology stacks, service providers also talk about global reach. In this context, the exclusive alliance model for local best-of-breed providers by GEMA offers an interesting realization of the “think global, act local” concept.
Mobile device management remains the starting point for a true mobile workplace experience. VMware's recent acquisition of AirWatch isn't the first time that a leading provider of virtual desktop technology has bought mobile device management capabilities. But the road to creating a true mobile workplace experience is long. The task of meeting workforce requirements by consolidating device management, desktop management, virtualization, and the delivery of the right applications and content to mobile endpoints remains complex. A number of managed service providers are positioning themselves as strategic partners to support you in this transition. Are you ready for such an engagement? How do you select the right partner?
One obvious starting point is to check the capabilities of the provider you have already picked to manage your devices. But which of these providers are up to the challenge? Our research reveals that the European playing field is evenly shared between telecommunication providers and IT service providers.
IT Providers, Telcos, And Disruptors Are Fighting For Your Business
For our new report, Managed Mobile Workplace Services In Europe, we spoke with a number of leading telcos and IT providers that are expanding into comprehensive mobile services beyond device management. Here's our take on their plans to support your mobile workplace transformation strategy:
Mobile device management is a fully commoditized market. In the strictest definition of MDM, the available functionality is limited to those application programmer interfaces that are made available by the operating system vendor (Google or Apple). There is very little that traditional MDM offerings can do to differentiate themselves from the other 100+ vendors in the market. This causes significant price pressure on the offerings. Value for MDM is rapidly approaching zero. As we have seen over the past year-and-a-half, core MDM component offerings have been continuously lowering their prices in an attempt to maintain market share. There is a transition by the major MDM players to expand well beyond the traditional "wipe," "lock," and "locate" concepts available to them into more advanced technologies such as content and collaboration systems, security components at the network and application layer, as well as partnerships and integrations with secondary market offerings. These features have value. MDM at its core does not.
I think it's about time someone came out and said it. Just like Dobby from the Harry Potter books, MDM should be free. I've been telling all of the vendors that I work with that if they don't put out their MDM offering in a freemium model very shortly, the other vendors will beat them to the punch. Traditional MDM offerings are a land grab for enterprise market share and should be used as an upsell or wedge into more advanced and differentiable offerings. I predict that in the next 6 to 9 months we will see most, if not all, of the leading MDM vendors giving away their core functionality.
On January 22, 2014, a new mobile security player was born. This is the date that VMware announced its intention to purchase the mobile device management (MDM) firm AirWatch. With a price tag of $1.5 billion, this acquisition confirms that the mobile security market is scorchingly hot. This news comes on the heels of the November acquisition of Fiberlink by IBM. I expect additional mobile security market consolidation to occur throughout the remainder of 2014. This acquisition is a shot across the bow of any other major vendor looking to play in the mobile security market. If you don't step up and spend now, you might just be left holding the bag.
There is a 14-dog race going on, with a goal to win the wallets of the enterprise for mobile security spend. When lined up in the starting blocks, the racers may all seem to have equal chances, but a few are better poised to cross the finish line first and bask in the glory of the winners' circle. Three of these technologies are the odds-on favorites to lead from start to finish, with the rest of the racers struggling to remain relevant.
Coming off the starting block with the "holeshot" are the mobile device management vendors. With huge engines of revenue, large customer counts, and first-mover advantage, this dog is the odds-on favorite to take the championship trophy. Mobile device management vendors are already expanding their technologies and products into security platforms to diversify their rapidly commoditized product offerings. The move is paying off for the biggest and toughest MDM participants in the race, giving them the early, and potentially insurmountable, lead.
Information workers in India are increasingly using their personal devices, applications, and web services to accomplish both personal and work-related activities. Results from Forrester’s Forrsights Workforce Employee Survey, Q4 2012 indicate that at least 85% of employees use phone/tablet applications and web-based services for both purposes which is putting corporate information security under serious threat.
My interactions with numerous infrastructure and operations (I&O) professionals from large enterprises in India over the past six months have revealed that there is a high degree of awareness of the need to develop a bring-your-own-technology (BYOT) policy. However, actual implementations aren’t yet common, as I&O professionals are unable to address management’s three key concerns. These are, in order of priority:
How can we ensure that information on employee-owned hardware and software is secure?
All of the fighting has resulted in multiple casualties. BlackBerry couldn't keep up the pace and was eventually chopped off at the knees. Microsoft has yet to gain enough developer volume to be a real threat and will eventually reinvent itself as a new company under new leadership. Third-party app stores are distributed and nimble but really amount to nothing more than splinter groups using guerrilla tactics against the major nation states. They just can't compete in the long term.
In the United States, Google Play and Apple iTunes have become the two superpowers in the mobile app war. With exceptional mobile application uptake, these two players have come to dominate the consumer mobile space. Phones don't sell phones. . .applications sell phones, and these two players have won.
Understanding the terms and technologies in the mobile security market can be a daunting and difficult task. The mobile ecosystem is changing at a very rapid pace, causing vendors to pivot their product direction to meet the needs of the enterprise. These changes in direction are creating a merging and twisting of technology descriptions being used by sales and marketing of the vendor offerings. What we considered “Mobile Device Management” yesterday has taken on shades of containerization and virtualization today.
Mobile antivirus used to be a standalone vision but has rapidly become a piece of the mobile endpoint security market. Where do we draw the lines, and how do we clearly define the market and products that the enterprise requires to secure their mobile environment?
In an attempt to help the enterprise S&R professional understand the overlapping descriptions of mobile security products, I am working on new research that will help organize and quantify the market. Understanding the detailed state of each of the technology offerings in the market, and their potential impact on a five- to 10-year horizon, will help enterprises make more-educated purchasing decisions.
To begin the process of covering all of the technologies being offered today, I’ve divided the solutions in the space by technology type. Not only am I analyzing technologies that are available now, but I’m also researching any additional products, services, and vendors in the mobile security space that have innovative new concepts that they are bringing to bear. These new-age offerings will help shape the future of mobile security, and we need to get ahead of the concepts now if we wish to have a better understanding of the impact of the innovation.
Across Asia Pacific (AP), expanding mobility support for employees, customers, and/or business partners will be the top strategic telecom priority for enterprises in 2013, surpassing other telecom priorities like performing network management and consolidating operations equipment, rationalizing/consolidating telecom/communications service providers, and moving communications applications to the cloud.
While enterprises will invest in a range of mobility products and services, there are five key areas in particular which will attract the most investment in 2013. Vendors need to focus on the solutions and engagement models that meet customers’ needs in these five areas and target the industries and countries where the demand will be greatest:
Business consulting services. Specifically for defining a formal enterprise mobility and/or BYOD program strategy, including devices, applications, data access, and provisioning. Moreover, AP organizations will likely need help in drafting compliance and legal policies related to enterprise mobility.
Telecom expense management solutions. This is one of the most critical telecom requirements for AP CIOs in 2013. Across the region, 50% to 60% of organizations pay the entire cost of voice and data services for company-supported Android and iOS phones and tablets. For BlackBerry phones, this proportion is nearly 70%.
Those of you paying attention in Sunday School may remember this thing called the apocalypse. Earl Robert Maze II was my Sunday School teacher, and he may be the most fearsome schoolmaster ever to scratch a chalkboard. One spitwad and there was sure to be a rapture. Mr. Maze would get pretty wrapped up in the lesson of the day and we'd all have to keep at least one eye on him as he paced back and forth. Not because we were worried about being asked a question, but because as he paced and talked, he'd build up globs of white something or other in the corners of his mouth, and every so often one of them would take flight and land on some unsuspecting front row pupil's hand, to their horror.
As luck would have it, I was late to class on the day Mr. Maze deemed that we were, at last, ready for the book of Revelation; I took the last seat -- In the front row -- Right in the line of fire. Sure enough, he was so worked up by the time he got to the part about the divine apocalypse, that one of those white gobs of goop chose that moment to set itself free and was headed for me like a heat-seeking missile. There was nothing I could do! And so to this day, the term apocalypse conjures up a frightening memory for me.
Which brings me to the current situation in the client management vendor landscape. The apocalypse was to be foretold by four horsemen representing conquest, war, famine and death (if you've ever worked for a company whose business has been disrupted, as I have, you've probably met with all four!). The four horsemen before us now in the client management market in the second quarter of 2012, are:
The explosion of tablets and smart phones.
The elusive management of client virtualization.
SaaS-based client management vendors (see Windows inTune).
New application delivery models (app stores, virtualized apps, etc).