AirWatch held its EMEA AirWatch Connect customer event in London recently. The event underlined that AirWatch, at the tender age of 10, has become one of the leading global providers of enterprise mobility services. My key takeaways from the event are that:
Secure collaboration forms the center of the connected business. Business productivity and innovation benefit significantly from a workforce that is empowered by mobility. AirWatch has one of the most comprehensive enterprise mobility portfolios in the market to support this drive. AirWatch can play a central role for any organization that is transforming into a connected business.
An integrated platform approach to enterprise mobility has a clear advantage. AirWatch pursues a Lego-block approach, bringing together solutions for email, browser, containerization, content locker, and, of course, device and app management. By building its solution as one platform, customers gain the flexibility of a Lego-style deployment — they can pick only those blocks that they require while ensuring the integration and flexibility of the overall solution.
Building a business case for enterprise mobility must include soft factors. Managers who build ROIs for enterprise mobility solutions usually focus on hard KPIs that support existing ways of doing business. However, this “hard ROI” approach really only compares the present with the past. In reality, it is often the soft KPIs, like new ways of doing business, that matter more. Ultimately, mobility is crucial for greater operational flexibility and business transformation. Both are at the heart of long-term business success.
Information workers in India are increasingly using their personal devices, applications, and web services to accomplish both personal and work-related activities. Results from Forrester’s Forrsights Workforce Employee Survey, Q4 2012 indicate that at least 85% of employees use phone/tablet applications and web-based services for both purposes which is putting corporate information security under serious threat.
My interactions with numerous infrastructure and operations (I&O) professionals from large enterprises in India over the past six months have revealed that there is a high degree of awareness of the need to develop a bring-your-own-technology (BYOT) policy. However, actual implementations aren’t yet common, as I&O professionals are unable to address management’s three key concerns. These are, in order of priority:
How can we ensure that information on employee-owned hardware and software is secure?
Many CIOs, technical architects as infrastructure and operations (I&O) professionals in Chinese companies are struggling with the pressures of all kinds of business and IT initiatives as well as daily maintenance of system applications. At the same time they are trying to figure out what should be right approach for the company to adapt technology waves like cloud, enterprise mobility, etc., to survive in highly competitive market landscape. Among all the puzzles for the solution of strategic growth, Operating System (OS) migration might seem to have the lowest priority: business application enhancements deliver explicit business value, but it’s hard to justify changing operating systems when they work today. OS is the most fundamental infrastructure software that all other systems depend on, so the complexity and uncertainty of migrations is daunting. As a result, IT organizations in China usually tend to live with the existing OS as much as possible.
Take Microsoft Windows for example. Windows XP and Windows Server 2003 have been widely used on client side and server side. Very few companies have put Windows migration on its IT evolution roadmap. However, I believe the time is now for IT professionals in Chinese companies to seriously consider putting Windows upgrade into IT road map for the next 6 months for a couple of key reasons.
Windows XP and pirated OS won’t be viable much longer to support your business.
Ending support. Extended support, which includes security patches, ends April 8, 2014. Beyond that point, we could expect that more malwares or security attacks toward Windows XP would occur.
We recently met with Huawei executives during the launch of its latest product in China, the S12700 switch. The product, which ships in limited quantity in Q1 2014 is designed for managing campus networks, and acts as a core and aggregation switch in the heart of campus networks. While wired/wireless convergence, policy control and management come as standard features, the draw is the Ethernet Network Processor (ENP). The ENP competes against merchant silicon in competitive switch products, and Huawei claims to be able to deliver new programmable services in six months, compared to one to three years for competitive application-specific integrated circuit (ASIC) chips. This helps IT managers respond quicker to the needs of campus network users, especially in the age of BYOD, Big Data, and cloud computing.
While it is a commendable product in its own right, Huawei will need to position its value more strategically against IT managers that have technology inertia, especially in ‘Cisco-heavy’ networks:
Tying the value of the switch to existing and future enterprise campus needs. In the age of cloud computing, big data, mobility, and social networking, IT managers need to solve network challenges like insufficient service processing capability and slow service responses. Huawei says the new switch is able to provide agile services and respond flexibly to changes in service requirements, on demand. For example, the switch has access control built in for wired/wireless access management. This is a good start. Enterprises will need to understand how the switch plays a central role in a campus network, and Huawei should continue to reinforce its agile network architecture’s storyline.
Voice-controlled intelligent assistants offer a tantalizingly productive vision of end user computing. Using voice commands, users can extend the computing experience to not just mobile scenarios, but to hyper-mobile, on-the-go situations (such as while driving). With wearables like Google Glass, voice command promises even deeper integration into hyper-mobile experiences, as this video demonstrates. And voice controlled intelligent assistants can also enable next-generation collaboration tools like MindMeld.
In spite of this promise, there remains a lurking sense that voice control is more of a gimmick than a productivity enhancer. (As of the time I posted this blog, a Google search for Siri+gimmick yielded… “about 2,430,000 results”). To see where voice control really stands, we surveyed information workers in North American and Europe about their use of voice commands.
Information workers’ use of voice control today:
In reality, many information workers with smartphones are already using voice commands – at least occasionally. Our survey revealed that:
Results from Forrester's Q2 2012 Forrsights Workforce Employee Survey show that more than two-thirds of North American and European information workers who use a computer for work an hour or more per day personally choose the smartphones or tablets they use for work, and 46% of information workers personally choose work laptops that are not on the company-approved device list. To address the increasingly complex mobile device landscape, many companies are deploying bring-your-own-device (BYOD) programs to support devices including smartphones, tablets, laptops or desktops. Successfully planning and implementing a BYOD program requires infrastructure and operations (I&O) executives to address the following four key issues.
1. Build Relationships Outside IT
Implementing a successful BYOD program requires cross-functional collaboration across many IT and business groups in the organization. The I&O team should take the lead in BYOD program development. However, I&O executives must collaborate with security and governance, sourcing and vendor management, application development, and enterprise architecture professionals to determine the correct strategy and tool set. It is also critical to include line-of-business executives, as well as legal and finance professionals, to develop corporate BYOD program policies and procedures.
2. Create A Shared, Multi-Year Vision
Proactively working with decision-makers to identify the potential ROI and impacts on corporate business processes enables the I&O team to create a consistent, shared vision of the overall goals and desired outcomes of implementing a BYOD program. This shared vision of the cross-organizational effects of the BYOD program ensures that line-of-business decision-makers and stakeholders understand what investments they must make to support the program.
Information workers in organizations across Asia Pacific (AP) are increasingly using personal mobile devices, applications, and public cloud services for work. Forrester defines this as the bring-your-own-technology (BYOT) trend. This behavior is more prevalent among employees above the director-level (C-level executives, presidents, and vice presidents) than those below that level (individual worker, contractor or consultant and manager/supervisor). Data from Forrester’s Forrsight Workforce survey, Q4 2012 corroborates this trend in AP.
We believe that the BYOT trend will strengthen over the next two years in AP, primarily fueled by employees below the director level. Increasing options, quality and affordability of devices, apps, and wireless connectivity, coverage, and capacity will contribute to this expansion. In order to secure corporate data, organizations will need to:
Develop Corporate Mobile Policies: Organizations must build cross-functional teams to plan their mobile strategies. This should include representatives from different LOBs like finance, HR, legal and sourcing. Moreover, the policy must clearly define guardrails to provide flexibility to employees but within boundaries and in compliance with local regulations.
Identify Technologies To Secure Corporate Data: 29% of business-decision makers in AP report that the rising expectations of younger workers require businesses to push enterprise IT to keep technology current. This is why it is critical to identify both back-end and front-end technologies and suppliers that can optimize mobile device and application management in a secure manner. Focus should be on networking layer security and mobile device management solutions.
Forrester’s recent research shows that, while Asia Pacific lags developed regions like North America and Europe in terms of smartphone penetration, the growth of smartphones will be highest in APAC between 2012 and 2017. As indicated in our recently published report, Forrester Research World Smartphone Adoption Forecast, 2012 To 2017 (Global), by end of 2013, Forrester estimates that smartphone penetration in North America will be 57%, followed by Europe with 42% and APAC with 21%. But in terms of the compound annual growth rate during the same period, smartphone penetration in APAC will grow by 20%, followed by Europe with 11% and North America with 10%.
The sharp increase in the number of smartphone users will greatly affect both the consumer and enterprise landscapes. Building on Forrester’s deep research on the Asia Pacific mobility opportunity, we will be holding a series of complimentary quarterly webinars to help our clients make sense of this rapidly changing landscape and position for success. Starting in March and covering the consumer and enterprise mobility markets, the webinars will bring together Forrester analysts from around the world to present a global and Asia Pacific perspective.
On March 5, 2013, I will present a mobile trends and summary webinar with my colleagues Thomas Husson and George Lawrie. This session will cover our key findings from this year’s Mobile World Congress in Barcelona, share our view of key 2013 mobile trends, and share best practices for building a successful business case for mobile initiatives. You can register for the webinar here.
Is it me or my expectations? My mobile travel applications have only improved over the past 12 months (and I mean this sincerely), but my disappointment has never been so acute. Why? My expectations have never been higher. I access information more frequently (see Ted Schadler's and John McCarthy's Engagement report -- they quantify this), and I expect more accuracy. In the absence of tethering my computer or tablet to to my mobile-phone-turned-hotspot (difficult on the move), I turn to my mobile phone for services. "Immediacy" is what makes mobile so valuable. If I can't get real-time, accurate information on the go, then how useful are the mobile services?
11. (an extra) When I use the mobile app to add the boarding pass to Passbook, why does only one of two boarding passes go there when I have a connecting flight?
10. I uploaded an update to the loyalty program from the hotel chain. It deleted all of my account information. Awesome. Really guys?
9. I searched the mobile app, mobile web, and full web for a way to recover my account number - not possible in my 10 minutes of searching. Only possible to get password.
8. I called customer service (hotel brand) while sitting on the plane to get my account number. They asked me to state my password out loud (while on the crowded plane). I gave them the password, and they told me it was incorrect. They proceeded to ask for all of my additional security information (e.g., mother's maiden name). "We have these rules in place to protect your privacy and ensure the security of your account." I'm thinking, "My hotel frequent stay account??? It's easier to get my user name and password from my bank!!" Terrible user experience.