Securing The Asia Pacific Airwaves

Clement Teo

by Clement Teo and John Brand

VMware recently announced that it has signed a definitive agreement to acquire AirWatch, a leading provider of enterprise mobile management and security solutions. The acquisition is expected to provide customers with the most complete solution to manage users, devices, and applications across server, desktop, and mobile environments.

My colleagues Tyler Shields and Christian Kane have already shared their views and published two reports on the acquisition. Tyler has also raised some questions about AirWatch’s burn rate.

But what does it mean in Asia Pacific?

VMware obviously has had to expand its penetration beyond the server-centric virtualization market. So far, it has had mixed success with selling virtualization as a platform in the region, even though it has successfully entrenched itself as a leading hypervisor provider (unfortunately, VDI has proved a difficult sell for VMware in AP). In order to gain much deeper penetration and traction, VMware needed to add an end user computing offering to its portfolio. The pairing should result in:

Read more

How mobility can change the economics of IT

I recently took some holiday leave and saw two small, but clear examples of where mobility changes the economics of IT. The first was in a restaurant where the wait staff used their own smartphones and a simple order taking app. There was no expensive mobile platform for the restaurant to purchase in order to use this system. There was no expensive training program in place to teach the employees how to use the software. They simply bring along their own phone, download a free app to their device and start working.

The software is intuitive enough that any training required is done by their fellow staff members during shifts. What’s interesting about this example is that using mobile devices for taking restaurant orders isn’t new – but using employees own devices is. Previously, the expense incurred by restaurants having to purchase proprietary devices meant that only high margin operations could afford to use mobile order taking systems. And loss, theft or damage of the devices was not only expensive but also proved to be a sticking point for employer/employee relations.   

The second example provides a sharp contrast. It involved a trip to a museum and the use of the audio commentary service. Though almost every visitor to the museum now has a smart phone device, an old proprietary hand held device was still in use there. This is an expensive option to operate for a low-margin business like a museum. There are now museums that have recognised this and offer apps on smart phones with capabilities well beyond what the previous dedicated hardware could provide. One such museum is the American Museum of Natural History. It not only uses the rich visual interface of the smart phone, along with the required basic audio commentary services, but it also reportedly helps the user navigate the complex campus using sophisticated wi-fi triangulation.

Read more

Enterprises In AP Must Build On Three Pillars To Manage BYOT Information Security

Katyayan Gupta

Information workers in organizations across Asia Pacific (AP) are increasingly using personal mobile devices, applications, and public cloud services for work. Forrester defines this as the bring-your-own-technology (BYOT) trend. This behavior is more prevalent among employees above the director-level (C-level executives, presidents, and vice presidents) than those below that level (individual worker, contractor or consultant and manager/supervisor). Data from Forrester’s Forrsight Workforce survey, Q4 2012 corroborates this trend in AP.

We believe that the BYOT trend will strengthen over the next two years in AP, primarily fueled by employees below the director level. Increasing options, quality and affordability of devices, apps, and wireless connectivity, coverage, and capacity will contribute to this expansion. In order to secure corporate data, organizations will need to:

  • Develop Corporate Mobile Policies: Organizations must build cross-functional teams to plan their mobile strategies. This should include representatives from different LOBs like finance, HR, legal and sourcing. Moreover, the policy must clearly define guardrails to provide flexibility to employees but within boundaries and in compliance with local regulations.
  • Identify Technologies To Secure Corporate Data: 29% of business-decision makers in AP report that the rising expectations of younger workers require businesses to push enterprise IT to keep technology current. This is why it is critical to identify both back-end and front-end technologies and suppliers that can optimize mobile device and application management in a secure manner. Focus should be on networking layer security and mobile device management solutions.
Read more

Do Banks Really Need To "Own" Mobile Banking?

Australian Banks have often been at the forefront of global banking trends, or at the very least, fast followers that learn quickly from the mistakes of others. In Australia, mobile banking has quickly become a "war" amongst the majors with a range of different banking services and approaches - from basic access to transactional histories, transfers, payments, integrated retail services, and even near-field-communications-based micro-payments systems.

But how much of the mobile banking channel do banks really need to own? Most banks no longer own or operate their own ATM networks. They control the flow of transactions through that channel, but they generally have little to no interest in owning the assets or operating ATM cash management processes. Mobile banking is a complex and costly business to be in. With the advent of Internet banking, it quickly became clear that the cost of delivering online banking services through the internet was rarely, if ever, a more cost-effective channel than the bank-owned and operated PC-based products (remember the dedicated dial-up modems!). But in theory it should have been. All of the cost modeling showed that it should be cheaper. Yet banks have continued to invest more and more in building out, maintaining, operating - and particularly securing - their Internet banking channels.

Read more