Mobile Devices & BYOD – Bring Your Own Desktop?

Mobile Devices & BYOD – Bring Your Own Desktop?

Mobile Devices & BYOD – Bring Your Own Desktop?

The plethora of mobile devices with smartphones and tablets leading the wave of a new era of computing, CIOs and IT managers wake up to a nightmare i.e. mobile management. Mobile management spans both, the platform or the mobile devices and content which in the case of enterprises would be sensitive business data which an employee accesses and perhaps stores on the mobile device.

PC sales are in slump while mobile devices have made their inroads, landing right into the hands of consumers around the globe and then strategically seeping into the enterprise. This has left CIOs scrambling to grasp the reality of the modern enterprise where mobile will eventually become the centerpiece in IT – not dedicated workstations, PCs or laptops.

Cloud’s deep penetration into the enterprise is a reality, serving enterprise applications directly from the Cloud has become a reality, delivering on the promises of increased productivity and cost reductions in IT operations. One of the primary implications of this paradigm shift has been the separation of “dedicated PC/laptop” from enterprise application/s of the enterprise employee. This would mean that organizations would no longer be able to have tighter controls on what devices they allow at workplace, probably due to popular demand and the fact that employees will, in any case bring their own mobile devices to work.

Desktop on the Cloud

Beyond these “enterprise applications”, there’s a shift of the whole workstation to the Cloud. With advances in desktop virtualization, there are now a range of new services and startups focusing on providing desktop virtualization solutions to consumer as well as enterprise users. From the perspective of an IT manager, serving the desktop through the Cloud to any mobile device which has a “thin client” app installed is a better position to be in, compared to apps, for example, CRM being accessed from a personal mobile device. When you serve the desktop through the Cloud, you give access to the processing power and a familiar (PC) experience to the users, not to mention the support for not-so-old (I’m not saying ‘legacy’ just yet) enterprise applications. Perhaps, cloud desktop could help transition to true mobile – enterprise applications served through the Cloud with frameworks and policies in place for data security.

Mobile Management –Device and Data

Mobile management spans both data and device and combines, it presents a formidable challenge, one which the industry has yet to respond to and with the market for enterprise mobile applications expected to grow to a $55BB market by 2016, the demand for managing the devices and the data they feed on will only surge. In terms of ensuring safe and secure access and usage of data living on the mobile devices, there will never be one-solution-fits-all option.

Mobile Management, Increased Productivity and Cost Reduction

The notion that the entire or significant part of the enterprise workplace going mobile, IT infrastructure costs will naturally decline may be true but only when you look at one side of the equation. When you factor in the increase in mobile management costs for example, the story of cost reductions does not hold true. This is evident in a survey by ComputerWorld which concluded that in 2011, there were 2.9 IT workers per 1,000 mobile devices. Last year this grew to 3.6 and this year, an estimated 4 dedicated IT workers will be needed for every 1,000 mobile devices. This reflects the growing need to manage mobile, both devices and data.

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

By Robert Smith

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but the early days of a transformational shift in the way Enterprises (large and small) purchase technology services. Enterprises are capitalizing…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars years after their intended lifespan is because the correctness of their software was mathematically verified before deployment. Similar trusted 24/7/365…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards. It’s getting worse: McKinsey in conjunction with the World Economic Forum have estimated that failing cyber security approaches could have…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete – take call centers as an example – there is only so much that you can do with data from…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past several years that have fallen victim to data breaches and lived to survive: Premera Blue Cross had 11 million member’s…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for years to follow. The role of Chief Marketing Officer (CMO) has evolved significantly in the past several years. Previously, the…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping for the best. On the flipside, opening the hood and checking if policies or regulations are being respected means you…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a Cloud IaaS or SaaS provider with that of a Cloud-Enabled Hosting Provider. These types of providers are very different and…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon take me away. The concept was simple, a mother or father frustrated with their day (and their children) whisked away…