Mobile Devices & BYOD – Bring Your Own Desktop?

Mobile Devices & BYOD – Bring Your Own Desktop?

Mobile Devices & BYOD – Bring Your Own Desktop?

The plethora of mobile devices with smartphones and tablets leading the wave of a new era of computing, CIOs and IT managers wake up to a nightmare i.e. mobile management. Mobile management spans both, the platform or the mobile devices and content which in the case of enterprises would be sensitive business data which an employee accesses and perhaps stores on the mobile device.

PC sales are in slump while mobile devices have made their inroads, landing right into the hands of consumers around the globe and then strategically seeping into the enterprise. This has left CIOs scrambling to grasp the reality of the modern enterprise where mobile will eventually become the centerpiece in IT – not dedicated workstations, PCs or laptops.

Cloud’s deep penetration into the enterprise is a reality, serving enterprise applications directly from the Cloud has become a reality, delivering on the promises of increased productivity and cost reductions in IT operations. One of the primary implications of this paradigm shift has been the separation of “dedicated PC/laptop” from enterprise application/s of the enterprise employee. This would mean that organizations would no longer be able to have tighter controls on what devices they allow at workplace, probably due to popular demand and the fact that employees will, in any case bring their own mobile devices to work.

Desktop on the Cloud

Beyond these “enterprise applications”, there’s a shift of the whole workstation to the Cloud. With advances in desktop virtualization, there are now a range of new services and startups focusing on providing desktop virtualization solutions to consumer as well as enterprise users. From the perspective of an IT manager, serving the desktop through the Cloud to any mobile device which has a “thin client” app installed is a better position to be in, compared to apps, for example, CRM being accessed from a personal mobile device. When you serve the desktop through the Cloud, you give access to the processing power and a familiar (PC) experience to the users, not to mention the support for not-so-old (I’m not saying ‘legacy’ just yet) enterprise applications. Perhaps, cloud desktop could help transition to true mobile – enterprise applications served through the Cloud with frameworks and policies in place for data security.

Mobile Management –Device and Data

Mobile management spans both data and device and combines, it presents a formidable challenge, one which the industry has yet to respond to and with the market for enterprise mobile applications expected to grow to a $55BB market by 2016, the demand for managing the devices and the data they feed on will only surge. In terms of ensuring safe and secure access and usage of data living on the mobile devices, there will never be one-solution-fits-all option.

Mobile Management, Increased Productivity and Cost Reduction

The notion that the entire or significant part of the enterprise workplace going mobile, IT infrastructure costs will naturally decline may be true but only when you look at one side of the equation. When you factor in the increase in mobile management costs for example, the story of cost reductions does not hold true. This is evident in a survey by ComputerWorld which concluded that in 2011, there were 2.9 IT workers per 1,000 mobile devices. Last year this grew to 3.6 and this year, an estimated 4 dedicated IT workers will be needed for every 1,000 mobile devices. This reflects the growing need to manage mobile, both devices and data.

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

By Robert Smith

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

2 Responses to Mobile Devices & BYOD – Bring Your Own Desktop?

  1. This  BYOD setup is increasingly becoming more popular.  I just hope that security will not be sacrifice in this kind of setup.

  2. This is a perfect example of why IT needs to think about a “single pane of glass” to help thwart a direct infrastructure saving decrease to management increase. The more systems sharing an environment means less eyes needed to manage it all.

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…