Mobile Devices & BYOD – Bring Your Own Desktop?

Advertise on CloudTweaks

Mobile Devices & BYOD – Bring Your Own Desktop?

The plethora of mobile devices with smartphones and tablets leading the wave of a new era of computing, CIOs and IT managers wake up to a nightmare i.e. mobile management. Mobile management spans both, the platform or the mobile devices and content which in the case of enterprises would be sensitive business data which an employee accesses and perhaps stores on the mobile device.

PC sales are in slump while mobile devices have made their inroads, landing right into the hands of consumers around the globe and then strategically seeping into the enterprise. This has left CIOs scrambling to grasp the reality of the modern enterprise where mobile will eventually become the centerpiece in IT – not dedicated workstations, PCs or laptops.

Cloud’s deep penetration into the enterprise is a reality, serving enterprise applications directly from the Cloud has become a reality, delivering on the promises of increased productivity and cost reductions in IT operations. One of the primary implications of this paradigm shift has been the separation of “dedicated PC/laptop” from enterprise application/s of the enterprise employee. This would mean that organizations would no longer be able to have tighter controls on what devices they allow at workplace, probably due to popular demand and the fact that employees will, in any case bring their own mobile devices to work.

Desktop on the Cloud

Beyond these “enterprise applications”, there’s a shift of the whole workstation to the Cloud. With advances in desktop virtualization, there are now a range of new services and startups focusing on providing desktop virtualization solutions to consumer as well as enterprise users. From the perspective of an IT manager, serving the desktop through the Cloud to any mobile device which has a “thin client” app installed is a better position to be in, compared to apps, for example, CRM being accessed from a personal mobile device. When you serve the desktop through the Cloud, you give access to the processing power and a familiar (PC) experience to the users, not to mention the support for not-so-old (I’m not saying ‘legacy’ just yet) enterprise applications. Perhaps, cloud desktop could help transition to true mobile – enterprise applications served through the Cloud with frameworks and policies in place for data security.

Mobile Management –Device and Data

Mobile management spans both data and device and combines, it presents a formidable challenge, one which the industry has yet to respond to and with the market for enterprise mobile applications expected to grow to a $55BB market by 2016, the demand for managing the devices and the data they feed on will only surge. In terms of ensuring safe and secure access and usage of data living on the mobile devices, there will never be one-solution-fits-all option.

Mobile Management, Increased Productivity and Cost Reduction

The notion that the entire or significant part of the enterprise workplace going mobile, IT infrastructure costs will naturally decline may be true but only when you look at one side of the equation. When you factor in the increase in mobile management costs for example, the story of cost reductions does not hold true. This is evident in a survey by ComputerWorld which concluded that in 2011, there were 2.9 IT workers per 1,000 mobile devices. Last year this grew to 3.6 and this year, an estimated 4 dedicated IT workers will be needed for every 1,000 mobile devices. This reflects the growing need to manage mobile, both devices and data.

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

By Robert Smith

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as technology related infographics and comics.

Contact us for more information on how to get involved in our content related services and placement programs.

CONTRIBUTORS

Four Tips For Better Information Security In The Cloud

Four Tips For Better Information Security In The Cloud

Information Security Businesses are increasingly relying on cloud based application deployments and are open to entrusting their most critical data ...
2017 Expected To Bring Cloud Service Price Hikes

2017 Expected To Bring Cloud Service Price Hikes

Cloud Service Price Hikes As the year comes to a close and there’s a new one on the way, people ...
A Resilient Cloud Strategy: Standardize or Diversify?

A Resilient Cloud Strategy: Standardize or Diversify?

A Resilient Cloud Strategy Over the past few years, I have seen IT organizations adopt cloud in very different ways ...
Trading Routine: How To Track Suspicious Events In Different Locations

Trading Routine: How To Track Suspicious Events In Different Locations

Tracking Suspicious Events Financial security can be compared to a constant arms race between cyber criminals and businessmen who try to ...
Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

The IoT Machine Learning Shift While early artificial intelligence (AI) programs were a one-trick pony, typically only able to excel ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as ...
Emerging Technologies To Lookout For In 2017

Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the ...

NEWS

Cloudera Speeds Analytics Deployment for Cybersecurity Hub

Cloudera Speeds Analytics Deployment for Cybersecurity Hub

New Service Simplifies Path to Deploying Next Generation Cybersecurity Hub, Making Machine Learning Easier and Accessible PALO ALTO, Calif., Oct ...
Cisco to buy BroadSoft in $1.9 billion deal

Cisco to buy BroadSoft in $1.9 billion deal

(Reuters) - Cisco Systems Inc (CSCO.O), the world’s largest networking gear manufacturer, said it will buy U.S. telecommunications software company ...
Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ -- The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining ...

NEWSLETTER SUBSCRIBE

CloudTweaks has been a prominent influence covering cloud technologies since 2009. We have worked and continue to work with a tremendous number of writers, contributors and partners throughout the world – all of whom provide insights into the cloud business community. This information is provided to our Newsletter subscribers on a weekly basis - free of charge.

Subscribe to receive our weekly collection of Best of Thought leadership, Technology news, Tweaks, Curated resource links, Exclusive promotions and our popular Comic series.

Something went wrong. Please check your entries and try again.