MANAGING THE MOBILE COMPANY EFFICIENTLY - Enterprise mobility management as a core competency - T-Systems
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency THE SPEARHEAD OF DIGITIZATION – ENTERPRISE MOBILITY social business Digitization gives the world a new look, to which a large number of technologies and multiple trends contribute. They are mobility big data grouped under the term “The 3rd Platform”1, the “Nexus of Forces”2 or simply SMAC stack3 (social, mobile, analytics, cloud cloud). Although the discussion is well underway as to which specific trends are important to take into account, mobility is always considered to be an undisputed part of digitization. The mobile use of IT services is not a discussion about a potential SMAC-Stack development in the future, but is already reality. This is just as true in public and private life as it is in the corporate environment. The difference here is that companies require professional solutions for dealing with the new mobile simplicity. Enterprise mobility management (EMM) provides these solutions. However, only those who have an exact knowledge not only of their business but also of the mobile market can find the appropriate solution. MOBILITY IS THE NEW STANDARD cell Anyone using public transport nowadays will see the majority of passengers busy with smartphones. The users send and phones n receive e-mails, chat, play games, obtain information, organize themselves, and so on – the mobile boom simply cannot be stopped. According to GSMA Intelligence, in October 2014 the number of mobile terminal devices (7.22 billion) rose above people the number of people on Earth (7.2 billion)4 for the first time. By October 2016, the number of mobile terminal devices had increased further to 7.8 billion. With 4.76 billion contractees, the industry records global sales of 1.06 trillion US dollars5 t 2014 “No other technology has had such an impact on us as cell phones. Never before have people developed a more rapidly expanding phenomenon – from zero to 7.2 billion in three decades.” [Kevin Kimberlin, Chairman of Spencer Trask & Co]
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency INCREASING SIGNIFICANCE OF MOBILITY IN BUSINESS Terminal devices that have a mobile connection via WLAN or another procedure are set to generate 68% of the entire Internet traffic6 in 2017. In 2020, Cisco7 anticipates that the IP traffic generated by smartphones (30% of the total volume) will exceed the proportion generated by PCs (29%)8. The implications for use in the corporate environment are 75% obvious, as is demonstrated by surveys conducted by IDC: In 2020, 105.4 billion (72.3%) employees in the USA9 will work on a mobile basis, whereby the figure had already reached 96.2 billion in 2015. In Western Europe10, three quarters of employees will work on a mobile basis as early as 2018. However, mobility not only helps companies to optimize processes mobile worker in and improve collaboration. Mobility also makes it possible to establish completely new business models, as is demonstrated western europe by the examples of Uber or the Tesco Homeplus virtual store in South Korea11. MANAGING MOBILITY IN THE COMPANY That which has become a standard in the private environment thanks to its simplicity and flexibility is sometimes causing EFFICIENCY aND headaches for companies. On the one hand, those responsible hope that mobile solutions will enable them to increase PRODUCTIVITY efficiency and productivity. On the other hand, however, new gateways are emerging, which need to be protected with VS. SECURITY/ regard to information security. And this needs to be done as efficiently as possible. MANAGEMENT EFFORT TURNING AWAY FROM PURE DEVICE MANAGEMENT Several years ago, mobile management still meant mobile device management. The focus was clearly on the terminal devices. The only possible way of protecting content and applications was to protect the terminal device. A mobile device management tool had to be installed on the device, while some fairly rigid specifications/policies for using apps did the rest to intercept the lack of capabilities for managing mobile applications. As a rule, it was the providers of the operating systems who offered the solutions for mobile device management. The market for terminal devices and operating systems is characterized by diversity and strong momentum. For example, simply looking at the operating system families does not give a picture of the true complexity. After all, one Android is quite different from another. Many device manufacturers adapt the operating system in order to establish their own special “look and feel”. On top of this, there are differences in hardware as well as constant adjustments and innovations. Management solutions for mobility in the corporate environment therefore not only need to be diverse, for example managing different device manufacturers and different operating system variants, but also have to accommodate the high development speeds. What’s more, management solutions need to dispel the existing deficits of the operating systems when used in companies. Important aspects here include separating business and personal data as well as preventing business data from being obtained by unauthorized parties (data loss prevention). Traditional mobile device management is not suitable for this. One possible all-round approach is to be found in enterprise mobility management. MANAGING HIGH COMPLEXITY EMM breaks open closed mobile ecosystems. It acts as an additional management layer beyond operating systems and EMM AS devices. This makes companies independent and gives them the freedom to choose the mobile technology they use. HIGHER-LEVEL MANAGEMENT But that’s not all. EMM has to provide more than simple mobile device management. It needs to prove its worth as a LAYER – ABOVE comprehensive management tool. In addition to the terminal devices, it is necessary to manage applications, content AND BEYOND and identities. Enterprise mobility management also has extended tasks with regard to security. Simple perimeter protection OPERATING has long since ceased to be enough – modern security architectures also protect content, transmission paths and SYSTEMS AND FUNCTIONS software, for example through sand-boxed apps, operating systems as firmware and management aps that are integrated into the operating system. 2
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency COMPONENTS OF ENTERPRISE MOBILITY MANAGEMENT In technical terms, EMM systems generally consist of three components. 1. A central security and management module 2. A gateway that ensures secure data transfer 3. A client on the terminal devices THREE TECHNICAL COMPONENTS, FOUR TASKS In the central management tool (1), the IT department defines guidelines for mobile devices, mobile applications and emm content. The gateway (2) encrypts the data transfer between the device and the company’s backend resources. The client (3) enforces the central guidelines on the terminal device and distinguishes, for example, between private and company Content data – also in offline mode. This architecture eliminates the problem of safeguarding apps and content for devices with Apps different operating systems, regardless of whether the devices are company-owned or private ones. This lays the foundations for Identity the four tasks of EMM. Mobile device management (MDM) manages mobile devices with any operating systems. The devices can be configu- Device red and deleted automatically. MDM takes inventories of the devices, and allows remote access and monitoring through to the complete deletion of the data (wipe out). Mobile content management (MCM) allows company content to be accessed from mobile terminal devices. This can be done either by the user (content access) or from a central location (content push). The client app can be used to save content on the terminal device. This may come from e-mail attachments, legacy backend systems or clouds. Security guide- lines can be enforced here, for instance through authentication for certain content or for file sharing, or through copy/ paste restrictions. Content and tools from the provider’s ecosystem can also be safeguarded by setting up a secure con- tainer on the device in accordance with the company guidelines and preferences. Mobile application management (MAM) makes it possible to manage apps and enforce app policies. The latter is parti- cularly relevant if the operating system does not provide the corresponding options or if no MDM profile is to be installed on the device. MAM installs and uninstalls apps, safeguards the applications on the terminal devices (by configuring apps especially) and separates private from business applications. The MAM can also be used to make apps accessible to external employees, allowing them to work securely in a user-friendly manner with permanent staff. Mobile identity management (MIM) ensures that only authenticated devices and users obtain access to company resources. To do this, MIM accesses user and device certificates, and uses app code signing (to identify apps from secure sources), authentication procedures, single sign-on and context information (such as place and time). FROM THE IDEA TO IMPLEMENTATION – INTRODUCING AND USING EMM IN THREE STEPS DEVELOPING AN OVERALL PLAN FOR ALL FOUR AREAS OF ACTION PLANNING Companies wanting to benefit from the increased efficiency and productivity12 arising in the mobile era are well-advised to EFFICIENT proceed in a targeted manner and begin by drawing up a plan as to how they intend to manage the terminal devices, apps, MANAGEMENT content and identities efficiently. This is due to the fact that establishing new possibilities for employees and new processes OF MOBILE initially gives rise to more tasks – not only in the implementation phase, but above all during long-term operation. This makes DEVICES RIGHT it inevitable that the companies will fall back on a professional tool for EMM. FROM THE START IDENTIFYING ADDED BUSINESS VALUES FOR MOBILITY The selection of a tool is preceded by a few preliminary considerations. These considerations commence with the added business value achieved through the introduction of mobile services and, consequently, their strategic significance for the company. The added business value must at least correspond to the investments made and ongoing expenses; the tool should not be implemented merely on the basis of soft factors. The result of this initial phase is the formulation of a mobile strategy that also contains fundamental requirements for policies. The next step entails reaching a strategic decision as to which tools are most suitable, based on the company’s framework conditions, to support the mobile strategy developed. Although it may on the whole be advisable to set an enterprise-wide standard for maximum efficiency, multi-track solutions may actually be the better choice in individual cases. 3
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency SAFE NAVIGATION THROUGH THE MOBILITY JUNGLE In this phase at the latest, it is worthwhile calling in an external consultant who is very familiar with the current market for mobility solutions. The multitude of devices, operating system variants, management tools, applications, mobile contracts and provision models (for both hardware and software) may provide a wide range of options. However, they also increase complexity, making it hard to keep track of everything. At the end of the planning phase, it must be clear which EMM tool is to be used in which operating model and which parts of the mobility service lifecycle are to be dealt with in house and externally. Once the plan has been drawn up, a project must be implemented to roll out the EMM system. The EMM system is put into ope- ration (following a possible test phase). The rollout might also include launching a shop system that employees can use to order mobile terminal devices and/or, where appropriate, apps. Depending on the degree of digitization and the company’s culture, EMM tools can be provided on premise, as private or public EXTENSIVE cloud variants. Beyond the operation of the EMM tools or suite, it is also possible to draw on suitable service providers for MOBILE LIFE- related services. If several specialized providers are used, it is essential to have sound provider management and clearly CYCLE: WHICH defined processes. Providers who are able to provide several services – also as a managed service – greatly reduce the effort SERVICES ARE involved in managing them. PERFORMED IN HOUSE AND Specialized service providers are not only able to assume responsibility for operating the EMM, but can also take care of further WHICH EXTER- NALLY? managed services that are important in order to map a complete lifecycle but that do not necessarily have to be performed in house: order and incident management, support/helpline, application factory, hardware break and fix. They are often also involved in the following: consulting services for compiling the product catalog, ordering and procuring terminal devices, rates/ SIM cards and accessories, preparation and provisioning, picking and shipping, warranty processing, taking back old devices with secure data deletion and, where appropriate, reusing the devices (external sale). Use Case Extended Enterprise A mechanical engineering company with international operations has extended its business model and, instead of selling EMM ALLOWS machines, sells services for machines. The basic prerequisite for business success is that the machines are available at EFFICIENT AND all times and work without failure. To ensure this, their functionality and status is constantly monitored using a network SECURE MOBI- connection. The monitoring data is input into an SAP database at the mechanical engineering company, where it is centrally LE COLLABO- evaluated. In this way, functional bottlenecks are detected before a failure actually occurs. Thanks to this predictive mainte- RATION WITH nance concept, maximum machine availability is ensured. EXTERNAL PARTNERS The service engineers who maintain the machines on customer premises can use an app to access these analyses and data, thus allowing them to optimize the maintenance. With a view to ensuring global service, the supplier also maintains a network of 50 service partners outside the company in the various countries who have their own EMM systems for their terminal devices. They, too, require a secure means of accessing the maintenance data and analyses – in such a way that they are not able to access any other internal resources of the mechanical engineering company. For this case, the company has implemented an extended enterprise model as solution. In contrast to the conventional BYOD approach, it was important to ensure here that no MDM profiles could be distributed to the terminal devices of the various service partners with the wide range of operating systems used. After all, these may already have corresponding profiles for their own MDM. The approach chosen was “mobile application management only”. The external service employees download the app from the company’s own app store via a link. On the specific (external) device, the app is provided in isolation in the form of a container. This provides the mechanical engineering company with exclusive management access to the app and thus the possibility of ensuring or removing program and policy updates. The company is not able to access other functions and content on the external mobile device and there is no conflict with any MDM that may already exist. This solution provides both sides with the full functionality they need for their business operations while at the same time ensuring security for the internal resources of each. This is made possible by using a modern EMM system from T-Systems. 4
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency READY FOR THE MOBILE TAKEOVER? Years ago, mobile services were just something for pioneers. It didn’t take long, though, before mobile technologies pre- MOBILITY HAS vailed not only in society, but also as enterprise tools in the vast majority of companies. Today, hardly any companies can TAKEN HOLD, avoid using mobile terminal devices. “Mobile” has established itself as a new standard and become a “must have”. Once MANAGING IT a certain number of devices need to be managed, therefore, the focus must be on professional management of mobility. EFFICIENTLY This can be achieved with EMM systems, around which specialized partners provide supplementary services. INCREASES THE POTENTIAL EMM systems accommodate the requirements for modern forms of collaboration – for instance, beyond company bound- BENEFITS aries and with external partners. Such extended enterprises scenarios can be implemented with them quite easily. What’s more, the prospects for mobile services are far from being exhausted. The Internet of Things with its multitude of devices (such as wearables) will make the management of mobile terminal devices even more important. EMM systems are excellently positioned for this, too. Finally, EMM systems could even prove to be the key solution for the complete management of workplace systems in MOBILE FIRST: companies. The “mobile shift” cannot be ignored and is set to make mobile terminal devices the new standard in the corporate EMM ALSO MA- environment. The management of traditional desktops or thin clients could then also pass over to the domain of EMM NAGES STATIO- systems – with the aim of simplifying and standardizing workplace management. As early as 2018, Gartner13 predicts NARY PCS that 40 percent of all companies will be managing some of their PCs or Macs with an EMM system (as opposed to 5 percent in 2015). Even today, a number of companies are following “mobile first” strategies – and then Windows, as a platform- independent operating system, could in turn establish itself as the new standard. The management of mobile terminal devices generates only 40 percent of the costs of managing classic desktop systems. POTENTIAL Using Windows 10, it is also possible to manage desktops in the same way as mobile terminal devices, as EMM systems COST REDUC- are given access to the file system and registry. The consequences would be clear cost savings in terms of licensing, TION THROUGH operation and service for the PC systems. From a cost viewpoint, therefore, it would certainly make sense to replace client THE USE OF management tools with EMM systems. EMM Implementing powerful enterprise mobility management today lays the foundations for making use of these future options. [1] Explore 3rd Platform Transformation, IDC [9] IDC Forecasts U.S. Mobile Worker Population to Surpass 105 Million by 2020, Juni 2015 [2] “The Nexus of Forces: Social, Mobile, Cloud and Information”, Gartner [10] 75% of Europe’s workforce will be mobile by 2018, Richard Prime, information-age.com, 2016 [3] “SMAC Stack and Connectivity: Driving the Future of IT”, Karanjit Singh, Kellton Tech, 2016 [11] Tesco opens virtual store in South Korea, Jennifer Creevy, retail-week.com, 2011, [4] There are officially more mobile devices than people in the world, independent.co.uk, also refer to... Zachary Davies Boren, 2014 [12] IDC Forecasts Manufacturing, Banking, and Retail Will Drive CEE Mobility Spending, [5] https://www.gsmaintelligence.com/ IDC, 2016 [6] Internet Stats & Facts for 2016, hostingsfacts.com, 2016 [13] Market Snapshot Mobile Enterprise Services, T-Systems, 2016 [7] Visual Network Index Forecast and Methodology 2015-2020, Cisco, 2016 [8] Cisco Visual Networking Index Predicts Near-Tripling of IP Traffic by 2020, market- wired.com, 2016 ANY QUESTIONS? CONTACT PUBLISHED BY Internet: www.t-systems.com Dr. Michael Pauly, Solution Marketing: T-Systems International GmbH or simply send an e-mail to: E-mail: michael.pauly@t-systems.com Hahnstr. 43d 60528 Frankfurt am Main Johannes Meisel Jutta Rahenbrock, Solution Marketing: Germany mobile-enterprise@telekom.de E-mail: jutta.rahenbrock@t-systems.com www.t-systems.com Uli Kunesch, Market Intelligence: E-mail: Uli.Kunesch@t-systems.com 5
You can also read