Enterprise Mobility Exchange Event Highlights the Complexity of Mobility

When we conduct research at ESG, we are always inquiring about the sources of information that are most useful in helping to learn about, research, and evaluate technology products and services. “Interaction with peers” constantly tops the list, and was well reflected in the caliber of attendees at the Enterprise Mobility Exchange event I recently attended in Las Vegas. The majority of the event is dedicated to peer interaction, but attendees also receive 1-on-1 time with participating vendors. It’s an ideal way to “speed date” over several days to learn about new market innovation, potential resolutions to top challenges, and even get a glimpse into some roadmap discussions. The event is a win-win scenario for me as well, as I slice time between IT conversations and listen to fascinating discussions regarding business challenges and mobility success stories.

The primary takeaway was that mobility remains complex, and incorporates multiple pieces of technology, internal organizational alignment, and flexible business processes. Here are a few of the highlights.

Topics: BYOD Bring Your Own Device Enterprise Mobility

RSA Recap, Part One

I'll have more RSA recap to offer later on this week, but I wanted to kick off the RSA postmortem with a look at the last day or so of the sessions from the conference. There's a bit of a BYOD slant to these nuggets.

There are many ways in which mingling personal and corporate devices and access puts both sides at risk.   Some are due to the way online behavior (personal surfing) from one domain bleeds into exposing your data from another domain (work). The reverse can be true, too. Corporate assets are targets, and that puts your personal assets at risk if you put valuable personal data on a device that sees action outside the home while on business travel.

Topics: Network Security Networking BYOD endpoint security endpoint devices

ESG Mobility Passion Transforms Business Behavior

I’m a gadget geek at heart and I continue to be fascinated by how mobile devices and applications are driving enormous behavioral changes inside of businesses. I also have to sympathize for the IT professionals that have to balance an enhanced user experience with heightened security while they manage to maintain legacy applications alongside modernized applications. Not to mention the fact that managing desktops and laptops is a challenge; now there are more devices and many are not corporate owned. Yikes!

Topics: BYOD Enterprise Mobility

Embrace BYOD for Improved Employee Productivity

It’s important to remember that it’s not the device that is mobile, it’s the employee. Employees today are using mobile devices to perform their job responsibilities and while most of what ESG witnesses today is based on employees consuming information, we are seeing more evidence that demonstrates how employees are using smartphones and tablets for productivity purposes. This is a significant shift. It’s valuable for a mobile employee to view e-mail, patient records, important documents, and even videos, but there can be a significant leap in value for the business when the employee uses the device to input information and for productivity purposes.

Topics: BYOD Enterprise Mobility

Why Doesn't IT Back Up BYOD?!

ESG recently started offering TechTruths... single nuggets of data and the analyst perspectives of why they matter. Check out all of them via the link above, but here is my favorite so far on BYOD data protection:

Topics: Backup Data Protection JBuff Information and Risk Management endpoint BYOD

Managing IT Risk Associated with Mobile Computing Security

When BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk. Why? Many CISOs I spoke with at the time said it was purely a matter of scale. All of a sudden, large enterprises had thousands of additional devices on their networks and they struggled to figure out what these devices were doing and how these activities impacted organizational risk.

Topics: IBM End-User Computing Check Point Fortinet Cisco Information and Risk Management mobile Security and Privacy Security BYOD Citrix data security Fiberlink android Dropbox Good Technology Airwatch Blue Coat CISO Bit9 Anti-malware Facebook

Getting Over the Post-holiday BYOD Proliferation Blues

It’s no secret, BYOD and mobile devices are changing the way we work, play, and communicate with each other. As a result, the demand for wireless networks is very strong and ESG's IT spending intentions research survey data indicates that expanding wireless networks is one of the top-five most-cited network priorities for organizations. The timing is perfect to talk about expanding the WLAN as the volume of new mobile wireless devices entering the workplace always tend to spike after the holidays. Many of those in IT that I speak to have stated it is not uncommon to have over a thousand new devices hit the wireless network in January. IT then has to struggle to ensure there is adequate connectivity for all these new devices (especially in the executive wing), mitigate the risk, and spend a lot of time associated with managing the onboarding process. For those in higher education, this scenario plays out at the start of every school year as well.

Topics: IT Infrastructure Networking mobile BYOD Aerohive Bring Your Own Device

BaaS and OFS -- companies need both

At first glance, the services can be easily confused:

Topics: Storage End-User Computing IT Infrastructure Data Protection Information and Risk Management BYOD Jason Buffington OFS Terri McClure BaaS Public Cloud Service

You now have one less way to recover your data – and you probably didn't realize it

BE AWARE that today’s laptop and mobile devices have one less recovery option than they used to.

This particular customer service announcement is targeted mostly at business executives and the IT professionals who support them.

Topics: Storage Backup End-User Computing Data Protection Information and Risk Management mobile BYOD Jason Buffington BaaS

Next-generation wLANs will drive productivity gains

As our vendor clients already know, I’ve been busy surveying over 20 enterprise wireless LAN providers to learn more about their wLAN offerings and support plans for 802.11ac, BYOD, UC, etc. for ESG’s upcoming wLAN Market Landscape Report. I’m happy to report that from the supply-side, there are plenty of innovative enterprise wireless systems to choose from and a very competitive marketplace. And we will be fielding our enterprise wireless networking survey shortly, so we’ll be able to better match enterprise wireless needs to vendor offerings.

However, I do have concerns about the demand-side, where many enterprise CFOs are still concerned about continued economic uncertainty, and are holding the line on IT budgets. Recently, change in information and communications technologies (ICT) seems to be accelerating toward light-speed, but many CFOs just want to spend to keep the lights on in the IT department. Organizations that don’t invest in new IT technologies will find themselves at a competitive disadvantage - period.

Topics: Cisco IT Infrastructure Networking Juniper HP BYOD Aruba Huawei Aerohive Adtran Alcatel-Lucent NEC Brocade Enterasys Extreme Ruckus