Most Recent Blogs

Enterprise Mobility Exchange Event Highlights the Complexity of Mobility

Posted: November 17, 2016   /   By: Mark Bowker   /   Tags: BYOD, Bring Your Own Device, Enterprise Mobility

mobility-devices.jpgWhen we conduct research at ESG, we are always inquiring about the sources of information that are most useful in helping to learn about, research, and evaluate technology products and services. “Interaction with peers” constantly tops the list, and was well reflected in the caliber of attendees at the Enterprise Mobility Exchange event I recently attended in Las Vegas. The majority of the event is dedicated to peer interaction, but attendees also receive 1-on-1 time with participating vendors. It’s an ideal way to “speed date” over several days to learn about new market innovation, potential resolutions to top challenges, and even get a glimpse into some roadmap discussions. The event is a win-win scenario for me as well, as I slice time between IT conversations and listen to fascinating discussions regarding business challenges and mobility success stories.

The primary takeaway was that mobility remains complex, and incorporates multiple pieces of technology, internal organizational alignment, and flexible business processes. Here are a few of the highlights.

Read More

RSA Recap, Part One

Posted: March 07, 2016   /   By: Dan Conde   /   Tags: Network Security, Networking, BYOD, endpoint security, endpoint devices

byod securityI'll have more RSA recap to offer later on this week, but I wanted to kick off the RSA postmortem with a look at the last day or so of the sessions from the conference. There's a bit of a BYOD slant to these nuggets.

There are many ways in which mingling personal and corporate devices and access puts both sides at risk.   Some are due to the way online behavior (personal surfing) from one domain bleeds into exposing your data from another domain (work). The reverse can be true, too. Corporate assets are targets, and that puts your personal assets at risk if you put valuable personal data on a device that sees action outside the home while on business travel.

Read More

ESG Mobility Passion Transforms Business Behavior

Posted: February 09, 2016   /   By: Mark Bowker   /   Tags: BYOD, Enterprise Mobility

mobility and business processesI’m a gadget geek at heart and I continue to be fascinated by how mobile devices and applications are driving enormous behavioral changes inside of businesses. I also have to sympathize for the IT professionals that have to balance an enhanced user experience with heightened security while they manage to maintain legacy applications alongside modernized applications. Not to mention the fact that managing desktops and laptops is a challenge; now there are more devices and many are not corporate owned. Yikes!

Read More

Embrace BYOD for Improved Employee Productivity

Posted: July 06, 2015   /   By: Mark Bowker   /   Tags: BYOD, Enterprise Mobility

It’s important to remember that it’s not the device that is mobile, it’s the employee. Employees today are using mobile devices to perform their job responsibilities and while most of what ESG witnesses today is based on employees consuming information, we are seeing more evidence that demonstrates how employees are using smartphones and tablets for productivity purposes. This is a significant shift. It’s valuable for a mobile employee to view e-mail, patient records, important documents, and even videos, but there can be a significant leap in value for the business when the employee uses the device to input information and for productivity purposes.

Read More

Why Doesn't IT Back Up BYOD?!

Posted: September 17, 2014   /   By: Jason Buffington   /   Tags: Backup, Data Protection, JBuff, Information and Risk Management, endpoint, BYOD

ESG recently started offering TechTruths... single nuggets of data and the analyst perspectives of why they matter. Check out all of them via the link above, but here is my favorite so far on BYOD data protection:

Read More

Managing IT Risk Associated with Mobile Computing Security

Posted: April 08, 2014   /   By: Jon Oltsik   /   Tags: IBM, End-User Computing, Check Point, Fortinet, Cisco, Information and Risk Management, mobile, Security and Privacy, Security, BYOD, Citrix, data security, Fiberlink, android, Dropbox, Good Technology, Airwatch, Blue Coat, CISO, Bit9, Anti-malware, Facebook

When BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk. Why? Many CISOs I spoke with at the time said it was purely a matter of scale. All of a sudden, large enterprises had thousands of additional devices on their networks and they struggled to figure out what these devices were doing and how these activities impacted organizational risk.

Read More

Getting Over the Post-holiday BYOD Proliferation Blues

Posted: January 29, 2014   /   By: ESG   /   Tags: IT Infrastructure, Networking, mobile, BYOD, Aerohive, Bring Your Own Device

It’s no secret, BYOD and mobile devices are changing the way we work, play, and communicate with each other. As a result, the demand for wireless networks is very strong and ESG's IT spending intentions research survey data indicates that expanding wireless networks is one of the top-five most-cited network priorities for organizations. The timing is perfect to talk about expanding the WLAN as the volume of new mobile wireless devices entering the workplace always tend to spike after the holidays. Many of those in IT that I speak to have stated it is not uncommon to have over a thousand new devices hit the wireless network in January. IT then has to struggle to ensure there is adequate connectivity for all these new devices (especially in the executive wing), mitigate the risk, and spend a lot of time associated with managing the onboarding process. For those in higher education, this scenario plays out at the start of every school year as well.

Read More

BaaS and OFS -- companies need both

Posted: January 21, 2014   /   By: Jason Buffington   /   Tags: Storage, End-User Computing, IT Infrastructure, Data Protection, Information and Risk Management, BYOD, Jason Buffington, OFS, Terri McClure, BaaS, Public Cloud Service

At first glance, the services can be easily confused:

Read More

You now have one less way to recover your data – and you probably didn't realize it

Posted: September 12, 2013   /   By: Jason Buffington   /   Tags: Storage, Backup, End-User Computing, Data Protection, Information and Risk Management, mobile, BYOD, Jason Buffington, BaaS

BE AWARE that today’s laptop and mobile devices have one less recovery option than they used to.

This particular customer service announcement is targeted mostly at business executives and the IT professionals who support them.

Read More

Next-generation wLANs will drive productivity gains

Posted: June 27, 2013   /   By: ESG   /   Tags: Cisco, IT Infrastructure, Networking, Juniper, HP, BYOD, Aruba, Huawei, Aerohive, Adtran, Alcatel-Lucent, NEC, Brocade, Enterasys, Extreme, Ruckus

As our vendor clients already know, I’ve been busy surveying over 20 enterprise wireless LAN providers to learn more about their wLAN offerings and support plans for 802.11ac, BYOD, UC, etc. for ESG’s upcoming wLAN Market Landscape Report. I’m happy to report that from the supply-side, there are plenty of innovative enterprise wireless systems to choose from and a very competitive marketplace. And we will be fielding our enterprise wireless networking survey shortly, so we’ll be able to better match enterprise wireless needs to vendor offerings.

However, I do have concerns about the demand-side, where many enterprise CFOs are still concerned about continued economic uncertainty, and are holding the line on IT budgets. Recently, change in information and communications technologies (ICT) seems to be accelerating toward light-speed, but many CFOs just want to spend to keep the lights on in the IT department. Organizations that don’t invest in new IT technologies will find themselves at a competitive disadvantage - period.

Read More

Posts by Topic

see all