Doug Cahill and Mark Bowker highlight multiple opportunities for businesses as they embrace ways to securely deliver applications and data to end-users in 2019.
Read the related ESG Blog: 2019 Predictions for Enterprise Mobility
Doug: Welcome to ESG's 2019 Enterprise Mobility and Secure Workspaces Predictions. Mark, we got a lot of great topics to talk about. The first thing I could ask you, I see knowledge workers including myself, with more and more devices, where are we going?
Is this device proliferation? What's going to happen here?
Mark: Yeah, so,we've been talking about that for years, right? I think we're going to start to go the other way. I think that there are scenarios now where you will see a device, one they become much more powerful, right?
Two, they aren't really inexpensive, right? So, if you have to either personally support multiple devices or company has to issue multiple devices, it gets pretty costly to do so.
Mark: So, I see examples where an iPad docked with the USB hub connected to a keyboard and monitor. I see examples where a Google Pixel, for example, can run Android apps native in that device. I see example Samsung DeX single cord out to the monitor with a keyboard can be using it all on their own. So, I think you're going to see more single device type of scenarios out there.
And I think what you'll see ultimately is a couple things happen, I think you're going to see Microsoft Windows is going to be at risk where people may be even looking at Linux desktops. I think you'll also see these scenarios where that Samsung S9 is used as your only device that you're using to compute with and ultimately access applications and data.
Doug: Well, I'm all for that because I seem to have a bag of adapters and dongles for all my different devices and USB-C is certainly a step in the right direction. But when I think about BYOD and extend that into sort of the gig economy with freelancers, who are actually working for a wide variety of companies, how do you standardize layer to us?
Mark: Yeah, this is pretty fascinating, right? We could debate the kind of work style thing all day long, but the fact is we see research out there that says a third of the workplace today is already this gig economy kind of freelance type of worker. I've seen other research that says 50% of those workforce in the U.S. is going to be a gig economy by 2020. How do you support them? In the past, what did I do as an IT professional?
I built you a machine. I put it in a box, I sent it out. And then what did you do? You unboxed it and then spent the next two hours on the phone trying to get it to work and connect it, right?
Doug: That was right.
Mark: That's not going to work, right? That won't work. So, I think what's interesting here is really creating this concept of a digital workspace, which is ultimately a desktop and a semblance of icons which are your applications and data and links that ultimately people will use to access that workspace. We've already seen 56% adopting some type of digital workspace in their environment or plan to do so in the next six months.
So, this idea of let them...that gig economy use a device of their choice, access it over a public network, the internet, but still be able to secure and deliver that experience to support that type of worker.
Doug: So, I use my device of choice?
Doug: And the organization for whom I'm contracting is going to serve up a secure virtual desktop for me perhaps even as a service?
Mark: You got it.
Doug: But what about security? One of the things I know we worked on together last year was sort of conversions of disparate endpoint management, you know, tools into unified endpoint management, UEM, does that help improve the security environment of these types of universal desktops?
Mark: It can. It can. And I think we're going to see a lot here. So, our research that we worked on last year showed 50% saying, "We're going to continue to use third-party security tools," 38% saying, "We're going to use unified endpoint management platform kind of features and toolset but we're still also going to maintain that third-party tools," 8% already saying, "We're going to rely on that unified endpoint management solution for our security."
So, I think you're really going to see a few things happen here. One, is I think a great example in the market is the Cylance acquisition, you know, Blackberry buying them, more security and to really what is ultimately a management and security platform. I also think companies like Microsoft are really going to up their game even further today.
They've slowly been putting those pieces together through acquisitions you're just kind of naturally...and I think you're going to see even more the game, kind of, you know improve there around that space. The big question is going to be where's the pendulum of trust swing? Does it swing towards the third party? Does it swing towards the unified endpoint management solution? When that starts to swing towards a unified endpoint management solution, I think you'll see more adoption there.
Doug: Security is often about defense in depth and layered controls, so it may be both, right? We may see convergence to a platform but hey, I may still choose to use best-of-breed technologies in a layered defense-in-depth posture.
Mark: I agree.
Doug: Hey, so we covered a lot of this ground last year. We have a bunch of research queued up for this coming year around sort of the future of the desktop version, the notion of a secure workspace and include things around identity and access management, the future of passwords. What do you think about the future of passwords? Are passwords dead or we're going to go to alternative forms of authentication?
Mark: You know, passwords are dead in the sense that you won't have to enter them, your username and password, in as often anymore.
Mark: So, in that sense is yes, you're going to still need to authenticate as Doug Cahill and I'll still need to authenticate as well. But ultimately, it will recognize that that's my device. It will recognize maybe through biometrics, facial ID, whatever it may be. There's a reduction in the usage of the passwords, but I don't think it goes away altogether.
Doug: Yeah. There's a transition period.
Doug: You bet. Excellent. Well, thanks very much, Mark. And thanks for joining us for today's prediction video.