Post on 07-May-2015
description
© 2013 IBM Corporation
A strategic guide to becoming a mobile enterprise
© 2013 IBM Corporation2 #ibmmobile
Mobile in context
© 2013 IBM Corporation3 #ibmmobile
Mobile Adoption Continues to Explode
5.6 Billion
Personal Devices Sold
1 TrillionConnected
Devices
41% CAGR Wearable Wireless Devices
2013 2014 2015
© 2013 IBM Corporation4 #ibmmobile
Mobile Is Changing Interactions Across Industries
Mobile banking transactions grew at
138% CAGR
from 0.3B in 2008 to 9.4B in 2012
25% of all online search for travel comes from a mobile device
1/3 of citizens access federal government website by logging in from phones or tablets
© 2013 IBM Corporation5 #ibmmobile
And Ultimately Changing How Individuals Are Getting Things Done
62% use devices for work related email
47% use devices to read and write docs
41% use devices to access work related apps
© 2013 IBM Corporation6 #ibmmobile
These Trends Bring Business and IT Challenges
Business & IT Changes
Clients operate in a “4 screen” world
New process and business designs required for transformation opportunities
Rapid and disruptive innovation shortening time to value requirements
© 2013 IBM Corporation7 #ibmmobile
These Trends Bring Business and IT Challenges
Privacy & Security
Protection of privacy and confidential information
Policies for client-owned smartphones and tablets
Visibility, security and management of mobile platform requirements
© 2013 IBM Corporation8 #ibmmobile
These Trends Bring Business and IT Challenges
Integration
Developing apps that integrate with information across the enterprise
Infrastructure complexity from multiple device platforms
Unique mobile requirements for employees/workers
© 2013 IBM Corporation9 #ibmmobile
Mobile: learning from the best
© 2013 IBM Corporation10 #ibmmobile
The Institute for Business Value and Oxford Economics Provides Insights into the Characteristics of Mobile Leaders
Read the report: http://ibm.co/ibvmobile
The study represents 601 mobile strategy experts 1Research was conducted by IBV and Oxford Economics in 1Q13
Industry
BankingBanking 5858
Travel and TransportationTravel and Transportation 5454
AutomotiveAutomotive 5050
GovernmentGovernment 5050
HealthcareHealthcare 5050
InsuranceInsurance 5050
TelecomTelecom 5050
RetailRetail 5050
ManufacturingManufacturing 3838
OtherOther 5151
Market
Mature Mature
50%50%Growth Growth
50%50%
Survey Respondent by
© 2013 IBM Corporation11 #ibmmobile
A Mobile Strategy Leader is Defined as Being …
Source: Institute for Business Value, Mobile Enterprise Study
Is aligned to areas where mobile can fundamentally change business processes and models to generate new revenue streams, lower costs or redefine the organization’s role in the value chain DELIBERATE
Has designed to leverage common technology tools, partnerships, platforms and development resources across business unitsRESOURCEFUL
Has an established governance structure for mobile initiatives that involves all relevant stakeholders, including LoB, IT, HR and MarketingCOLLABORATIVE
Takes into account both external as well as internal initiativesTHOROUGH
Ensures that business cases take into consideration both direct costs as well as benefits that accrue in areas not directly bearing the cost of the initiativeFINANCIALLY-SAVY
© 2013 IBM Corporation12 #ibmmobile
Backed by these findings we have identified a four part
strategic approach to helping mobile enterprises put their
businesses in motion
© 2013 IBM Corporation13 #ibmmobile
Those indicating that they excel at integrating existing systems with mobile
63%vs
34%
Mobile Strategy Leaders
All Others
Users do not forgive you for having something that works on the website but doesn’t work on the iPhone app.Chief Architect, Travel services company
© 2013 IBM Corporation14 #ibmmobile
Solution Using the IBM Worklight mobile platform, the organization can develop and deploy hybrid HTML5 applications to deliver content across multiple mobile platforms.
BenefitsReduces multiplatform development costs by 60 percent when developing for five platforms
ChallengesRohde & Schwarz wanted to create a mobile enterprise infrastructure that would help it support multiple devices and create applications for customers, partners and employees
Rohde & Schwarz cuts mobile development costs by 60 percent
© 2013 IBM Corporation15 #ibmmobile
Those indicating that they are effective at addressing mobile data security issues
90%vs
55%
Mobile Strategy Leaders
All Others
Our main challenges are data, security, privacy, and intellectual property risk. As vehicles collect more and more data, we will be challenged with determining the owner of the data and what is personal versus private. Director Strategy and Planning, Global IT, Automotive
© 2013 IBM Corporation16 #ibmmobile
ChallengesThe hospital wanted to update its mobile environment to improve care quality, medical staff productivity and operating cost reduction.
Kochi Medical School Hospital improves care quality while cutting costs
BenefitsLower per-device expense helps reduce maintenance costs and equip a larger pool of employees.
Cloud based architecture maintains a security-rich environment for medical information which extends to, but is not stored on, mobile devices.
Solution IBM helped the hospital to restructure its architecture to take advantage of Apple iPod touch devices, offering a more intuitive user interface, lower maintenance costs and a broader range of applications.
© 2013 IBM Corporation17 #ibmmobile
Those indicating that they are effective at taking action based on mobile data
73%36%
Mobile Strategy Leaders
All Others
vs
Make sure the voice of the customer is heard by the engineerSenior Advisor, Consumer Electronics company
© 2013 IBM Corporation18 #ibmmobile Source - IBM Press Release, July 22, 2013 link.Source - IBM Press Release, July 22, 2013 link.
ChallengesNS Shopping currently sells its merchandise via television, catalogues and online, missing out on significant opportunity from a broadening set of sales channels where consumers are actively connecting with retailers.
BenefitsNS Shopping developers are able to expedite the application development lifecycle and quickly deliver valuable mobile services to customers, thus improving customer satisfaction.
NS Shopping transforms customer experience with mobile and analytics technologies
Solution IBM's MobileFirst Platform enables NS Shopping to uncover data insights about individual consumer preferences while developing mobile applications to deliver a consistent, connected customer experience across multiple devices.
© 2013 IBM Corporation19 #ibmmobile
Those indicating that mobile is fundamentally changing the way their organization does business
81%vs
39%
Mobile Strategy Leaders
All Others
If we don’t invest in mobile, over time we will reduce our ability to acquire new customers and make acquisitions; our customer metrics will decline.Head of Group Digital Deployment, Banking
© 2013 IBM Corporation20 #ibmmobile
Ford Motor Co. provides its customers with safer, simpler way to connect with in-vehicle technologies
ChallengesIncreasingly sophisticated mobile technologies continues to raise the bar on drivers’ expectations for their vehicles and their driving experience. Ford needed to provide its customers with safer, simpler ways to connect with in-vehicle technologies and their digital lives.
BenefitsFord improved tracking of maintenance issues and vehicle owner behaviors and increased customer satisfaction by enabling vehicles to self-diagnose and report incipient maintenance issues
Solution Ford implemented IBM WebSphere software, which helps enable the company to build, manage the mobility functions that enhances the mobile experience for the customers and increase the service predictability
© 2013 IBM Corporation21 #ibmmobile
BYOD: transforming the workplace
© 2013 IBM Corporation22 #ibmmobile
BYOD challenges
© 2013 IBM Corporation23 #ibmmobile
The four corners of a successful BYOD program
© 2013 IBM Corporation24 #ibmmobile
BYOD @IBM
BYOD = Bring Your Own Device( IAPD = IBM Authorized Personal Device )
IBM has been supporting “BYOD” for many years
Mobile and consumerization of IT is simply accelerating
Key lesson : todays employees simply expect it …you can not stop it …if you don’t enable it, employees will self enable
435,000 employees (+ contractors)
100,000 managed mobile devices
(80% personally owned)
600,000 managed laptops/desktops
(5% personally owned)
50% of employees are “mobile”
© 2013 IBM Corporation25 #ibmmobile
So how to start?....... Answers = Personas
Approach to Identifying Identified Personas
© 2013 IBM Corporation26 #ibmmobile
Next. Analyze the personas (day in the life studies)
At Starbucks, use my personal Android phone to watch a YouTube video and access my IBM e-mail and calendar
8:00AM 9:00AM 4:00PM1:00 PM
At a client location, access client data and applications over their WiFi network with my IBM laptop
Transfer presentations from my laptop to the MicroSD card on my personal Android phone to review before client meeting
Employment Status:
Full-time IBM
Country:
China
Equipment used:
IBM laptop, personal Android phone
Environment:
IBM, Client, Home, Public
6:00PM
I upload an all-hands call from Media Library to Dropbox, so I can listen to it from my Android phone during a flight
My manager calls to ask me to join a Sametime chat to resolve an urgent client issue. I log into a public WiFi using my IBM Laptop for ST chat
5:30PMIn the parking lot, I set up my Droid as a Mobile Hotspot and connect my IBM laptop to the intranet to upload some documents
WiFi 3G
No malware protection available for mobile devices; business web usage can spread malware to mobile device
MicroSD cards are not encrypted and can result in loss of IBM data
Using cloud storage services can result in loss of IBM data
Improperly configured mobile hotspot can allow unauthorized access to the device
ISSUES
Today (from user interviews)
© 2013 IBM Corporation27 #ibmmobile
Studies helped show security and capability gaps
At Starbucks, use my personal Android phone to watch a YouTube video and access my IBM e-mail and calendar
8:00AM 9:00AM 4:00PM1:00 PM
At a client location, access client data and applications over their WiFi network with my IBM laptop
Transfer presentations from my laptop to the MicroSD card on my personal Android phone to review before client meeting
8:00 AM 1:00 PM 4:00 PM
Malware protection and TEM enforcement allow Android devices to securely access IBM data and reduce malware threat
Encrypted MicroSD cards provide secure storage for IBM and client data
Tools such as My Mobile Hub provide secure solutions for cloud storage
Education on proper configuration of devices helps users keep their devices secure
Open access to key collaboration tools such as Sametime increase employees' productivity when traveling
SOLUTIO
N
Employment Status:
Full-time IBM
Country:
USA
Equipment used:
IBM laptop, personal Android phone
Environment:
IBM, Client, Home, Public
6:00PM
I upload an all-hands call from Media Library to Dropbox, so I can listen to it from my Android phone during a flight
My manager calls to ask me to join a Sametime chat to resolve an urgent client issue. I log into a public WiFi using my IBM Laptop for ST chat
I use my hardened personal Android phone for IBM e-mail and calendar
My manager calls to ask me to join a ST chat. I log-in to ST using my Android device
I upload the all-hands call file to My Mobile Hub and use my Android phone to listen during a flight
Transfer presentations from my laptop to the IBM encrypted container on the MicroSD card on the Android phone
5:30PMIn the parking lot, I set up my Droid as a Mobile Hotspot and connect my IBM laptop to the intranet to upload some documents
6:00 PMI configure my phone's hotspot based on IBM security guidelines and then connect my IBM Thinkpad to it
5:30 PM
WiFi 3G
Today (from user interviews)
© 2013 IBM Corporation28 #ibmmobile
Mobile security – more than just the device
Manage deviceSet appropriate security policies • Register • Compliance • Wipe • Lock
Secure DataData separation • Leakage • Encryption
Application SecurityOffline authentication • Application level controls
Secure AccessProperly identify mobile users and devices • Allow or deny access • Connectivity
Monitor & ProtectIdentify and stop mobile threats • Log network access, events, and anomalies
Secure ConnectivitySecure Connectivity from devices
Secure ApplicationUtilize secure coding practices • Identify application vulnerabilities • Update applications
Integrate SecurelySecure connectivity to enterprise applications and services
Manage ApplicationsManage applications and enterprise app store
At the Device Over the Network and Enterprise For the Mobile App
Enterprise Intranet
Internet