A strategic guide to becoming a mobile enterprise

28
© 2013 IBM Corporation A strategic guide to becoming a mobile enterprise

description

Presentation on mobile strategy for SJSU students.

Transcript of A strategic guide to becoming a mobile enterprise

Page 1: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation

A strategic guide to becoming a mobile enterprise

Page 2: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation2 #ibmmobile

Mobile in context

Page 3: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation3 #ibmmobile

Mobile Adoption Continues to Explode

5.6 Billion

Personal Devices Sold

1 TrillionConnected

Devices

41% CAGR Wearable Wireless Devices

2013 2014 2015

Page 4: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation4 #ibmmobile

Mobile Is Changing Interactions Across Industries

Mobile banking transactions grew at

138% CAGR

from 0.3B in 2008 to 9.4B in 2012

25% of all online search for travel comes from a mobile device

1/3 of citizens access federal government website by logging in from phones or tablets

Page 5: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation5 #ibmmobile

And Ultimately Changing How Individuals Are Getting Things Done

62% use devices for work related email

47% use devices to read and write docs

41% use devices to access work related apps

Page 6: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation6 #ibmmobile

These Trends Bring Business and IT Challenges

Business & IT Changes

Clients operate in a “4 screen” world

New process and business designs required for transformation opportunities

Rapid and disruptive innovation shortening time to value requirements

Page 7: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation7 #ibmmobile

These Trends Bring Business and IT Challenges

Privacy & Security

Protection of privacy and confidential information

Policies for client-owned smartphones and tablets

Visibility, security and management of mobile platform requirements

Page 8: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation8 #ibmmobile

These Trends Bring Business and IT Challenges

Integration

Developing apps that integrate with information across the enterprise

Infrastructure complexity from multiple device platforms

Unique mobile requirements for employees/workers

Page 9: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation9 #ibmmobile

Mobile: learning from the best

Page 10: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation10 #ibmmobile

The Institute for Business Value and Oxford Economics Provides Insights into the Characteristics of Mobile Leaders

Read the report: http://ibm.co/ibvmobile

The study represents 601 mobile strategy experts 1Research was conducted by IBV and Oxford Economics in 1Q13

Industry

BankingBanking 5858

Travel and TransportationTravel and Transportation 5454

AutomotiveAutomotive 5050

GovernmentGovernment 5050

HealthcareHealthcare 5050

InsuranceInsurance 5050

TelecomTelecom 5050

RetailRetail 5050

ManufacturingManufacturing 3838

OtherOther 5151

Market

Mature Mature

50%50%Growth Growth

50%50%

Survey Respondent by

Page 11: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation11 #ibmmobile

A Mobile Strategy Leader is Defined as Being …

Source: Institute for Business Value, Mobile Enterprise Study

Is aligned to areas where mobile can fundamentally change business processes and models to generate new revenue streams, lower costs or redefine the organization’s role in the value chain DELIBERATE

Has designed to leverage common technology tools, partnerships, platforms and development resources across business unitsRESOURCEFUL

Has an established governance structure for mobile initiatives that involves all relevant stakeholders, including LoB, IT, HR and MarketingCOLLABORATIVE

Takes into account both external as well as internal initiativesTHOROUGH

Ensures that business cases take into consideration both direct costs as well as benefits that accrue in areas not directly bearing the cost of the initiativeFINANCIALLY-SAVY

Page 12: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation12 #ibmmobile

Backed by these findings we have identified a four part

strategic approach to helping mobile enterprises put their

businesses in motion

Page 13: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation13 #ibmmobile

Those indicating that they excel at integrating existing systems with mobile

63%vs

34%

Mobile Strategy Leaders

All Others

Users do not forgive you for having something that works on the website but doesn’t work on the iPhone app.Chief Architect, Travel services company

Page 14: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation14 #ibmmobile

Solution Using the IBM Worklight mobile platform, the organization can develop and deploy hybrid HTML5 applications to deliver content across multiple mobile platforms.

BenefitsReduces multiplatform development costs by 60 percent when developing for five platforms

ChallengesRohde & Schwarz wanted to create a mobile enterprise infrastructure that would help it support multiple devices and create applications for customers, partners and employees

Rohde & Schwarz cuts mobile development costs by 60 percent

Page 15: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation15 #ibmmobile

Those indicating that they are effective at addressing mobile data security issues

90%vs

55%

Mobile Strategy Leaders

All Others

Our main challenges are data, security, privacy, and intellectual property risk. As vehicles collect more and more data, we will be challenged with determining the owner of the data and what is personal versus private. Director Strategy and Planning, Global IT, Automotive

Page 16: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation16 #ibmmobile

ChallengesThe hospital wanted to update its mobile environment to improve care quality, medical staff productivity and operating cost reduction.

Kochi Medical School Hospital improves care quality while cutting costs

BenefitsLower per-device expense helps reduce maintenance costs and equip a larger pool of employees.

Cloud based architecture maintains a security-rich environment for medical information which extends to, but is not stored on, mobile devices.

Solution IBM helped the hospital to restructure its architecture to take advantage of Apple iPod touch devices, offering a more intuitive user interface, lower maintenance costs and a broader range of applications.

Page 17: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation17 #ibmmobile

Those indicating that they are effective at taking action based on mobile data

73%36%

Mobile Strategy Leaders

All Others

vs

Make sure the voice of the customer is heard by the engineerSenior Advisor, Consumer Electronics company

Page 18: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation18 #ibmmobile Source - IBM Press Release, July 22, 2013 link.Source - IBM Press Release, July 22, 2013 link.

ChallengesNS Shopping currently sells its merchandise via television, catalogues and online, missing out on significant opportunity from a broadening set of sales channels where consumers are actively connecting with retailers.

BenefitsNS Shopping developers are able to expedite the application development lifecycle and quickly deliver valuable mobile services to customers, thus improving customer satisfaction.

NS Shopping transforms customer experience with mobile and analytics technologies

Solution IBM's MobileFirst Platform enables NS Shopping to uncover data insights about individual consumer preferences while developing mobile applications to deliver a consistent, connected customer experience across multiple devices.

Page 19: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation19 #ibmmobile

Those indicating that mobile is fundamentally changing the way their organization does business

81%vs

39%

Mobile Strategy Leaders

All Others

If we don’t invest in mobile, over time we will reduce our ability to acquire new customers and make acquisitions; our customer metrics will decline.Head of Group Digital Deployment, Banking

Page 20: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation20 #ibmmobile

Ford Motor Co. provides its customers with safer, simpler way to connect with in-vehicle technologies

ChallengesIncreasingly sophisticated mobile technologies continues to raise the bar on drivers’ expectations for their vehicles and their driving experience. Ford needed to provide its customers with safer, simpler ways to connect with in-vehicle technologies and their digital lives.

BenefitsFord improved tracking of maintenance issues and vehicle owner behaviors and increased customer satisfaction by enabling vehicles to self-diagnose and report incipient maintenance issues

Solution Ford implemented IBM WebSphere software, which helps enable the company to build, manage the mobility functions that enhances the mobile experience for the customers and increase the service predictability

Page 21: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation21 #ibmmobile

BYOD: transforming the workplace

Page 22: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation22 #ibmmobile

BYOD challenges

Page 23: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation23 #ibmmobile

The four corners of a successful BYOD program

Page 24: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation24 #ibmmobile

BYOD @IBM

BYOD = Bring Your Own Device( IAPD = IBM Authorized Personal Device )

IBM has been supporting “BYOD” for many years

Mobile and consumerization of IT is simply accelerating

Key lesson : todays employees simply expect it …you can not stop it …if you don’t enable it, employees will self enable

435,000 employees (+ contractors)

100,000 managed mobile devices

(80% personally owned)

600,000 managed laptops/desktops

(5% personally owned)

50% of employees are “mobile”

Page 25: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation25 #ibmmobile

So how to start?....... Answers = Personas

Approach to Identifying Identified Personas

Page 26: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation26 #ibmmobile

Next. Analyze the personas (day in the life studies)

At Starbucks, use my personal Android phone to watch a YouTube video and access my IBM e-mail and calendar

8:00AM 9:00AM 4:00PM1:00 PM

At a client location, access client data and applications over their WiFi network with my IBM laptop

Transfer presentations from my laptop to the MicroSD card on my personal Android phone to review before client meeting

Employment Status:

Full-time IBM

Country:

China

Equipment used:

IBM laptop, personal Android phone

Environment:

IBM, Client, Home, Public

6:00PM

I upload an all-hands call from Media Library to Dropbox, so I can listen to it from my Android phone during a flight

My manager calls to ask me to join a Sametime chat to resolve an urgent client issue. I log into a public WiFi using my IBM Laptop for ST chat

5:30PMIn the parking lot, I set up my Droid as a Mobile Hotspot and connect my IBM laptop to the intranet to upload some documents

WiFi 3G

No malware protection available for mobile devices; business web usage can spread malware to mobile device

MicroSD cards are not encrypted and can result in loss of IBM data

Using cloud storage services can result in loss of IBM data

Improperly configured mobile hotspot can allow unauthorized access to the device

ISSUES

Today (from user interviews)

Page 27: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation27 #ibmmobile

Studies helped show security and capability gaps

At Starbucks, use my personal Android phone to watch a YouTube video and access my IBM e-mail and calendar

8:00AM 9:00AM 4:00PM1:00 PM

At a client location, access client data and applications over their WiFi network with my IBM laptop

Transfer presentations from my laptop to the MicroSD card on my personal Android phone to review before client meeting

8:00 AM 1:00 PM 4:00 PM

Malware protection and TEM enforcement allow Android devices to securely access IBM data and reduce malware threat

Encrypted MicroSD cards provide secure storage for IBM and client data

Tools such as My Mobile Hub provide secure solutions for cloud storage

Education on proper configuration of devices helps users keep their devices secure

Open access to key collaboration tools such as Sametime increase employees' productivity when traveling

SOLUTIO

N

Employment Status:

Full-time IBM

Country:

USA

Equipment used:

IBM laptop, personal Android phone

Environment:

IBM, Client, Home, Public

6:00PM

I upload an all-hands call from Media Library to Dropbox, so I can listen to it from my Android phone during a flight

My manager calls to ask me to join a Sametime chat to resolve an urgent client issue. I log into a public WiFi using my IBM Laptop for ST chat

I use my hardened personal Android phone for IBM e-mail and calendar

My manager calls to ask me to join a ST chat. I log-in to ST using my Android device

I upload the all-hands call file to My Mobile Hub and use my Android phone to listen during a flight

Transfer presentations from my laptop to the IBM encrypted container on the MicroSD card on the Android phone

5:30PMIn the parking lot, I set up my Droid as a Mobile Hotspot and connect my IBM laptop to the intranet to upload some documents

6:00 PMI configure my phone's hotspot based on IBM security guidelines and then connect my IBM Thinkpad to it

5:30 PM

WiFi 3G

Today (from user interviews)

Page 28: A strategic guide to becoming a mobile enterprise

© 2013 IBM Corporation28 #ibmmobile

Mobile security – more than just the device

Manage deviceSet appropriate security policies • Register • Compliance • Wipe • Lock

Secure DataData separation • Leakage • Encryption

Application SecurityOffline authentication • Application level controls

Secure AccessProperly identify mobile users and devices • Allow or deny access • Connectivity

Monitor & ProtectIdentify and stop mobile threats • Log network access, events, and anomalies

Secure ConnectivitySecure Connectivity from devices

Secure ApplicationUtilize secure coding practices • Identify application vulnerabilities • Update applications

Integrate SecurelySecure connectivity to enterprise applications and services

Manage ApplicationsManage applications and enterprise app store

At the Device Over the Network and Enterprise For the Mobile App

Enterprise Intranet

Internet