Seven Critical Steps to Tablet Deployment , by Jack Gold

download Seven Critical Steps to Tablet Deployment , by Jack Gold

of 10

Transcript of Seven Critical Steps to Tablet Deployment , by Jack Gold

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    1/10

    J.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociates

    www.jgoldassociates.com

    7 Critical Steps toan Effective Tablet

    DeploymentJack Gold

    Principal Analyst

    J.Gold Associates, LLC.Follow me: @jckgld

    Presented at TabletBiz New York, 13 November 2013

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    2/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    The Democratization of IT

    The majority of organizations offer at least somesupport for BYOD

    Democratization of IT means that user preferences are asimportant as IT directives. IT cant dictate!

    This will have an effect on operations, including:

    Consumerization of personal tools/apps/devices

    Doing things securely is challenging

    Content Management required

    Enforcement of BYOD PolicyMission Critical or just convenient?

    Bottom Line: BYOD and democratization requires new

    view on what mobile is and how ROI is achieved

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    3/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    And the Survey Says

    Copyright 2012 J.Gold Associates, LLC.

    Copyright 2012 J.Gold Associates, LLC.

    Copyright 2012 J.Gold Associates, LLC.

    What are enterprisesexpecting with Tablets?

    How Mobile are users

    How will tablets be usedcompared to other mobiledevices

    Copyright 2012 J.Gold Associates, LLC.

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    4/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    7 Critical Steps to Tablet Deployment

    Have a Strategy Be Proactive, Not Reactive

    Know what your users want to do with a mobile device Choose the app and then the device, not the other way around

    Keep it secure PC security isnt what you need in a mobile world

    Have a mobile device management strategy Concentrate on apps and data, not the device

    Stay flexible, manage diversity Market and user demands continue to change at a rapid pace

    How much benefit will it offer? Evaluate to minimize TCO and maximize ROI

    How will devices be supported? Is organization equipped to provide mission critical support?

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    5/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    Enterprise-Class Mobile Strategy

    Formulate a sustainable, flexible strategy by:

    Assessing ITs roll in mobility

    Identifying classes of users and their needs and wants

    Defining device classes and capabilities and shortcomings

    Creating and enforcing effective policies to users and devices

    Understanding your mobile Risk Profile

    Creating and implementing a Strategic Plan

    Deploying the right supplementary products

    Bottom line: Corporate governance overdiversification of devices wont come automatically.You have to plan for it!

    Source: Condensed from the J.Gold Associates Whitepaper: 7 Steps to Enterprise Mobile Security

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    6/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    Mobile Security Breaches

    Copyright 2012 J.Gold Associates, LLC.

    *Excerpted from the J.Gold Associates study: Enterprise Mobile Applications: A Study of Strategy and Adoption Trends

    The Security Gap

    User

    Choic

    e

    ITControl

    Security

    Diversity

    Acceptable Riskvs. Security

    TheSecurity

    Gap

    User

    Choic

    e

    ITControl

    Security

    Diversity

    Acceptable Riskvs. Security

    TheSecurity

    Gap

    Copyright 2012 J.Gold Associates, LLC.

    How does your organization compare?

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    7/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    Lifecycle Management

    What needs to be managed

    Devices, connections, users, apps, functions

    Deploying devices at the least cost

    How to determine overall TCO

    Device cost is only 10%-20% of overall TCO/yr

    Other factors include: Provisioning

    Support

    Upgrades (Apps, OS)

    Repair/Replacement

    Retirement

    Bottom Line: TCO of a smart phone or tablet can easily reach$3K-$5K per year beyond connectivity cost!

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    8/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    User vs. IT

    Users want to do their jobs with the least amount ofeffort required.

    Many see corp. management as invasive and limiting

    Most IT groups see management as hard

    And many dont have the required expertise for new age devices

    User #1 goal is get job done with minimal effort.What's IT's #1 goal? That's the disconnect.

    Need to align IT goal and user goal, mostly its not the same.

    This means developing a relationship with end users

    IT often isn't invested in understanding their jobs/workflows

    To be successful, security MUST be fully integrated into workflow

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    9/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    Bottom Line

    Implement a strategy based on a diversified approach Think apps and devices tempered by ROI and TCO

    Supplement strategy as needed

    Evaluate based on multiple factors including security,manageability, governance, and ROI

    This is often not done effectivelyNot all devices, apps or users are created equal

    Classify each - Only way to get control and prevent anarchy

    Management and Governance are key

    Communicate with users to overcome any resistance

    Expect change and create organization that embraces it

    Mobile complexity will not be slowing down any time soon!

  • 8/13/2019 Seven Critical Steps to Tablet Deployment , by Jack Gold

    10/10

    2013 J.Gold Associates, LLCJ.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociateswww.jgoldassociates.com

    Questions?

    How to contact me:

    Jack E. GoldPresident and Principal

    Analyst

    [email protected]

    Twitter: @jckgld

    J.Gold Associates, LLC

    6 Valentine Rd

    Northborough, MA 01532

    508-393-5294

    www.jgoldassociates.com

    J.GoldJ.GoldAssociatesAssociates

    J.GoldJ.GoldAssociatesAssociates

    Some Additional Reading:Select whitepapers available on request

    A Heuristic Approach to MobileSecurity

    A Guide to Deploying Application

    Enabled Smart Phones Durable Smart Devices for Mobile

    Field Workers Choosing an Enterprise-class

    Wireless Operating System

    Additional whitepapers and researchare available on our web site