© Current Analysis Inc. All rights reserved.
Follow Current Analysis Washington DC / London / Paris
Outsmart Your Competitors
February 2012
Global Trends in Enterprise Mobility: BYOD, MDM, Mobile Security, and Tablets
Kathryn Weldon Principal Analyst, Enterprise Mobility
Presented by:
Andrew Braunberg Research Director, Enterprise Security and Networks
Jerry Caron Vice President, Analysis
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Agenda
2
Enterprise Trends Tablet Adoption Management of Consumerization/BYOD Opportunities for Network Equipment Vendors Evolution of Mobile Security Requirements Recommendations for Enterprises
Service Provider Trends Use of External Service Providers for Managed Mobility Preferred Providers for Mobile Security Size and Regional Variations Key Take-aways Service Provider Recommendations
Q&A
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Global Trends in Enterprise Mobility
Enterprise Trends
3
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
End of BYOD?
4
Likelihood that your company will purchase Smartphones/Tablets for required employees to use for business? (In next 13 to 24 months, U.S. respondents)
Smartphones Tablets Europe U.S. Europe U.S.
Do So Already 10% 17% 8% 10% Very Likely 49% 46% 45% 52% Likely 28% 24% 29% 21% Unlikely 6% 5% 7% 10% Very Unlikely 7% 7% 9% 8%
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Who buys it and who manages it?
5
In terms of managing smartphones/tablets for business use at your company, which most closely matches your company’s management strategy today? (2 years out , U.S. respondents only)
Smartphones Tablets Today In 2 years Today In 2 years
Company Provides/Company Controls 49% 53% 53% 56%
Company Provides/Employee Controls 36% 33% 31% 29%
Employee Provides/Company Controls 11% 11% 12% 11%
Employee Provides/Employee Controls 4% 3% 5% 5%
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Security Requirements
6
Today passwords, encryption, VPN software are commonly used for security Future requirements for mobile security will be more complex (including
AV/Antispam, URL filtering, partitioned business and personal data, personal firewall, application reputation scoring)
What are your security requirements on personal devices?
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Big Opportunity for Network Equipment Vendors
7
Mobility wraps up in network infrastructure buys (55% US, 52% EU).
Expertise in Security is a leading requirement for mobile management providers (62% US, 54% EU).
Preferred security providers are network equipment vendors (31% US, 26% EU) and traditional security vendors (32% US, 22%EU).
So, big opportunities for security savvy Networking vendors. Cisco and Juniper lead this list.
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Recommendations for Enterprises
8
Accept choice in mobile devices as a price of attracting young talent to your organization but insist on management and security regardless of who owns the device.
Employees have to understand the need to partition corporate and personal data and applications on a device.
Bound choices (e.g., only allowing iPhone, Android) based on carrier/billing requirements , application availability, and security requirements.
Start with MDM but be thinking about a broader solution that includes traditional security and remote access, as well as mobile application management and security features.
Consider the upside: there will be huge opportunities for IT people with strong mobility skills.
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Global Trends in Enterprise Mobility
Service Provider Trends
9
© Current Analysis Inc. All rights reserved.
Follow Current Analysis 10
Use of External Providers for Mobility Management
Majority of US and European companies (70-80%) do not use external service providers for mobility management. This is very consistent regardless of the specific function. US companies a bit ahead of Europe in terms of managing smartphones at all.
How does your company currently manage employee-used smartphones?
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Preferred Supplier for Mobility Management
11
Network equipment providers and device OEMs better positioned today than carriers and SIs to provide mobility management US shows slight preference to SIs over carriers, Europe shows slight
preference to carriers over SIs
Which type of supplier is best positioned to help business respond to the growing need for tablet/smartphone management solutions?
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Does Size Matter?
12
Size does matter a little – the smaller companies are more likely to use a carrier than a Systems Integrator. While only about 24% of companies are using service providers for managed
mobility today, within the next two years, the potential number may grow by about 50%
Which type of supplier is best positioned to help businesses respond to the growing need for Mobility Management
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Preferred Supplier for Mobile Security
13
For Mobile Security, SIs and carriers also not seen as preferred supplier, compared to security software and net equipment vendors 20% of European companies see carriers as preferred. SIs ranked behind carriers
and preferred less for providing security than for MDM
What is your preferred supplier of mobile device security solutions?
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
How Different is the US from Europe?
Multi-Carrier Services
14
US companies more concerned about multi-carrier support Local sourcing in Europe may change procurement dynamics
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Key Takeaways
15
Mobile device management and security requirements growing due to BYOD, multi-OS requirements, high data usage
However, most companies “do it themselves” by buying software and equipment
Only 20-30% use external providers such as IT SPs or carriers for these functions in both US and Europe
Will heat up within two years as many more companies (70% of the 75% not doing so now) will look to external service providers
Security Requirements evolving – today priorities are passwords, encryption, VPNs, feature lock, and remote wipe; near future adds personal FW, traffic scanning, Data Loss Prevention, AV/Antispam, web/URL filtering, app sandboxing, partitioned data wipe and app reputation scoring
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Recommendations for Service Providers
16
Operators and ITSPs are already tapping into about 20% of the potential market for managed mobility and mobile security solutions. This will improve within two years when a larger portion of companies are likely to go to external providers
ITSPs are just starting to offer standardized managed services for MDM and mobile security to broaden their reach. They are not as far along as operators in these initiatives and need to add more functionality and more compelling pricing to win market share.
Operators need to do more to convince customers that they are neutral parties when it comes to multicarrier TEM and MDM, and that they are knowledgeable about mobility policy development and implementation through their professional services groups.
SPs need to meet rapidly changing mobile security and application management requirements, as tablets are used for even more mission critical applications, as smartphones store and access more data, and as BYOD trends continue.
© Current Analysis Inc. All rights reserved.
Follow Current Analysis
Thank you
17
Outsmart Your Competitors
Kathryn Weldon Principal Analyst, Enterprise Mobility [email protected]
Andrew Braunberg Research Director, Enterprise Security and Networks [email protected]
Jerry Caron Vice President, Analysis [email protected]
Top Related