MANAGING THE MOBILE COMPANY EFFICIENTLY - Enterprise mobility management as a core competency - T-Systems

Page created by Jeff Hines
 
CONTINUE READING
MANAGING THE MOBILE
    COMPANY EFFICIENTLY
    Enterprise mobility management as a core competency

THE SPEARHEAD OF DIGITIZATION – ENTERPRISE MOBILITY
                                                                                                                                                  social business
Digitization gives the world a new look, to which a large number of technologies and multiple trends contribute. They are                   mobility           big data
grouped under the term “The 3rd Platform”1, the “Nexus of Forces”2 or simply SMAC stack3 (social, mobile, analytics,
                                                                                                                                                       cloud
cloud). Although the discussion is well underway as to which specific trends are important to take into account, mobility is
always considered to be an undisputed part of digitization. The mobile use of IT services is not a discussion about a potential                 SMAC-Stack
development in the future, but is already reality. This is just as true in public and private life as it is in the corporate environment.
The difference here is that companies require professional solutions for dealing with the new mobile simplicity. Enterprise
mobility management (EMM) provides these solutions. However, only those who have an exact knowledge not only of their
business but also of the mobile market can find the appropriate solution.

MOBILITY IS THE NEW STANDARD
                                                                                                                                                           cell
Anyone using public transport nowadays will see the majority of passengers busy with smartphones. The users send and                                       phones
                                                                                                                                            n
receive e-mails, chat, play games, obtain information, organize themselves, and so on – the mobile boom simply cannot be
stopped. According to GSMA Intelligence, in October 2014 the number of mobile terminal devices (7.22 billion) rose above
                                                                                                                                                                 people
the number of people on Earth (7.2 billion)4 for the first time. By October 2016, the number of mobile terminal devices had
increased further to 7.8 billion. With 4.76 billion contractees, the industry records global sales of 1.06 trillion US dollars5
                                                                                                                                                                   t
                                                                                                                                                  2014

“No other technology has had such an impact on us as cell phones. Never before
have people developed a more rapidly expanding phenomenon – from zero to
7.2 billion in three decades.” [Kevin Kimberlin, Chairman of Spencer Trask & Co]
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency

INCREASING SIGNIFICANCE OF MOBILITY IN BUSINESS
Terminal devices that have a mobile connection via WLAN or another procedure are set to generate 68% of the entire
Internet traffic6 in 2017. In 2020, Cisco7 anticipates that the IP traffic generated by smartphones (30% of the total
volume) will exceed the proportion generated by PCs (29%)8. The implications for use in the corporate environment are
                                                                                                                                     75%
obvious, as is demonstrated by surveys conducted by IDC: In 2020, 105.4 billion (72.3%) employees in the USA9 will
work on a mobile basis, whereby the figure had already reached 96.2 billion in 2015. In Western Europe10, three quarters of
employees will work on a mobile basis as early as 2018. However, mobility not only helps companies to optimize processes
                                                                                                                                mobile worker in
and improve collaboration. Mobility also makes it possible to establish completely new business models, as is demonstrated      western europe
by the examples of Uber or the Tesco Homeplus virtual store in South Korea11.

MANAGING MOBILITY IN THE COMPANY

That which has become a standard in the private environment thanks to its simplicity and flexibility is sometimes causing       EFFICIENCY aND
headaches for companies. On the one hand, those responsible hope that mobile solutions will enable them to increase             PRODUCTIVITY
efficiency and productivity. On the other hand, however, new gateways are emerging, which need to be protected with             VS. SECURITY/
regard to information security. And this needs to be done as efficiently as possible.                                           MANAGEMENT
                                                                                                                                EFFORT
TURNING AWAY FROM PURE DEVICE MANAGEMENT
Several years ago, mobile management still meant mobile device management. The focus was clearly on the terminal
devices. The only possible way of protecting content and applications was to protect the terminal device. A mobile device
management tool had to be installed on the device, while some fairly rigid specifications/policies for using apps did the
rest to intercept the lack of capabilities for managing mobile applications. As a rule, it was the providers of the operating
systems who offered the solutions for mobile device management.

The market for terminal devices and operating systems is characterized by diversity and strong momentum. For example,
simply looking at the operating system families does not give a picture of the true complexity. After all, one Android is
quite different from another. Many device manufacturers adapt the operating system in order to establish their own special
“look and feel”. On top of this, there are differences in hardware as well as constant adjustments and innovations.
Management solutions for mobility in the corporate environment therefore not only need to be diverse, for example
managing different device manufacturers and different operating system variants, but also have to accommodate the
high development speeds. What’s more, management solutions need to dispel the existing deficits of the operating systems
when used in companies. Important aspects here include separating business and personal data as well as preventing
business data from being obtained by unauthorized parties (data loss prevention). Traditional mobile device management is
not suitable for this. One possible all-round approach is to be found in enterprise mobility management.

MANAGING HIGH COMPLEXITY
EMM breaks open closed mobile ecosystems. It acts as an additional management layer beyond operating systems and                EMM AS
devices. This makes companies independent and gives them the freedom to choose the mobile technology they use.                  HIGHER-LEVEL
                                                                                                                                MANAGEMENT
But that’s not all. EMM has to provide more than simple mobile device management. It needs to prove its worth as a              LAYER – ABOVE
comprehensive management tool. In addition to the terminal devices, it is necessary to manage applications, content             AND BEYOND
and identities. Enterprise mobility management also has extended tasks with regard to security. Simple perimeter protection
                                                                                                                                OPERATING
has long since ceased to be enough – modern security architectures also protect content, transmission paths and
                                                                                                                                SYSTEMS AND
                                                                                                                                FUNCTIONS
software, for example through sand-boxed apps, operating systems as firmware and management aps that are integrated
into the operating system.

                                                                                                                                                   2
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency

COMPONENTS OF ENTERPRISE MOBILITY MANAGEMENT

In technical terms, EMM systems generally consist of three components.

1. A central security and management module
2. A gateway that ensures secure data transfer
3. A client on the terminal devices

THREE TECHNICAL COMPONENTS, FOUR TASKS
In the central management tool (1), the IT department defines guidelines for mobile devices, mobile applications and              emm
content. The gateway (2) encrypts the data transfer between the device and the company’s backend resources. The client (3)
enforces the central guidelines on the terminal device and distinguishes, for example, between private and company                  Content
data – also in offline mode. This architecture eliminates the problem of safeguarding apps and content for devices with              Apps
different operating systems, regardless of whether the devices are company-owned or private ones. This lays the foundations for     Identity

the four tasks of EMM.

Mobile device management (MDM) manages mobile devices with any operating systems. The devices can be configu-                       Device

red and deleted automatically. MDM takes inventories of the devices, and allows remote access and monitoring through
to the complete deletion of the data (wipe out).

Mobile content management (MCM) allows company content to be accessed from mobile terminal devices. This can be
done either by the user (content access) or from a central location (content push). The client app can be used to save
content on the terminal device. This may come from e-mail attachments, legacy backend systems or clouds. Security guide-
lines can be enforced here, for instance through authentication for certain content or for file sharing, or through copy/
paste restrictions. Content and tools from the provider’s ecosystem can also be safeguarded by setting up a secure con-
tainer on the device in accordance with the company guidelines and preferences.

Mobile application management (MAM) makes it possible to manage apps and enforce app policies. The latter is parti-
cularly relevant if the operating system does not provide the corresponding options or if no MDM profile is to be installed
on the device. MAM installs and uninstalls apps, safeguards the applications on the terminal devices (by configuring
apps especially) and separates private from business applications. The MAM can also be used to make apps accessible
to external employees, allowing them to work securely in a user-friendly manner with permanent staff.

Mobile identity management (MIM) ensures that only authenticated devices and users obtain access to company
resources. To do this, MIM accesses user and device certificates, and uses app code signing (to identify apps from
secure sources), authentication procedures, single sign-on and context information (such as place and time).

FROM THE IDEA TO IMPLEMENTATION – INTRODUCING AND USING EMM IN THREE STEPS

DEVELOPING AN OVERALL PLAN FOR ALL FOUR AREAS OF ACTION                                                                           PLANNING
Companies wanting to benefit from the increased efficiency and productivity12 arising in the mobile era are well-advised to       EFFICIENT
proceed in a targeted manner and begin by drawing up a plan as to how they intend to manage the terminal devices, apps,           MANAGEMENT
content and identities efficiently. This is due to the fact that establishing new possibilities for employees and new processes   OF MOBILE
initially gives rise to more tasks – not only in the implementation phase, but above all during long-term operation. This makes   DEVICES RIGHT
it inevitable that the companies will fall back on a professional tool for EMM.
                                                                                                                                  FROM THE
                                                                                                                                  START
IDENTIFYING ADDED BUSINESS VALUES FOR MOBILITY
The selection of a tool is preceded by a few preliminary considerations. These considerations commence with the added
business value achieved through the introduction of mobile services and, consequently, their strategic significance for the
company. The added business value must at least correspond to the investments made and ongoing expenses; the tool
should not be implemented merely on the basis of soft factors. The result of this initial phase is the formulation of a mobile
strategy that also contains fundamental requirements for policies. The next step entails reaching a strategic decision as to
which tools are most suitable, based on the company’s framework conditions, to support the mobile strategy developed.
Although it may on the whole be advisable to set an enterprise-wide standard for maximum efficiency, multi-track solutions
may actually be the better choice in individual cases.

                                                                                                                                                 3
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency

SAFE NAVIGATION THROUGH THE MOBILITY JUNGLE
In this phase at the latest, it is worthwhile calling in an external consultant who is very familiar with the current market for mobility
solutions. The multitude of devices, operating system variants, management tools, applications, mobile contracts and provision
models (for both hardware and software) may provide a wide range of options. However, they also increase complexity, making
it hard to keep track of everything.

At the end of the planning phase, it must be clear which EMM tool is to be used in which operating model and which parts of the
mobility service lifecycle are to be dealt with in house and externally.

Once the plan has been drawn up, a project must be implemented to roll out the EMM system. The EMM system is put into ope-
ration (following a possible test phase). The rollout might also include launching a shop system that employees can use to order
mobile terminal devices and/or, where appropriate, apps.

Depending on the degree of digitization and the company’s culture, EMM tools can be provided on premise, as private or public               EXTENSIVE
cloud variants. Beyond the operation of the EMM tools or suite, it is also possible to draw on suitable service providers for               MOBILE LIFE-
related services. If several specialized providers are used, it is essential to have sound provider management and clearly                  CYCLE: WHICH
defined processes. Providers who are able to provide several services – also as a managed service – greatly reduce the effort               SERVICES ARE
involved in managing them.                                                                                                                  PERFORMED
                                                                                                                                            IN HOUSE AND
Specialized service providers are not only able to assume responsibility for operating the EMM, but can also take care of further
                                                                                                                                            WHICH EXTER-
                                                                                                                                            NALLY?
managed services that are important in order to map a complete lifecycle but that do not necessarily have to be performed
in house: order and incident management, support/helpline, application factory, hardware break and fix. They are often also
involved in the following: consulting services for compiling the product catalog, ordering and procuring terminal devices, rates/
SIM cards and accessories, preparation and provisioning, picking and shipping, warranty processing, taking back old devices
with secure data deletion and, where appropriate, reusing the devices (external sale).

Use Case Extended Enterprise

A mechanical engineering company with international operations has extended its business model and, instead of selling                      EMM ALLOWS
machines, sells services for machines. The basic prerequisite for business success is that the machines are available at                    EFFICIENT AND
all times and work without failure. To ensure this, their functionality and status is constantly monitored using a network                  SECURE MOBI-
connection. The monitoring data is input into an SAP database at the mechanical engineering company, where it is centrally                  LE COLLABO-
evaluated. In this way, functional bottlenecks are detected before a failure actually occurs. Thanks to this predictive mainte-             RATION WITH
nance concept, maximum machine availability is ensured.
                                                                                                                                            EXTERNAL
                                                                                                                                            PARTNERS
The service engineers who maintain the machines on customer premises can use an app to access these analyses and
data, thus allowing them to optimize the maintenance. With a view to ensuring global service, the supplier also maintains
a network of 50 service partners outside the company in the various countries who have their own EMM systems for their
terminal devices. They, too, require a secure means of accessing the maintenance data and analyses – in such a way that
they are not able to access any other internal resources of the mechanical engineering company.

For this case, the company has implemented an extended enterprise model as solution. In contrast to the conventional
BYOD approach, it was important to ensure here that no MDM profiles could be distributed to the terminal devices of the
various service partners with the wide range of operating systems used. After all, these may already have corresponding
profiles for their own MDM. The approach chosen was “mobile application management only”. The external service
employees download the app from the company’s own app store via a link. On the specific (external) device, the app is
provided in isolation in the form of a container. This provides the mechanical engineering company with exclusive
management access to the app and thus the possibility of ensuring or removing program and policy updates. The company
is not able to access other functions and content on the external mobile device and there is no conflict with any MDM
that may already exist. This solution provides both sides with the full functionality they need for their business operations
while at the same time ensuring security for the internal resources of each. This is made possible by using a modern
EMM system from T-Systems.

                                                                                                                                                           4
MANAGING THE MOBILE COMPANY EFFICIENTLY Enterprise mobility management as a core competency

READY FOR THE MOBILE TAKEOVER?

Years ago, mobile services were just something for pioneers. It didn’t take long, though, before mobile technologies pre-                                             MOBILITY HAS
vailed not only in society, but also as enterprise tools in the vast majority of companies. Today, hardly any companies can                                           TAKEN HOLD,
avoid using mobile terminal devices. “Mobile” has established itself as a new standard and become a “must have”. Once                                                 MANAGING IT
a certain number of devices need to be managed, therefore, the focus must be on professional management of mobility.                                                  EFFICIENTLY
This can be achieved with EMM systems, around which specialized partners provide supplementary services.                                                              INCREASES
                                                                                                                                                                      THE POTENTIAL
EMM systems accommodate the requirements for modern forms of collaboration – for instance, beyond company bound-
                                                                                                                                                                      BENEFITS
aries and with external partners. Such extended enterprises scenarios can be implemented with them quite easily.
What’s more, the prospects for mobile services are far from being exhausted. The Internet of Things with its multitude of
devices (such as wearables) will make the management of mobile terminal devices even more important. EMM systems
are excellently positioned for this, too.

Finally, EMM systems could even prove to be the key solution for the complete management of workplace systems in                                                      MOBILE FIRST:
companies. The “mobile shift” cannot be ignored and is set to make mobile terminal devices the new standard in the corporate                                          EMM ALSO MA-
environment. The management of traditional desktops or thin clients could then also pass over to the domain of EMM                                                    NAGES STATIO-
systems – with the aim of simplifying and standardizing workplace management. As early as 2018, Gartner13 predicts                                                    NARY PCS
that 40 percent of all companies will be managing some of their PCs or Macs with an EMM system (as opposed to 5 percent
in 2015). Even today, a number of companies are following “mobile first” strategies – and then Windows, as a platform-
independent operating system, could in turn establish itself as the new standard.

The management of mobile terminal devices generates only 40 percent of the costs of managing classic desktop systems.                                                 POTENTIAL
Using Windows 10, it is also possible to manage desktops in the same way as mobile terminal devices, as EMM systems                                                   COST REDUC-
are given access to the file system and registry. The consequences would be clear cost savings in terms of licensing,                                                 TION THROUGH
operation and service for the PC systems. From a cost viewpoint, therefore, it would certainly make sense to replace client                                           THE USE OF
management tools with EMM systems.                                                                                                                                    EMM

Implementing powerful enterprise mobility management today lays the foundations for making use of these future
options.

[1] Explore 3rd Platform Transformation, IDC                                                      [9] IDC Forecasts U.S. Mobile Worker Population to Surpass 105 Million by 2020, Juni 2015
[2] “The Nexus of Forces: Social, Mobile, Cloud and Information”, Gartner                         [10] 	75% of Europe’s workforce will be mobile by 2018, Richard Prime, information-age.com, 2016
[3] “SMAC Stack and Connectivity: Driving the Future of IT”, Karanjit Singh, Kellton Tech, 2016   [11] Tesco opens virtual store in South Korea, Jennifer Creevy, retail-week.com, 2011,
[4] 	There are officially more mobile devices than people in the world, independent.co.uk,              also refer to...
      Zachary Davies Boren, 2014                                                                  [12] 	IDC Forecasts Manufacturing, Banking, and Retail Will Drive CEE Mobility Spending,
[5] https://www.gsmaintelligence.com/                                                                    IDC, 2016
[6] Internet Stats & Facts for 2016, hostingsfacts.com, 2016                                      [13] Market Snapshot Mobile Enterprise Services, T-Systems, 2016
[7] Visual Network Index Forecast and Methodology 2015-2020, Cisco, 2016
[8] 	Cisco Visual Networking Index Predicts Near-Tripling of IP Traffic by 2020, market-
      wired.com, 2016

     ANY QUESTIONS?                                               CONTACT                                                           PUBLISHED BY
     Internet: www.t-systems.com                                  Dr. Michael Pauly, Solution Marketing:                            T-Systems International GmbH
     or simply send an e-mail to:                                 E-mail: michael.pauly@t-systems.com                               Hahnstr. 43d
                                                                                                                                    60528 Frankfurt am Main
     Johannes Meisel                                              Jutta Rahenbrock, Solution Marketing:                             Germany
     mobile-enterprise@telekom.de                                 E-mail: jutta.rahenbrock@t-systems.com
                                                                                                                                    www.t-systems.com
                                                                  Uli Kunesch, Market Intelligence:
                                                                  E-mail: Uli.Kunesch@t-systems.com

                                                                                                                                                                                                 5
You can also read