Published/updated: February 2007
By David Perry
Mobile access to business systems represents a new opportunity for business improvement, but often translates to a headache for IT. Working through the myriad of middleware and devices to develop a coherent platform strategy can be a challenge. This is further complicated by the personal nature of mobile devices which means that unlike other areas of IT, it is also necessary to deal with the strong and often very diverse views and opinions expressed by users. However, unravelling the dependencies has now become an important prerequisite for moving forward in a secure and cost-effective manner.
Users tell us mobile access is not just useful, it creates business advantage
Being “always connected”, is becoming indispensable to many business users. Instant response to key emails and technical support issues are significant benefits, as is participating in general email chatter.
The benefits have traditionally only been available to a privileged few, but this is changing
The benefits of mobile access have traditionally been restricted to a minority of workers, such as senior management and sales staff, but there is very clear evidence of broader use beginning to develop.
Deployment to those who have been given mobile access has been less than ideally controlled
Because of its early adoption by elite users, mobile data culture has developed in a haphazard fashion in many organisations, with little or no control over client devices, user training, or policy for the protection of sensitive company data.
Despite the requirement to tighten things up, outside advice is rarely sought
The research shows there is little use of outside experts in the development of policy in areas such as device strategy. This may slow down organisations as they seek to move activity onto a firmer footing.
The changing supplier landscape is opening up new options and opportunities
After bolstering the mobile capability of Exchange, Microsoft’s mindshare now matches RIM in the battle for strategic future platforms in the enterprise, and is already much higher among smaller organisations.
But handsets are still an issue, and business users want suppliers to listen to them more
Short product lifecycles frustrate companies that have a controlled policy of mobile application deployment. Manufacturers have an opportunity to create more loyalty through better engagement.
Meanwhile, business requirements continue to evolve
A trend towards the broadening of application access beyond mobile email places further emphasis on the need for properly managed device and server-side strategies that can scale to match the needs of the business while protecting corporate information and meeting compliance requirements.
The relatively uncontrolled nature of early deployments of mobile email has in many cases established a flawed foundation for enterprise application access into the future. Organisations must introduce more structure to mobile deployments so their full value to the business is unlocked in a sustainable fashion.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
firstname.lastname@example.org or call +44 (0)1425 626501 / 620008
By Dale Vile and Tony Lock
It’s easy to be caught out by a cyber attack or internal mistake that leads to your customers’ data or important intellectual property ending up on the black market. Making sure your business is adequately protected and is able to respond effectively to a security incident ...more
By Dale Vile Tony Lock & Jack Vile
Application programming interfaces (APIs) have been around for decades. In the early days of IT they were primarily used to give programmers convenient access to libraries of prebuilt functions. As systems became more distributed, APIs found their place ...more
By Dale Vile & Jack Vile
The world we live in is increasingly digital. As the smart use of technology leads to markets speeding up and becoming ever more unpredictable, a strong set of established offerings and execution capabilities only gets you so far. Feedback from 1,442 IT ...more
By Dale Vile
Advances in digital technology create significant opportunities to transform both customer engagement and business operations. As the trends in these areas continue, feedback from 1,442 respondents in a recent survey highlight 10 key traits of the highest achievers. ...more
By Dale Vile
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals are aware that new and changing needs will lead to future capability gaps. They also know that more of the same is not the answer ...more
By Dale Vile
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever. Relying on manual processes and scripts, or ad hoc piecemeal automation, is not sustainable ...more
By Dale Vile
A perennial problem with storage is how to deal with escalating requirements in a smooth, manageable and non-disruptive manner. By removing many of the traditional limits on system expansion, Ceph based configurations ...more
By Dale Vile
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define the future of end user computing. Most organisations today, however, see a role for both company and employee owned equipment to meet the wide and varied range of needs ...more