SlideShare a Scribd company logo
1 of 18
5 Tips for Building an
Enterprise Mobility
Strategy to Improve
Business Outcomes
Presenter: Marco Nielsen
Vice President, Services
mnielsen@enterprisemobile.com
 87% American adults own
a cell phone
 84% Cell phone owners
could not go a single day
without their device
 2013 The year when
mobile-connected
devices will exceed the
world's population
To optimize business outcomes
Assess
interna
l needs
Seek
external
expertis
e
• Assess needs
across your
organization
• Identify
duplication
• Assess
currently
mobility
spend
• Uncover
areas for risk
mitigation
• Review
industry
research
• Consult
thought
leaders
• Leverage
external
assessment
tools and
policy
guidelines
Form a cross-
functional
mobility
team
Develop
clear goals
Get
agreement
from core
players
1
2
3
Determine the initiatives to target first
Put resources in place to support the top
initiatives
Create policy, process and deadlines
Revisit policy and process regularly
 Ask yourself
◦ How are you managing your devices
today?
◦ What is your IT security model?
◦ How does it translate to mobile
devices and their content?
 Consulting with a trusted
advisor of Mobility-as-a-
Service can provide you
with expert insight and
application of industry
best practices to help
you better understand
the most important issues
in enterprise mobility.
1. Research and Understand
2. Develop Goals and Get Buy-In
3. Prioritize Initiatives
4. Take Security Seriously
5. Consult a MaaS provider
 Marco - mnielsen@enterprisemobile.com
 Follow us
https://twitter.com/entmobile
http://www.linkedin.com/company/enterprise-mobile
https://www.facebook.com/entmobile
While every care has been taken to ensure that the information in this document is
correct, Enterprise Mobile cannot accept (and hereby disclaims) any responsibility for
loss or damage caused by errors or omissions. All rights reserved. No part of this
document may be reproduced without the prior permission of Enterprise Mobile.
 2013 Enterprise Mobile
www.enterprisemobile.com
Thank you!

More Related Content

Viewers also liked

Overview of IBM Mobility Portfolio
Overview of IBM Mobility PortfolioOverview of IBM Mobility Portfolio
Overview of IBM Mobility PortfolioIQVIA
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)TkXel
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachRapidValue
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategyAjit Gokhale
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
Mobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence CapitalMobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence CapitalEmergence Capital
 

Viewers also liked (10)

Overview of IBM Mobility Portfolio
Overview of IBM Mobility PortfolioOverview of IBM Mobility Portfolio
Overview of IBM Mobility Portfolio
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approach
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategy
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Mobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence CapitalMobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence Capital
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 

Tips for Building an Enterprise Mobility Strategy

  • 1. 5 Tips for Building an Enterprise Mobility Strategy to Improve Business Outcomes Presenter: Marco Nielsen Vice President, Services mnielsen@enterprisemobile.com
  • 2.  87% American adults own a cell phone  84% Cell phone owners could not go a single day without their device  2013 The year when mobile-connected devices will exceed the world's population
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11. Assess interna l needs Seek external expertis e • Assess needs across your organization • Identify duplication • Assess currently mobility spend • Uncover areas for risk mitigation • Review industry research • Consult thought leaders • Leverage external assessment tools and policy guidelines
  • 12. Form a cross- functional mobility team Develop clear goals Get agreement from core players 1 2 3
  • 13. Determine the initiatives to target first Put resources in place to support the top initiatives Create policy, process and deadlines Revisit policy and process regularly
  • 14.  Ask yourself ◦ How are you managing your devices today? ◦ What is your IT security model? ◦ How does it translate to mobile devices and their content?
  • 15.  Consulting with a trusted advisor of Mobility-as-a- Service can provide you with expert insight and application of industry best practices to help you better understand the most important issues in enterprise mobility.
  • 16. 1. Research and Understand 2. Develop Goals and Get Buy-In 3. Prioritize Initiatives 4. Take Security Seriously 5. Consult a MaaS provider
  • 17.  Marco - mnielsen@enterprisemobile.com  Follow us https://twitter.com/entmobile http://www.linkedin.com/company/enterprise-mobile https://www.facebook.com/entmobile
  • 18. While every care has been taken to ensure that the information in this document is correct, Enterprise Mobile cannot accept (and hereby disclaims) any responsibility for loss or damage caused by errors or omissions. All rights reserved. No part of this document may be reproduced without the prior permission of Enterprise Mobile.  2013 Enterprise Mobile www.enterprisemobile.com Thank you!

Editor's Notes

  1. I’d like to take a moment to welcome you all to the Webinar: 5 Tips for Building an Enterprise Mobility Strategy to Improve Business Outcomes. We’ll be starting in 2 minutes. For those of you that just joined, I’m pleased to welcome you to the Webinar: 5 Tips for Building an Enterprise Mobility Strategy to Improve Business OutcomesMy name is Erica Hansen and I’ll be moderating the webinar and discussion today. Your presenter today will be Marco Nielsen, Marco is the VP of Services and the Chief Mobility Architect at Enterprise Mobile. He leads the company’s services division. As one of Enterprise Mobile’s senior technical experts, Marco participates in the most complex and challenging projects, drawing on his technical expertise. Today he’ll share some of the tips he’s formulated working with clients on building mobility strategy.
  2. By assessing internal needs and seeking external expertise – you’ll come to an understanding which sets you up for tip #2.
  3. Based on the input you received during the research phase, develop clear goals and get agreement from core players on what you are trying to accomplish. To determine how mobility comes into play throughout your business, you need input from all departments. Form a cross-functional team or tap into your existing mobility team to really understand what makes your business tick and what specific issues and opportunities your mobile strategy should address. Produce an outline of the ways different roles in your workforce currently use and/or want to use mobility and how you see it playing a part in your company’s future plans.
  4. Determine the initiatives that should be targeted firstPut resources (people and budget) in place to support the top initiatives Create policy, process and deadlinesRevisit policy and process regularly
  5. Security should be a chief concern, especially when it comes to protecting mobile devices and their data. Ask yourselves these questions:How are you managing your devices today?What is your IT security model?How does it translate to mobile devices and their content?How will you secure your data?If you’re putting corporate data on mobile devices, you need to look closely at how it’s safeguarded. If your organization is adopting a bring-your-own-device (BYOD) approach versus one that involves only corporate devices, you’ll need strategies that account for disparate devices and a blend of business and personal use. You’ll also need to ensure you have the right technology in place to support secure data, the right mobile applications and the right device management for your organization.
  6. Don’t feel like you have to go it alone, there are consulting servicesout there that can help you become more efficient in your mobility strategy – starting from the planning level all the way to execution, mobility monitoring and optimization. Consulting with a provider of Mobility-as-a-Service can provide you with expert insight and application of industry best practices to help you better understand the most important issues in enterprise mobility.
  7. Whatever your approach, taking care to build a solid mobility strategy—and then revisiting it quarterly—will help you ensure that your company is getting maximum value from your mobility investment.