Disruptive Thinking

Traditional ways of doing business have changed. Or, to be rather brutally accurate, they have been disrupted.

Our world has been transformed with mobile, cloud, social, data, security, connected devices, to a technological paradigm that could not have been imagined prior to the introduction of the PC, which is not that many years ago.

The way we do things and the devices we use to get things done basically just got faster and smarter at Moore’s law speed. Powered by cloud computing and mobile broadband and fuelled by the individual’s desire to be online all the time, the impact on the world of work and commerce has been profound. What this means for enterprises is that it’s time to think differently; doing business in the digital age means dealing with digital customers, and this can mean a need to dramatically reshape the organisation’s operating model.

Changing technologies, changing philosophies

One of the most significant changes to enterprise IT procurement today has been the shift of the cost model. Organisations have gone from the traditional method of paying up front for technological tools, the CAPEX route, to the more agile, cost-effective OPEX model. This change in philosophy has been powered by pay-as-you-use technology services and is at the heart of how enterprises have to adapt and reinvent themselves.

The benefits that this brings to businesses are many. There is the immediate cost saving inherent to not having to pay set-up fees and to not actually having to buy the full technology kit in the first place. The on-demand usage model also lets companies operate in more flexible and agile ways, creating work/life balance advantages for their employees and enabling better interaction with customers.

When your customers are digitally savvy end-users themselves, they naturally expect the companies they buy from to be similarly engaged. That’s why progressive companies are now using social media tools to deliver customer service, or enhancing their overall value proposition with dedicated smartphone apps.

Fundamentally, enterprises now need to work smarter. Those companies that want to thrive and enjoy competitive advantage over rivals are those that embrace technology, harness its power and use it to improve their product and service offering.

The shift from digital enablement to digital dependency

Technology and in particular mobile devices and mobile Internet connectivity have become life essentials – to the point where some countries have even gone as far as making broadband an actual human right. So much of what we now do as individuals requires technology to make it happen and that we’ve become dependent on it.

Broadband is now faster than ever and pretty much ubiquitous, while cloud computing and the proliferation of smartphones and tablets has been extraordinary and pervasive. Wearable technology is set to go mainstream and the Internet of Things will see more connected devices in place around the planet than we can currently envisage.

Enterprises have no choice but to reinvent and change the ways in which they work and interact with customers. At operational level they need to change their structure and their value proposition needs to evolve.

The more demanding customer

There is a cyclical element to the changes the digital era has brought us; because technology has enabled organisations to work in whole new ways, customer expectation levels have risen. The smartphone connected customer is used to great service, direct to their mobile device wherever they are, so the enterprise is under increasing pressure to keep meeting and exceeding these expectations. It’s a whole new paradigm of customer expectation.

To take this a little further, the next batch of customers currently working their way through university are all Echo Boomers, or Generation Y. They are the most technologically advanced and expectant generation of individuals we’ve ever produced, and they literally do not know or remember a world without broadband, mobile devices, laptops and always-on connectivity. So enterprises need to plan ahead – customer expectation of your digital capabilities is only going to keep on rising.

But remember to keep the back door locked

All this increased mobility and device usage does of course carry a threat with it. While organisations can benefit hugely from reinventing themselves and carrying a digital offering, they must be mindful of the security challenges. Hackers and cyber criminals have also continued to evolve, so risks do remain and have multiplied.

Enterprise mobility management, a strong firewall on your network, in-depth mobile policy within the organisation and even secure corporate app stores are all ways that enterprises can enjoy the benefits of digital while minimising security risks.

Disruptive thinking

With so many technological advances, disruptive thinking is key to an enterprise reaping the benefits quickly. Organisations need to disrupt themselves before they are disrupted, they need to embrace new technologies and adapt them to their organisation’s operations as this is the only way ahead.

Companies that move first will enjoy greater success over the coming decade. Enterprises that delay and continue to operate in time-honoured, traditional ways, will find themselves losing customers, market share and ultimately profitability.

By embracing the digital era and reinventing themselves as a digital enterprise, organisations can truly thrive. Technology used to be a support function within a company, today it is an absolutely essential element of a business strategy. By utilising digital tools to integrate customer service channels, companies can deliver far better customer service and keep customers coming back. Giving your customers more added value with smartphone apps tailored to their needs, will see your customer satisfaction levels increase.

These are some of the ways to forge ahead in the age of the digital economy. Disruptive thinking needs to also be applied to cyber security and protection from unwanted cyber penetrations of your systems, data and sensitive intellectual property.

A simple and effective start, on the security front, is to have professional penetration testing conducted on your organisations systems before someone else does.

Devices, Devices, Devices everywhere – it’s time for next generation “Mobile Device Management as a Service”

As mobile devices continue to increase in both variety and number, it seems to me it is a good time to revisit mobile device management (MDM) strategy. MDM has been around since mobile devices came to the fore, but because of the rapidly changing nature of the mobile landscape, it has had a hard time keeping pace.

A quick definition; MDM policy and tools secure, monitor and manage mobile devices throughout organizations and across various platforms, networks and operators. However as mobile devices have become ubiquitous, both at enterprise and consumer level, there has come a need for MDM to evolve too, to offer greater control and confidence to organizations without compromising all the benefits of the modern mobile user experience.

So what is it that has changed the landscape the most? Well, quite simply, it is the sheer number of devices. The mobile experience is no longer simply about a phone – it’s now smartphones of numerous types and operating systems, tabletsphabletsultrabooks, wearable technology and much more besides. This is the new ‘mobile’, this is now how big mobile is. Over two-thirds of people say they use personal mobile devices in the workplace today. This is what MDM has to cope with.

more devices, more data, more risks

So as mobility takes hold in the enterprise, and more and more critical or sensitive corporate data is at risk of being transported into the public domain by accident or design, the need for a comprehensive MDM approach becomes essential. Global companies want to design and implement global security policies that keep their data as free from threat as possible, but how do you achieve this in the face of such massive mobile device proliferation?

The threats are clear. While it is not really all that long ago that malware, Trojan horses and viruses were considered the chief menace to corporate data, mobility has today brought with it a whole raft of new, more subtle, dangers. Lost or stolen mobile devices and insecure communications now rank high on the list of information security professionals’ worries, and without the right tools and policies in place can be more damaging. Organizations can only realistically secure and control the threats that they know about – mobile devices in the workplace are more difficult to track and maintain in the enterprise environment than inward-bound attacks.

So the main threat is as simple as staff members using their personal devices to access corporate data – with or without their knowledge or intent – and then taking it outside the network. The traditional walled garden is now so compromised as to be obsolete. Nine out of ten executives recently confessed to accessing corporate data on their own mobiles – so how do organizations deal with this fast-growing problem?

everything needs to be managed

Everything is mobile and everything needs to be managed. This is the premise from which to start. Smartphones, tablets and phablets in the workplace, ultrabooks as replacements for traditional laptops, and while not so common just yet, smartwatches and other wearable technology like Google Glass will soon enter the workplace and fall under the remit of the IT department. So an organization’s MDM strategy needs to be robustwide-reaching and most of all progressive – it needs to be able to grow with the rapidly changing landscape.

Furthermore, the rise of the Internet of Things (IoT) and its accompanying machine-to-machine (M2M) communications will also play a part. The IoT means yet more mobile devices, all communicating over the network and all in need of management. The connected car is now a reality and gives mobile employees a new workplace, while other M2M devices that can also store data will need to be managed. So organizations need to address all of these developments, both cost-effectively and efficiently.

on-premise or in the cloud?

Traditionally, MDM policy forming and implementation would be done at ground level, on-premises, so that the IT department could be involved in each step of the process. However, a comprehensive MDM strategy has many bases to cover, and with more mobile devices than ever entering the corporate environment, even the most efficient IT department could find itself stretched too thin. There is basic encryption of devices required, protection against data breach should a device be stolen or lost. Corporate app stores are gaining popularity as a means of controlling the applications that users can install on devices, but more devices with more operating systems again means more complexity here.

So in the event that in-house resources are insufficient to cover MDM on premises, we turn again to the cloud. The benefits to enterprise of cloud-based solutions are well-documented, but when it comes to MDM, the cloud model brings with it the big benefit of lower set-up fees – CAPEX – but also lower ongoing OPEX as well. Cloud-based MDM – or in fact as it is becoming known, MDM as a Service – can give organizations scalable mobile device management on-demand, so they can use it as much or as little as they need to. As mobile devices continue to evolve and end-users continue to lap them up, the flexible MDM in the cloud solution, provided by a specialist partner, looks like offering a highly desirable way ahead.

Original Publication