Welcome!

Apache Authors: Elizabeth White, Pat Romanski, John Mertic, Liz McMillan, Janakiram MSV

News Feed Item

Enterprise Mobility 2013: BYOD, MDM, Big Data and Application Management

LONDON, Feb. 13, 2014 /PRNewswire/ -- Reportbuyer.com just published a new market research report:

Enterprise Mobility 2013: BYOD, MDM, Big Data and Application Management


Overview:

Key factors driving enterprise mobility today include Bring Your Own Device (BYOD), Mobile Device Management (MDM), and application management. Big Data also plays a role as corporations seek to better understand both their own employee's as well as customer behaviors to optimize internal and external applications respectively.

The trend towards BYOD is accelerating in which employees are allowed to choose their mobile/wireless devices to use for work purposes. BYOD has many implications to the enterprise with the key issue being security. MDM provides one means of ensuring that there is a management layer to control the user environment and thereby protect corporate data and assets.

Enterprise mobility strategy must include the design, building and integration of mobile application as well as management. Management consists of MDM as well as Apps Stores management, which itself includes app publish/distribution, managing the Run time environment and app performance management.

This research package includes:

• Mobile Applications and App Stores: Market Analysis and Forecasts 2013 - 2018
• Mobile Device Management (MDM): Infrastructure and Services 2014 - 2019
• Big Data Opportunities, Challenges and Solutions for Industry Verticals
• Enterprise BYOD Challenges and Next Generation Over-the-Top (OTT) Solutions
• Bring Your Own Device (BYOD) vs. Corporate Owned-Personally Enabled (COPE) Strategy for Enterprise Mobility
• Why BYOT is More Important than BYOD
• The Future of App Stores

This research is a must-read for anyone involved in enterprise mobility strategy as well as business and operations planning.

Target Audience:

• Medium-to-large business
• Mobile network operators
• Mobile apps stores providers
• Mobile device management solution providers
• Enterprise mobility management and IT personnel


Table of Contents:

This research package includes:

Mobile Applications and App Stores: Market Analysis and Forecasts 2013 - 2018

OVERVIEW 3
TECHNICAL OVERVIEW 5
MOBILE APPLICATION DEVELOPMENT TOOLKITS 5
MOBILE APPLICATION STORES 25
COMPARATIVE ANALYSIS 32
APPLICATION STORE ANALYSIS 49
ANALYSIS OF DEVELOPER SUPPORT PROGRAMS 50
OVERALL ANALYSIS 50
SWOT ANALYSIS 51
MARKET OVERVIEW 54
MARKET FORECAST 59
MARKET ANALYSIS 63
MARKET PREDICTIONS 69
BUSINESS OPPORTUNITIES 71
TECHNOLOGY TREND DRIVERS 72
Trends in Mobile Software Development 73
Apps: Retail versus Enterprise ? 74
Mobile Software Testing Trends 75
WIRELESS DATA IMPACTS OUTSIDE THE WIRELESS INDUSTRY 75
TRENDS AND IMPACTS TO NETWORKS 76
WHERE ARE THE BUSINESS OPPORTUNITIES? 76
The Next Big App Market for Network Operators 77
Managing Apps and App Stores for the Enterprise 78

List of Figures

Figure 1: Store Index iOS App Store vs. Google Play App Downloads 60
Figure 2: iOS App Store vs. Google Play App Revenue 60
Figure 3: Global Mobile Application Revenue by Business Model ($M) 61
Figure 4: Smartphone Market Share 63
Figure 5: Looking back at 2008 Data 67
Figure 6: App Store Considerations for Enterprise Mobility 79
Figure 7: Enterprise Apps for Internal and External Usage 81
Figure 8: The Integrated Mobile Management (IMM) Model for Enterprise Apps 82

List of Tables

Table 1: Mobile Development Platform Comparative Analysis 47
Table 2: Developer Program Marketing Analysis 50
Table 3: Mobile App Store Comparative SWOT Analysis 53
Table 4: Global Mobile Application Revenue by App Store ($M) 62



Mobile Device Management (MDM): Infrastructure and Services 2014 - 2019

1 Chapter 1: Introduction 8
1.1 Executive Summary 8
1.2 Topics Covered 10
1.3 Key Findings 11
1.4 Key Questions Answered 12
1.5 Target Audience 12
1.6 Companies Mentioned 13
2 Chapter 2: Mobile Device Management Technology 14
2.1 MDM Introduction 14
2.1.1 Bring Your Own Device (BYOD) 19
2.1.2 History of MDM 21
2.1.3 Bring Your Own Tablet 23
2.1.4 Consumerization of IT 30
2.2 MDM Challenges 31
2.3 MDM in the Cloud 33
2.4 MDM for the Enterprise 37
2.4.1 SWOT Analysis 39
2.4.2 MDM and Mobile Operators 43
3 Chapter 3: MDM Market Environment 46
3.1 Key Market Drivers 46
3.1.1 The Increasing Demand for MDM 46
3.1.2 CapEX and OpEX Reduction 50
3.1.3 Security Management 52
3.2 Market Barriers & Challenges 53
3.2.1 Security Considerations 53
3.2.2 Interference Management 54
4 Chapter 4: MDM Provider Profiles and SWOT Analysis 55
4.1 MDM Ecosystem 57
4.2 MDM Vendors Strategies 58
4.3 Key Players Rank in MDM 58
4.4 Airwatch LLC 60
4.4.1 Business Overview 60
4.4.2 SWOT Analysis 61
4.5 Good Technology Inc. 61
4.5.1 Business Overview 61
4.5.2 SWOT Analysis 62
4.6 Fiberlink Communication Corp 63
4.6.1 Business Overview 63
4.6.2 SWOT Analysis 63
4.7 MobileIron inc 64
4.7.1 Business Overview 64
4.7.2 SWOT Analysis 65
4.1 Vendor Product Portfolio and Strategy 66
4.1.1 MobileIron inc 66
4.1.2 Fiberlink Communication Corp 67
4.1.3 Good Technology Inc 67
4.1.4 AirWatch LLC 67
5 Chapter 5: OTT Vendor Solutions for Enterprise MDM 68
5.1 Armor5 68
5.1.1 Company Description 68
5.1.2 Cloud Based Solution 68
5.1.3 Zero Touch Deployment Model 69
5.1.4 Best Security: Reduce Attack Surface 74
5.1.5 SWOT Analysis 75
5.1.5.1 Strengths & Opportunities 75
5.1.5.2 Weaknesses & Threats 76
5.2 Domo 78
5.2.1 Company Description 78
5.2.2 Business Intelligence (BI) vs. Big Data & Analytics 79
5.2.3 BI Dashboard and Executive Management Platform 80
5.2.4 SWOT Analysis 82
5.2.4.1 Strengths & Opportunities 82
5.2.4.2 Weaknesses & Threats 83
5.3 Divide by Enterproid 83
5.3.1 Company Description 83
5.3.2 Divide Platform 84
5.3.3 Virtualization & Device Management 86
5.3.4 Work-Life Balance & Divide Platform 87
5.3.5 SWOT Analysis 89
5.3.5.1 Strengths & Opportunities 89
5.3.5.2 Weaknesses & Threats 89
5.4 MobileSpaces 90
5.4.1 Company Description 90
5.4.2 Enterprise App Sore, Employee Privacy and BYOD Solution 90
5.4.3 SWOT Analysis 92
5.4.3.1 Strengths & Opportunities 92
5.4.3.2 Weaknesses & Threats 92
5.5 Mocana 93
5.5.1 Company Description 93
5.5.2 Solution Approach 93
5.5.3 Product & Service Paradigm 94
5.5.4 Industry Service Horizon 94
5.5.5 Solution Framework 95
5.5.6 Mobile App Protection & BYOD 96
5.5.7 App Wrapping Solution and Mocana Partnership with Apperian 98
5.5.8 SWOT Analysis for MAP 100
5.5.8.1 Strength & Opportunities 100
5.5.8.2 Weaknesses & Threats 100
5.6 Apperian 100
5.6.1 Company Description 100
5.6.2 MAM Platform and EASE 101
5.6.3 SWOT Analysis 103
5.6.3.1 Strengths & Opportunities 103
5.6.3.2 Weaknesses & Threats 103
5.7 Roambi 104
5.7.1 Company Description 104
5.7.2 Roambi Flow 104
6 Chapter 6: MDM Market Analysis 106
6.1 MDM Enterprise Software Market by End-user Segmentation 106
6.2 The Global MDM Market: 2014 - 2019 107
6.2.1 Global MDM Revenue: 2014 - 2019 107
6.2.2 Regional Outlook of the Market: 2014 - 2019 109
6.2.3 Asia Pacific (2014-2019) 109
6.2.4 Europe 111
6.2.5 Middle East & Africa 113

List of Tables

Table 1 Global MDM market 2014-2018 107
Table 2 Asia Pacific MDM market 2014-2019 109
Table 3 Europe MDM market revenues 2014-2019 111
Table 4 Middle East and Africa MDM market 2014-2019 113

List of Figures

Figure 1 Typical Architecture for BYOD 26
Figure 2 Architecture for BYOT technology 28
Figure 3 BYOD % Company Reports Cost Increased due to BYOD 38
Figure 4 Business % Consider Using Personal Devices as Corporate Security Risk 47
Figure 5 Professionals Using at least Two or More Devices for Work 2013 - 2015 49
Figure 6 Employee Beliefs: Right vs. Want to Break Company Rule vs. Dislike MDM on Device 51
Figure 7 Personal Mobile Devices in Today's Workplace 53
Figure 8: Zero Touch Model 70
Figure 9: CloudSpace Architecture 71
Figure 10: Web Virtualization Engine (WVE) Architecture 72
Figure 11: Interactive Dashboard for Enterprise 76
Figure 12: Cross-Platform view of BI Dashboard 82
Figure 13: Divide Screenshot 85
Figure 14: Work-life Separation Interface of Divide 88
Figure 15: Native Apps screenshot on Smartphone 91
Figure 16: Product & Service Screenshot 94
Figure 17: Industry Coverage Screenshot 95
Figure 18: Mocana Solution Framework 96
Figure 19: MAP Framework 98
Figure 20: EASE Admin Portal 102
Figure 21: Roambi Flow screenshot 105
Figure 22 Global MDM Market 2014-2019 108
Figure 23 Asia Pacific Market 110
Figure 24 Europe MDM market 112
Figure 25 ME and Africa MDM Market 114



Big Data Opportunities, Challenges and Solutions for Industry Verticals

1 Executive Summary 6
2 What is Big Data 6
2.1 Breaking down Big Data 7
2.1.1 Internal Data 8
2.1.2 Structured External Data 8
2.1.3 Unstructured External Data 8
2.2 The important 'V's of Big Data 9
2.3 The Big Deal about Big Data 11
2.3.1 Exponential growth of Big Data 11
2.3.2 What the Numbers Mean 12
2.3.3 The Chance for Companies to Thrive 12
2.4 How Big Is Big Data? 12
2.5 What Data Is Meaningful? 14
2.5.1 Operations Management data 14
2.5.2 Sales and Marketing data 15
2.5.3 Accounting and Finance data 15
2.6 Improved Technologies to Manage Data 15
2.6.1 Analytic relational systems 15
2.6.2 Non-relational systems 15
3 Big Problems to Solve 16
3.1 Better Investment Decision and Operational Changes 16
3.2 Real Time customization 17
3.3 Improved Performance and Risk Management 17
3.4 New Business Model 18
4 Uses for Big Data 18
5 Challenges in Big Data Analysis 20
5.1 Heterogeneity and Incompleteness 21
5.2 Scale 22
5.3 Timeliness 22
5.4 Privacy 23
5.5 Human Collaboration 23
6 Big Data vs. API Strategies 24
6.1 Structured and Unstructured Solutions: APIs 24
7 Big Data Ecosystem 26
7.1 Big Data Landscape 28
8 Big Data Architecture 28
8.1 Traditional Information Architecture Capabilities 29
8.2 Adding Big Data Capabilities 29
9 Big Data Sources: What and How Much? 31
9.1 Where the data is getting generated? 33
10 Big Data Generation and Analytics 36
10.1 Predictive Analytics 37
10.2 Data Scientists 38
10.3 Big Data Technologies and Techniques 39
10.3.1 Hadoop 39
10.3.1.1 Problems solved by Hadoop 40
10.3.1.2 Hadoop Architecture 40
10.3.1.3 Cost Benefits of Hadoop 40
10.3.2 Hadoop and Spark 41
10.3.3 Hadoop and Data Security 41
10.3.3.1 Hadoop's Architecture Presents Unique Security Issues 41
10.3.3.2 Deploy a Purpose-Built Security Solution for Hadoop and Big Data 42
10.3.3 MapReduce 42
10.3.3.1 Features 43
10.3.3.2 When to Use MapReduce 43
10.3.3.3 When Not to Use MapReduce 43
10.3.3.4 How it Works 44
10.4 Data Mining 44
10.5 CRM Systems 44
10.6 Social Media 45
10.6.1 Ways to Tap Social Media 46
10.6.1.1 Google Trends 46
10.6.1.2 APIs and Mashups 46
10.6.1.3 Communicate Intelligence with Data Visualization Tools 46
11 Data Management 46
11.1 Acquire Big Data 46
11.2 Organize Big Data 47
11.3 Analyze Big Data 47
11.4 Interpretation 48
12 Big Data Standardization 48
12.1 Alliance for Telecommunication Industry Solutions 50
12.1.1 Business Challenges for CSPs 50
12.1.2 Promise of Big Data for Telecom 51
12.1.3 Catch problem spots before they affect service. 51
12.1.4 Put Big Data to use immediately 51
12.1.5 Give internal and external teams the tools they need 51
13 Major Service Providers 51
13.1 IBM 52
13.2 Datameer 54
13.3 Amazon Web Services 56
13.4 HP- Big Data 58
13.5 SpotFire 60
13.6 Intel 62
13.7 EMC 64
14 Big Data in Industry Verticals 67
14.1 Finance and Accounting 67
14.2 Retail and CRM 69
14.3 Government and Defense 71
14.5 Healthcare 72
14.6 Supply chain Management 73
14.7 Telecommunication 74
15 Summary and Conclusion 75
16. Appendix 92
16.1 Deeper Dive into Big Data in Retail 92
16.1.1 Retail Merchant Challenges 92
16.1.2 Big Data in Retail 94
16.1.3 Big Data in Retail Business Case 99
16.1.4 Retailers Business Models, Companies, and Solutions 105
16.1.5 Supply Chain Solutions 111
16.2 Deeper Dive into Big Data in Healthcare 113
16.2.1 Big Issues with Healthcare 113
16.2.2 Healthcare Stakeholders 114
16.2.3 Opportunities and Challenges 116
16.3 Big Data Industry Verticals vs. Functional Areas 119
16.3.1 Industry Verticals 119
16.3.2 Functional Areas 119
16.3.3 Big Data Functional Area Forecast 2013 - 2019 120



Enterprise BYOD Challenges and Next Generation Over-the-Top (OTT) Solutions

1.0 ENTERPRISE BYOD TREND & MARKET PREDICTION 4
2.0 BIGGEST ENTERPRISE BYOD CHALLENGE IN 2013 6
3.0 ENTERPRISE BYOD ADOPTION TO-DO 8
3.1 ENTERPRISE MOBILITY STRATEGY 8
3.2 INTEGRATED STRATEGIC APPROACH: COBIT 5 FRAMEWORK 9
4.0 NEXT GENERATION OTT VENDOR SOLUTIONS FOR ENTERPRISE BYOD 11
4.1 ARMOR5 11
4.1.1 COMPANY DESCRIPTION 11
4.1.2 CLOUD BASED SOLUTION 11
4.1.3 ZERO TOUCH DEPLOYMENT MODEL 11
4.1.4 BEST SECURITY: REDUCE ATTACK SURFACE 15
4.1.5 SWOT ANALYSIS 15
4.2 DOMO 17
4.2.1 COMPANY DESCRIPTION 17
4.2.2 BUSINESS INTELLIGENCE (BI) VS. BIG DATA & ANALYTICS 18
4.2.3 BI DASHBOARD AND EXECUTIVE MANAGEMENT PLATFORM 19
4.2.4 SWOT ANALYSIS 20
4.3 DIVIDE BY ENTERPROID 21
4.3.1 COMPANY DESCRIPTION 21
4.3.2 DIVIDE PLATFORM 21
4.3.3 VIRTUALIZATION & DEVICE MANAGEMENT 23
4.3.4 WORK-LIFE BALANCE & DIVIDE PLATFORM 24
4.3.5 SWOT ANALYSIS 25
4.4 MOBILESPACES 26
4.4.1 COMPANY DESCRIPTION 26
4.4.2 ENTERPRISE APP SORE, EMPLOYEE PRIVACY AND BYOD SOLUTION 26
4.4.3 SWOT ANALYSIS 27
4.5 MOCANA 28
4.5.1 COMPANY DESCRIPTION 28
4.5.2 SOLUTION APPROACH 28
4.5.3 PRODUCT & SERVICE PARADIGM 29
4.5.4 INDUSTRY SERVICE HORIZON 29
4.5.5 SOLUTION FRAMEWORK 30
4.5.6 MOBILE APP PROTECTION & BYOD 30
4.5.7 APP WRAPPING SOLUTION AND MOCANA PARTNERSHIP WITH APPERIAN 31
4.5.8 SWOT ANALYSIS FOR MAP 32
4.6 APPERIAN 33
4.6.1 COMPANY DESCRIPTION 33
4.6.2 MAM PLATFORM AND EASE 33
4.6.3 SWOT ANALYSIS 34
4.7 ROAMBI 35
4.7.1 COMPANY DESCRIPTION 35
4.7.2 ROAMBI FLOW 35
5.0 MNOS (MOBILE NETWORK OPERATORS) ROLE IN NEXT GENERATION BYOD TREND 37
6.0 LOCATION IMPACT AND SOLUTION FOR ENTERPRISE BYOD 38
6.1 LOCAID: FULL SCALE ENTERPRISE LOCATION SOLUTION 38

List of Graphs

Figure 1: BYOD Market Fact & Prediction 2013 - 2015 5
Figure 2: Zero Touch Model 12
Figure 3: CloudSpace Architecture 13
Figure 4: Web Virtualization Engine (WVE) Architecture 14
Figure 5: Interactive Dashboard for Enterprise 16
Figure 6: Cross-Platform view of BI Dashboard 20
Figure 7: Divide Screenshot 22
Figure 8: Work-life separation interface of Divide 24
Figure 9: Native Apps screenshot on Smartphone 27
Figure 10: Product & Service Screenshot 29
Figure 11: Industry coverage screenshot 29
Figure 12: Mocana Solution Framework 30
Figure 13: MAP Framework 31
Figure 14: EASE Admin Portal 34
Figure 15: Roambi Flow screenshot 36



Bring Your Own Device (BYOD) vs. Corporate Owned-Personally Enabled (COPE) Strategy for Enterprise Mobility

1.0 COIT, MOBILE DEVICES IN WORKPLACE AND RATIONAL FOR MDM POLICY 4
1.1 MDM TREND 2013 TO BEYOND 4
1.1.1 % OF BUSINESS CONSIDER USING PERSONAL DEVICES IN WORKPLACE AS CORPORATE SECURITY RISK 4
1.1.2 WHAT 100% BUSINESS BELIEVES OVER MOBILE WORKFORCE 5
1.1.3 WORKPLACE MOBILITY TREND OF PROFESSIONALS 2013 - 2015 5
1.1.4 EMPLOYEE RATION OF USING PERSONAL DEVICES 2013-2015 6
1.1.5 WHAT EMPLOYEE THINKS OVER USING PERSONAL DEVICES FOR WORK 6
1.1.6 COMPANIES ON MOBILE WORKFORCE ADOPTION 2013-2015 7
1.1.7 COMPANY CONCERN OVER ALLOWING PERSONAL DEVICES IN WORKPLACE 8
1.1.8 MOBILE WORKFORCE ADOPTION SCENARIO 8
1.1.9 PERSONAL MOBILE DEVICES IN TODAY'S WORKPLACE 9
1.1.10 MOBILE MALWARE THREAT & MOBILE WORKFORCE DILEMMA 9
1.1.11 HOW COMPANIES MANAGE MOBILITY WITH SOLID STRATEGY 10
1.1.12 COMPANY REPLY ON BYOD & COPE: US VS. UK VS. FRANCE VS. GERMANY 10
1.1.13 BYOD VS. COPE ADOPTION TREND 11
2.0 BYOD VS. COPE 12
2.1 HOW DOES IT APPLIES FOR MDM? 12
2.2 WHY BYOD IS A GROWING THREAT FOR BUSINESS & IT MANAGER? 13
2.3 HOW BYOD INCREASE COST? 14
2.4 SWOT ANALYSIS 15
2.5 WHY COPE IS BETTER FOR ORGANIZATION & EMPLOYEES? 16
3.0 COPE POLICY / MODEL 18
3.1 HOW TO DEVELOP FOR ORGANIZATION? 18
3.2 COST-THRESHOLD 18
4.0 COPE VENDOR ANALYSIS 20
4.1 ADVANTIX SOLUTIONS GROUP: TLM VS. REPLACING CMO VS. COST-EFFECTIVE MODEL 20
4.2 MOBI WIRELESS MANAGEMENT: COST THRESHOLD VS. MOBILITY BUDGET VS. FULL SCALE COPE 21
4.3 AZURATI: SHAREPOINT2GO® VS. APPS LEVEL COPE 22
4.4 NINE23: MOBILE INFORMATION ASSURANCE (MOBILEIA) 23
4.5 STREEBO: CLOUD ENTERPRISE APP STORE (EAS) 23
5.0 CASE STUDY 25
5.1 YAHOO STEP TOWARDS COPE AND FORESEE 25
5.2 GOSC: US$2.6 MLILLION ANNUAL SAVINGS CASE 26
5.3 MFG: US$380,000 ANNUAL SAVINGS CASE 26
5.4 HC: US$240,000 SAVINGS CASE 27
5.5 MED: US$2.5 MILLION SAVINGS CASE 28
6.0 CONCLUSIONS AND RECOMMENDATIONS 29

Illustrations

Figure 1: % of Business Consider Using Personal Devices as Corporate Security Risk 4
Figure 2: % of Professionals will use at least 2 or More than 2 devices for work 2013 - 2015 5
Figure 3: % of Company Employee use their Personal Devices vs. Ownership Status 2013-2015 6
Figure 4: % of Employee thinks as Right vs. Want to break company rule vs. Dislike MDM on Device 6
Figure 5: % of Companies allow personal devices vs. MDM policy adoption vs. allow corporate application on consumer devices 7
Figure 6: % Company considers data security vs. cost vs. support problem vs. smarter policy vs. need vendor company while taking decision to allow personal devices for official work 8
Figure 7: Scenario of companies who allowed personal devices in workplace 8
Figure 8: % of Personal Mobile Devices in Today's workplace 9
Figure 9: % of Companies managing mobility in different ways 10
Figure 10: % of companies in US, UK, France & Germany Rely on BYOD & COPE 10
Figure 11: % of Company will adopt BYOD vs. COPE 2013 -2015 11
Figure 12: % of BYOD company reports cost increased due to BYOD 15
Figure 13: COPE Cost Threshold (copyright: MOBI Wireless Management) 19




Why BYOT is More Important than BYOD

Executive Summary
Introduction
History of BYOD
Dealing with BYOD
Unisys Study on the State of BYOD
The Mobile Elite vs. Enterprise IT
Getting Past the 'Mobile IT Gap'
The Next Horizon: BYOT
Recommendations to Enterprise IT
Conclusions




The Future of App Stores

Executive Summary 1
Introduction 2
App Store Features 3
Storefront 3
Download 3
Catalog 4
Categories 4
Search 4
Analytics 4
In-App Purchase & Subscriptions 5
Billings & Payments 5
Cloud Services 5
Business Models 6
Freemium 6
Upfront Purchase 6
In-App Purchase 6
Wholesale 6
Subscription 6
Mobile App Store Players 7
Consumer Market 7
Amazon App Store for Android 7
Apple Apps Store 7
AT&T Apps Store 7
BlackBerry App World 7
Google Play 7
Microsoft Windows Phone Store 7
Facebook Apps Center 8
Enterprise Market 8
Antenna 8
Apps Central 8
App47 8
Apperian 8
Sybase 8
Independent Market 9
1Mobile 9
Amazon Apps Store 9
Appitalism 9
Estore by Ericsson 9
Fiksu 9
Getjar 9
Handango 9
Handmark 9
Handseter 9
Mobango 9
Opera Mobile Store 9
PocketGear 9
SlideME 9
Soc.io Mall 10
Discovery 10
Value Added Services 14
Amazon Kindle Fire 14
Apple iCloud 14
Barnes & Noble Nook 14
Google Nexus 7 15
Microsoft 15
Sony 15
Apps Revenue 15
Apps per Device Forecast 16
What this Means to Enterprise IT 19
Mobile is Now Primary 21
Face the Reality: Consumer & Enterprise Support is Here to Stay 21
Assess the Situation 21
Set Policies for the Consumer Space 21
Set Policies for the Enterprise Space 22
Consider Mobile Support for Customers 22
Educate Your Users and Get their Support 23
Develop a Realistic Plan 23
Consider an Integrated Mobile Management (IMM) system 23
Review your Mobile Strategy Annually 24
Why "Free" is a Misnomer in Mobile Apps 25
The Future of Apps Stores 26

Figures & Tables

Figure 1. Six of the largest and most successful app stores
Figure 2. Cumulative downloads of apps from the Apple Apps Store (in millions)
Figure 3. Sample Apple Apps Store Categories
Figure 4. Example of the Apple Apps store results for the Productivity category (displayed in iTunes)
Figure 5. Sample page from Handmark's web site showing apps for multiple platforms including Android & BlackBerry (but not Apple)
Figure 6. Enterprises have to consider both the Consumer Area as well as the Enterprise Area in the deployment of their mobile applications
Figure 7. Enterprise IT now has both internal and external responsibilities
Figure 8. New Category: Integrated Mobile Management (IMM)




Read the full report:
Enterprise Mobility 2013: BYOD, MDM, Big Data and Application Management
http://www.reportbuyer.com/computing_electronics/networking/wireless/ent...

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: [email protected]
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

 

SOURCE ReportBuyer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...