SlideShare a Scribd company logo
1 of 5
Download to read offline
ENTERPRISE
MOBILE
STRATEGY


Improving Productivity and Maintaining Security while
Reducing Overall IT costs
DMI has helped several U.S. Federal Government agencies develop strategies, cost justifications
and deployment plans for secure enterprise mobility solutions. DMI’s unique data-driven approach
has shed light on a remarkable opportunity: for many organizations, enterprise mobility solutions
can improve customer satisfaction, enable workers to be more productive, AND lead to an overall
reduction in IT costs. This case outlines how some organizations can “have their cake and eat it
too,” when it comes to enterprise mobility.




ENTERPRISE MOBILE STRATEGY WHITE PAPER                                                              1
Improving Productivity and Maintaining Security, while Reducing Overall IT costs



Challenge: Harnessing the Power of Mobile Devices to
Benefit the Enterprise
When business unit leaders and employees begin demanding IT support for mobile devices, it can
be overwhelming to already overburdened IT organizations. The total cost of ownership (TCO) to
support an employee with a laptop or desktop PC can easily exceed $4,000 per year. To suggest
that employees now need yet another device with all the associated costs for hardware, software,
security, application development, migration and maintenance may seem unrealistic or flat out
impossible without significant additional IT funding.

But DMI has found that for many organizations, it’s possible to deploy mobile solutions while
actually reducing overall IT costs. One large U.S. civilian agency provides an excellent example:

The agency was looking to identify and pilot mobile solutions that:
     Save money and improve efficiency
     Provide security, manageability and usability
     Offer quick wins that can be implemented rapidly

To validate the feasibility and economic value of introducing tablet PC devices into the enterprise
environment, the agency asked DMI to develop definitive answers to three key questions:
	 1. Is the tablet a viable alternative to laptops, desktops and other business user tools for
		 certain roles?
	   2. How do we make tablets secure?
	   3. Can the agency support tablets operationally in the enterprise?



Solution: DMI MOBILE STRATEGY
To develop reliable answers to the agency’s questions and create a go-forward strategy for mobile
technology deployment, DMI implemented a pilot program, using its Mobile Strategy process to
determine whether tablet PCs are a viable alternative to existing devices, if there is economic value
to the introduction and to establish a roadmap for the agency’s mobility strategy.
      Pilot teams were established that were representative of the agency’s various lines of business 	
    	 and staff offices and the functional roles within each.
      Each team established its own set of business objectives and success criteria for use of the 		
    	 tablet devices.
      Multiple user categories were identified by profiling the tablet pilot users by work styles, 		
    	 location requirements and specific business requirement.
      Tablets were issued to hundreds of pilot participants across each of the pilot teams, and 		
    	 participants used the tablets in normal work settings for a period of 1-2 months.
      Following the pilot period, DMI conducted a quantitative survey and qualitative interviews of 	
    	 pilot participants to develop answers and a go-forward strategy and roadmap for the agency, 	
    	 and used its automated decision support tools to develop strategic recommendations and 		
    	 implementation roadmaps


ENTERPRISE MOBILE STRATEGY WHITE PAPER                                                                    2
Improving Productivity and Maintaining Security, while Reducing Overall IT costs



Findings:
Is the tablet a viable alternative to laptops, desktops and other business user tools for certain roles?

85% of pilot teams agreed that the tablet met their pilot business objectives and that the tablet is a
viable alternative to a laptop, desktop or other business user tool for certain roles. The quantitative
data from the survey indicates that users are willing to give up a laptop or other business user tool
in exchange for a tablet as shown in Chart 1.0 Survey Results—“What device could your tablet
replace.” Specifically, the survey showed that:
     52% would replace a laptop
     45% would replace a BlackBerry
     65% would replace manuals, briefing materials, charts and/or maps

Using user survey data, DMI’s automated decision support tools were used to develop a set of
strategic recommendations and implementation roadmaps, complete with cost justification models
that demonstrated that tablet deployment in the enterprise could be accomplished while actually
reducing the agency’s overall IT costs.

Can we make mobile devices secure?

Applying a risk-based approach to securing the devices, personal identifiable information (PII),
and protecting agency information/data, DMI and our client performed an evaluation of the
security native to the device as well as additional infrastructure and tools that would be required to
establish the tablet as an agency supportable device.

During the pilot the team performed the following steps to ensure the security of pilot participants:
     Applied signed and encrypted configuration utility profiles to establish minimum
   	 security profiles
     Configured all devices to enable data protection
     Verified capability to remote wipe devices
     Conducted extensive testing and validation of mobile data management solutions to:
   		     Selectively wipe the device
   		     Completely wipe the device
   		     Securely deploy security and configuration policies to device
   		     Implement application and data access controls
   		     Verify that users could not change policies/profiles applied by the MDM
   		     Verify the ability of the MDM to restrict access to non-supported applications and sites
     Performed VPN testing to confirm functionality




ENTERPRISE MOBILE STRATEGY WHITE PAPER                                                                    3
Improving Productivity and Maintaining Security, while Reducing Overall IT costs



As a result of testing, the team
determined the criticality of the MDM
solution in being able to provide the
necessary controls for the tablet and
other mobile form factors.




Can we support the tablet operationally in the enterprise?
Using the Aberdeen EMM lifecycle as a model, DMI identified the device lifecycle stages and areas
that potential organizations within the agency would operationally support. The Aberdeen Model is
a maturity model where growth in capabilities is established incrementally.




Impact
Implementation of the DMI Mobile Strategy Solution yielded several important benefits. The pilot:
     Revealed that there is a clear, quantifiable economic value to be gained by introducing tablet 	
   	 PCs, and provided economic cost justification for a large-scale roll out of the technology
     Identified a series of incremental steps to be taken and tools to be implemented over time to 	
   	 maximize the full economic potential of tablet use
     Identified critical security risks and vulnerabilities and identified the technologies and 		
   	 processes needed to adequately address them
     Provided a clear technology roadmap for large scale tablet deployment




ENTERPRISE MOBILE STRATEGY WHITE PAPER                                                                   4
Improving Productivity and Maintaining Security, while Reducing Overall IT costs



About DMI
DMI is a leading IT solutions and business strategy consulting firm. DMI provides services and
solutions in Strategic Consulting, Desktop Management, Network Management, Enterprise
Applications, and Cybersecurity. We are one of the fastest growing companies in the industry, with
over 500 employees and 50 civilian, defense, and intelligence agency clients. The hallmark of our
business is dedication to exceptional customer service and we’re proud of our Dunn and Bradstreet
Open Ratings quality and satisfaction rating of 94/100. Our record of repeat business is enviable by
any standard. DMI is headquartered in Bethesda MD, with satellite and project offices throughout
the world.

At DMI, we focus on “enterprise transformation”—the strategic application of innovation to create
newfound economies, efficiencies, savings, and value for our government and commercial clients
and their customers. We offer market-making thought leadership and the proven ability to deliver
solutions to the most vexing problems facing enterprises today.

We have a dedicated Innovation Office designed to seek and bring new concepts and technologies
to our clients. In the summer of 2011, we opened a state-of-the-art DMI Innovation Center in the
heart of Washington, D.C. At the DMI Innovation Center you can learn, experience, and get your
hands dirty with an increasing array of new technologies and solutions like many of those described
above. See secure mobility in action. Learn what’s possible with Trusted Computing. And soon,
experience the future of integrated, automated cybersecurity monitoring operations. You are
cordially invited.

For more information, contact DMI: Andy Musliner, Chief Technology & Innovation Officer,
amusliner@DMInc.com, 240.223.4809.




DMI
One Rock Spring Plaza
6550 Rock Spring Dr
Bethesda, MD 20817
DMInc.com        info@DMInc.com




ENTERPRISE MOBILE STRATEGY WHITE PAPER                                                                   5

More Related Content

What's hot

Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Dragon1 Inc.
 
10 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development110 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development1Iron Mountain
 
Surviving the Software Selection Process
Surviving the Software Selection ProcessSurviving the Software Selection Process
Surviving the Software Selection ProcessAnthony D'Ugo
 
BMC Software proactive operations platform
BMC Software proactive operations platformBMC Software proactive operations platform
BMC Software proactive operations platformInfraVision
 
UC Bandwidth Article
UC Bandwidth ArticleUC Bandwidth Article
UC Bandwidth ArticleMark Bushey
 
UC Mobility Guide
UC Mobility GuideUC Mobility Guide
UC Mobility GuideLanair
 
Essential Guide to Becoming A Mobile App Rock Star - part I - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part I - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part I - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part I - Enterprise AppsDMIMarketing
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
eBook Unified Communications
eBook Unified Communications eBook Unified Communications
eBook Unified Communications Khiara McMillin
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationInfo-Tech Research Group
 
Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...Cognizant
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksLogicalis
 
Open standards for enterprise applications
Open standards for enterprise applicationsOpen standards for enterprise applications
Open standards for enterprise applicationsKumar
 
How Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationHow Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationCognizant
 
Esg emc-customer-service-072012
Esg emc-customer-service-072012Esg emc-customer-service-072012
Esg emc-customer-service-072012ryand24
 
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...Cognizant
 

What's hot (18)

Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1
 
10 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development110 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development1
 
Surviving the Software Selection Process
Surviving the Software Selection ProcessSurviving the Software Selection Process
Surviving the Software Selection Process
 
Software Management
Software ManagementSoftware Management
Software Management
 
BMC Software proactive operations platform
BMC Software proactive operations platformBMC Software proactive operations platform
BMC Software proactive operations platform
 
UC Bandwidth Article
UC Bandwidth ArticleUC Bandwidth Article
UC Bandwidth Article
 
UC Mobility Guide
UC Mobility GuideUC Mobility Guide
UC Mobility Guide
 
Essential Guide to Becoming A Mobile App Rock Star - part I - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part I - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part I - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part I - Enterprise Apps
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
eBook Unified Communications
eBook Unified Communications eBook Unified Communications
eBook Unified Communications
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and Prioritization
 
Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...Software Engineering: Designing a Better Experience for Communications, Media...
Software Engineering: Designing a Better Experience for Communications, Media...
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
 
Open standards for enterprise applications
Open standards for enterprise applicationsOpen standards for enterprise applications
Open standards for enterprise applications
 
How Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationHow Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System Modernization
 
Esg emc-customer-service-072012
Esg emc-customer-service-072012Esg emc-customer-service-072012
Esg emc-customer-service-072012
 
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
 

Similar to Enterprise Mobile Strategy

Data Driven Mobile Strategy
Data Driven Mobile StrategyData Driven Mobile Strategy
Data Driven Mobile StrategyDMIMarketing
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
 
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)TkXel
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechUBM (Technology)
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014Symantec
 
collaboration_with_mobile_uc_article
collaboration_with_mobile_uc_articlecollaboration_with_mobile_uc_article
collaboration_with_mobile_uc_articleAyham Kochaji
 
Enterprise Mobility - Whitepaper
Enterprise Mobility - WhitepaperEnterprise Mobility - Whitepaper
Enterprise Mobility - WhitepaperNIIT Technologies
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Enabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesEnabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesNIIT Technologies
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategyidescitation
 
Vertical Technology Solutions Overview v1.2
Vertical Technology Solutions Overview v1.2Vertical Technology Solutions Overview v1.2
Vertical Technology Solutions Overview v1.2Robert E. Golden CPM
 
Net Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility BrochureNet Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility BrochureNet Solutions
 

Similar to Enterprise Mobile Strategy (20)

Data Driven Mobile Strategy
Data Driven Mobile StrategyData Driven Mobile Strategy
Data Driven Mobile Strategy
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
original (2).pdf
original (2).pdforiginal (2).pdf
original (2).pdf
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
 
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Foundation of is in business
Foundation of is in businessFoundation of is in business
Foundation of is in business
 
collaboration_with_mobile_uc_article
collaboration_with_mobile_uc_articlecollaboration_with_mobile_uc_article
collaboration_with_mobile_uc_article
 
Enterprise Mobility - Whitepaper
Enterprise Mobility - WhitepaperEnterprise Mobility - Whitepaper
Enterprise Mobility - Whitepaper
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Enabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesEnabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth Opportunities
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategy
 
Build a Workspace of the Future
Build a Workspace of the FutureBuild a Workspace of the Future
Build a Workspace of the Future
 
Vertical Technology Solutions Overview v1.2
Vertical Technology Solutions Overview v1.2Vertical Technology Solutions Overview v1.2
Vertical Technology Solutions Overview v1.2
 
Net Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility BrochureNet Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility Brochure
 

More from DMIMarketing

Portal Integration with SAP BusinessObjects (SDK)
Portal Integration with SAP BusinessObjects (SDK)Portal Integration with SAP BusinessObjects (SDK)
Portal Integration with SAP BusinessObjects (SDK)DMIMarketing
 
SAP BusinessObjects 4.x Upgrade / Migration to 4.x
SAP BusinessObjects 4.x Upgrade / Migration to 4.xSAP BusinessObjects 4.x Upgrade / Migration to 4.x
SAP BusinessObjects 4.x Upgrade / Migration to 4.xDMIMarketing
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsDMIMarketing
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...DMIMarketing
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...DMIMarketing
 
Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...
Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...
Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...DMIMarketing
 
6 Ways to Shake Up Social in Your App
6 Ways to Shake Up Social in Your App6 Ways to Shake Up Social in Your App
6 Ways to Shake Up Social in Your AppDMIMarketing
 
Driving Traffic to Your Mobile Apps & Sites
Driving Traffic to Your Mobile Apps & SitesDriving Traffic to Your Mobile Apps & Sites
Driving Traffic to Your Mobile Apps & SitesDMIMarketing
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Mobile World Congress - Report
Mobile World Congress - ReportMobile World Congress - Report
Mobile World Congress - ReportDMIMarketing
 
Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy EnterpriseDMIMarketing
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT SolutionsDMIMarketing
 

More from DMIMarketing (15)

Portal Integration with SAP BusinessObjects (SDK)
Portal Integration with SAP BusinessObjects (SDK)Portal Integration with SAP BusinessObjects (SDK)
Portal Integration with SAP BusinessObjects (SDK)
 
SAP BusinessObjects 4.x Upgrade / Migration to 4.x
SAP BusinessObjects 4.x Upgrade / Migration to 4.xSAP BusinessObjects 4.x Upgrade / Migration to 4.x
SAP BusinessObjects 4.x Upgrade / Migration to 4.x
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
 
Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...
Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...
Essential Guide to Becoming A Mobile App Rock Star - part I - Consumer-facing...
 
6 Ways to Shake Up Social in Your App
6 Ways to Shake Up Social in Your App6 Ways to Shake Up Social in Your App
6 Ways to Shake Up Social in Your App
 
Driving Traffic to Your Mobile Apps & Sites
Driving Traffic to Your Mobile Apps & SitesDriving Traffic to Your Mobile Apps & Sites
Driving Traffic to Your Mobile Apps & Sites
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Mobile World Congress - Report
Mobile World Congress - ReportMobile World Congress - Report
Mobile World Congress - Report
 
Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy Enterprise
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 

Recently uploaded

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Recently uploaded (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

Enterprise Mobile Strategy

  • 1. ENTERPRISE MOBILE STRATEGY Improving Productivity and Maintaining Security while Reducing Overall IT costs DMI has helped several U.S. Federal Government agencies develop strategies, cost justifications and deployment plans for secure enterprise mobility solutions. DMI’s unique data-driven approach has shed light on a remarkable opportunity: for many organizations, enterprise mobility solutions can improve customer satisfaction, enable workers to be more productive, AND lead to an overall reduction in IT costs. This case outlines how some organizations can “have their cake and eat it too,” when it comes to enterprise mobility. ENTERPRISE MOBILE STRATEGY WHITE PAPER 1
  • 2. Improving Productivity and Maintaining Security, while Reducing Overall IT costs Challenge: Harnessing the Power of Mobile Devices to Benefit the Enterprise When business unit leaders and employees begin demanding IT support for mobile devices, it can be overwhelming to already overburdened IT organizations. The total cost of ownership (TCO) to support an employee with a laptop or desktop PC can easily exceed $4,000 per year. To suggest that employees now need yet another device with all the associated costs for hardware, software, security, application development, migration and maintenance may seem unrealistic or flat out impossible without significant additional IT funding. But DMI has found that for many organizations, it’s possible to deploy mobile solutions while actually reducing overall IT costs. One large U.S. civilian agency provides an excellent example: The agency was looking to identify and pilot mobile solutions that: Save money and improve efficiency Provide security, manageability and usability Offer quick wins that can be implemented rapidly To validate the feasibility and economic value of introducing tablet PC devices into the enterprise environment, the agency asked DMI to develop definitive answers to three key questions: 1. Is the tablet a viable alternative to laptops, desktops and other business user tools for certain roles? 2. How do we make tablets secure? 3. Can the agency support tablets operationally in the enterprise? Solution: DMI MOBILE STRATEGY To develop reliable answers to the agency’s questions and create a go-forward strategy for mobile technology deployment, DMI implemented a pilot program, using its Mobile Strategy process to determine whether tablet PCs are a viable alternative to existing devices, if there is economic value to the introduction and to establish a roadmap for the agency’s mobility strategy. Pilot teams were established that were representative of the agency’s various lines of business and staff offices and the functional roles within each. Each team established its own set of business objectives and success criteria for use of the tablet devices. Multiple user categories were identified by profiling the tablet pilot users by work styles, location requirements and specific business requirement. Tablets were issued to hundreds of pilot participants across each of the pilot teams, and participants used the tablets in normal work settings for a period of 1-2 months. Following the pilot period, DMI conducted a quantitative survey and qualitative interviews of pilot participants to develop answers and a go-forward strategy and roadmap for the agency, and used its automated decision support tools to develop strategic recommendations and implementation roadmaps ENTERPRISE MOBILE STRATEGY WHITE PAPER 2
  • 3. Improving Productivity and Maintaining Security, while Reducing Overall IT costs Findings: Is the tablet a viable alternative to laptops, desktops and other business user tools for certain roles? 85% of pilot teams agreed that the tablet met their pilot business objectives and that the tablet is a viable alternative to a laptop, desktop or other business user tool for certain roles. The quantitative data from the survey indicates that users are willing to give up a laptop or other business user tool in exchange for a tablet as shown in Chart 1.0 Survey Results—“What device could your tablet replace.” Specifically, the survey showed that: 52% would replace a laptop 45% would replace a BlackBerry 65% would replace manuals, briefing materials, charts and/or maps Using user survey data, DMI’s automated decision support tools were used to develop a set of strategic recommendations and implementation roadmaps, complete with cost justification models that demonstrated that tablet deployment in the enterprise could be accomplished while actually reducing the agency’s overall IT costs. Can we make mobile devices secure? Applying a risk-based approach to securing the devices, personal identifiable information (PII), and protecting agency information/data, DMI and our client performed an evaluation of the security native to the device as well as additional infrastructure and tools that would be required to establish the tablet as an agency supportable device. During the pilot the team performed the following steps to ensure the security of pilot participants: Applied signed and encrypted configuration utility profiles to establish minimum security profiles Configured all devices to enable data protection Verified capability to remote wipe devices Conducted extensive testing and validation of mobile data management solutions to: Selectively wipe the device Completely wipe the device Securely deploy security and configuration policies to device Implement application and data access controls Verify that users could not change policies/profiles applied by the MDM Verify the ability of the MDM to restrict access to non-supported applications and sites Performed VPN testing to confirm functionality ENTERPRISE MOBILE STRATEGY WHITE PAPER 3
  • 4. Improving Productivity and Maintaining Security, while Reducing Overall IT costs As a result of testing, the team determined the criticality of the MDM solution in being able to provide the necessary controls for the tablet and other mobile form factors. Can we support the tablet operationally in the enterprise? Using the Aberdeen EMM lifecycle as a model, DMI identified the device lifecycle stages and areas that potential organizations within the agency would operationally support. The Aberdeen Model is a maturity model where growth in capabilities is established incrementally. Impact Implementation of the DMI Mobile Strategy Solution yielded several important benefits. The pilot: Revealed that there is a clear, quantifiable economic value to be gained by introducing tablet PCs, and provided economic cost justification for a large-scale roll out of the technology Identified a series of incremental steps to be taken and tools to be implemented over time to maximize the full economic potential of tablet use Identified critical security risks and vulnerabilities and identified the technologies and processes needed to adequately address them Provided a clear technology roadmap for large scale tablet deployment ENTERPRISE MOBILE STRATEGY WHITE PAPER 4
  • 5. Improving Productivity and Maintaining Security, while Reducing Overall IT costs About DMI DMI is a leading IT solutions and business strategy consulting firm. DMI provides services and solutions in Strategic Consulting, Desktop Management, Network Management, Enterprise Applications, and Cybersecurity. We are one of the fastest growing companies in the industry, with over 500 employees and 50 civilian, defense, and intelligence agency clients. The hallmark of our business is dedication to exceptional customer service and we’re proud of our Dunn and Bradstreet Open Ratings quality and satisfaction rating of 94/100. Our record of repeat business is enviable by any standard. DMI is headquartered in Bethesda MD, with satellite and project offices throughout the world. At DMI, we focus on “enterprise transformation”—the strategic application of innovation to create newfound economies, efficiencies, savings, and value for our government and commercial clients and their customers. We offer market-making thought leadership and the proven ability to deliver solutions to the most vexing problems facing enterprises today. We have a dedicated Innovation Office designed to seek and bring new concepts and technologies to our clients. In the summer of 2011, we opened a state-of-the-art DMI Innovation Center in the heart of Washington, D.C. At the DMI Innovation Center you can learn, experience, and get your hands dirty with an increasing array of new technologies and solutions like many of those described above. See secure mobility in action. Learn what’s possible with Trusted Computing. And soon, experience the future of integrated, automated cybersecurity monitoring operations. You are cordially invited. For more information, contact DMI: Andy Musliner, Chief Technology & Innovation Officer, amusliner@DMInc.com, 240.223.4809. DMI One Rock Spring Plaza 6550 Rock Spring Dr Bethesda, MD 20817 DMInc.com info@DMInc.com ENTERPRISE MOBILE STRATEGY WHITE PAPER 5