You are on page 1of 9

Driving Business

Value with BYOD


WHITE PAPER
Ian Song A Research Manager with IDCs
Asia/Pacific Client Devices team in June 2013

Sponsored by Huawei

Driving Business Value with BYOD

WHITE PAPER

Analyst Profile
and Research

Contents

Ian Song
Research Manager,
Client Devices

Ian Song is a Research Manager with IDCs Asia/Pacific Client Devices team. Based in Singapore, Ian is responsible for the development of
the region's Client Virtualization program, and is also involved in building IDC's Enterprise Mobility research. His coverage includes the next

02

12

03

13

IDC OPINION

FUTURE OUTLOOK

generation workspace as well as emerging technologies and trends such as the consumerization of IT.

Ian was a Senior Research Analyst at IDCs Worldwide Enterprise Virtualization Software program in Boston before joining IDC Asia/Pacific.
In that role, he examined virtualization software products deployed within the enterprise, focusing on software designed to virtualize the
client environment. He was responsible for sizing and forecasting the client virtualization market on a global level. He has represented IDC

IN THIS WHITE PAPER

ESSENTIAL GUIDANCE

by speaking at multiple industry conferences, and was quoted in publications such as the Wall Street Journal, Newsweek, CIO Magazine,
NetworkWorld and ComputerWorld.

Prior to joining IDC, Mr. Song worked as an information technology consultant at Harvard University. While there, he led multiple projects
including implementation of virtualized services, streamline application delivery and centralizing client support services. Additionally, Mr.
Song worked as a technology consultant for Sapphire Technologies where he participated in multiple large-scale system deployment
projects. He also worked at IBM global services and for Cisco Systems' product marketing team while on internship programs.

Mr. Song holds a B.A. in Information Systems and Digital Media, with a minor in Chinese studies, from the University of Massachusetts at
Amherst. He also holds an MBA from the Tepper School of Business at Carnegie Mellon University.

04

SITUATION OVERVIEW
What Is BYOD
BYOD Trends in Asia/Pacific
Different BYOD Platforms
Benefits of BYOD
Challenges of BYOD
Managing BYOD
Developing an Enterprise Mobility Framework

14

CONCLUSION

Driving Business Value with BYOD

WHITE PAPER

IDC Opinion

IN THIS
WHITE PAPER

The rise of bring your own device (BYOD) has brought forth real challenges for companies as IT departments begin to lose the absolute

Across Asia/Pacific, an increasing number of consumers have begun to bring their own mobile devices into the workplace. A recent IDC

control they once enjoyed in the enterprise. Although some organizations still question if BYOD is just a passing fad, IDC believes that

survey indicates that more than 90% of surveyed companies in the region has heard of, or are dealing with managing BYOD. While many

BYOD is the new norm of enterprise computing. In fact, BYOD represents the emerging phase of the enterprise mobility model that has

companies are struggling to manage the BYOD trend, evidence suggests that BYOD is evolving into the new normal of corporate IT.

the potential to truly transform the way people and enterprises work in the coming years. As the hype of BYOD continues to build, many
companies are approaching mobility in a reactionary fashion. This means organizations have been scrambling to find point solutions that

This IDC White Paper focuses on the in-depth exploration of BYOD, and to a larger extent, enterprise mobility. In this document, IDC

can manage the influx of personal devices in their environment. However, what BYOD and enterprise mobility enable for the enterprises

discusses what BYOD and enterprise mobility mean to an organization. At the same time, IDC provides an overview of the mobility markets,

are far beyond just maintaining the status quo of enterprise IT. A holistic and strategic approach to BYOD and enterprise mobility can yield

as well as analysis of overall market trends.

measureable business and operational improvements within the enterprise, at the same time creating sustainable competitive advantages
for the organization.

Addressing consumerization in the enterprise requires development of an effective mobility strategy. But before such strategy can be
developed and implemented, clear understanding of business drivers for BYOD has to be recognized. In this White Paper, IDC discusses the

The value of BYOD and enterprise mobility is not something that can be accomplished with just single-point solutions. The journey of BYOD

benefits mobility can bring to an organization and the challenges it will face when designing, testing, and implementing a mobility strategy.

and enterprise mobility nirvana is long and challenging, and it cannot be taken on alone. For the enterprises, the first step is to understand

As consumerization continues to gain momentum, having unmanaged and unsecured devices in the enterprise environment will leave the

the specific benefits mobility can bring to their organizations and therefore can facilitate the development of a holistic mobility strategy.

organizations extremely vulnerable to breaches; at the same time, these organizations will also miss the growing opportunity in creating

Instead of utilizing point solutions to address specific issues, a platform approach is more suitable because it can grow with organizations

efficient mobile workforces.

as their needs evolve. When it comes to implementation, organizations need to consider scalability and flexibility of their mobility platform
while grounded by the underlying need for security. Yet, many companies have found security to be a complex and costly undertaking.
This is because mobility security has multifaceted requirements that extend to devices, networking, content, and usage patterns. Although
complex, security plays an important part in designing a holistic mobility platform based on an open ecosystem which allows the end users
to fully utilize whatever devices they are using.

Driving Business Value with BYOD

WHITE PAPER

BYOD Trends in Asia/Pacific


BYOD is gaining rapid traction in Asia/Pacific. As consumers now often have access to better personal technology than what enterprises
could offer, consumerization has eventually led to the rise of BYOD. In the traditional end-user management model, IT has the ability to
centrally manage and secure all aspects of the device end users have access to. With BYOD, IT has lost some of that ability to centralize
the management of devices users use. According to IDC's end-user BYOD survey, 93.3% of all respondents across Asia use personal
smartphones in their companies, but only 13.5% reported their companies have a formalized policy on BYOD that provides any kind
support. One of the reasons why many companies do not have a policy on or provide support for BYOD is that managing mobile devices in
a heterogeneous environment is a complex undertaking. Although security is a top concern for most companies when it comes to mobile
devices, BYOD is dangerously unsecure in the corporate environment without proper management even with security solutions in place. The
more important factor for organizations facing BYOD challenges is not about how to contain it, but rather how to leverage it and manage
it holistically in order to drive improvement in productivity through a well-design strategy.

Different BYOD Platforms


There are three popular device platforms users tend to use: smartphone, tablet, and notebook PC. Each of the platforms exhibits different
characteristics in user adoption and utilization. Key findings are as follows:

Smartphone
Smartphone is the most popular device platform for BYOD because of its size and capability. Not only it is small enough to be with users at
all times; it is also powerful to complete some basic work functions. According to a recently conducted IDC survey, aside from making calls
and sending text messages, most BYOD users use their smartphones to check email and calendar, browse the Web, and read documents.
These types of BYOD actives account for about 36.7% of all activities on consumer smartphones shipped in the region. For other more
complex tasks like creating documents, accessing corporate apps (cloud and local) and attending meetings, utilization drops to 13.4%

SITUATION OVERVIEW

across the region.

Tablet
For many white-collar employees, tablets are becoming a viable replacement for PCs, and across Asia/Pacific, an increasing number of users
are bringing their tablets to work. Due to its size, tablet is utilized more diversely than smartphone. While typical tablet users do spend

What Is BYOD

time with performing standard tasks like check email/calendar, read documents, and browse the Web, BYOD tablet users are more likely to

BYOD is the practice of employees utilizing their own personal devices for work purposes and using said devices to access privileged

using social media, and attending virtual conferences. There is no question that tablets are versatile devices and users are more productive

company resources such as corporate emails, data, databases and applications as well as personal applications and data.

when using them than with smartphones.

spend more time on non-standard tasks. IDC noticed that BYOD tablet users spend more time on tasks like accessing cloud-based services,

Driving Business Value with BYOD

WHITE PAPER

Notebook PC
Unlike users of smartphones and tablets, BYOD users of PCs tend to be heavy-content creators. This is because notebook PC is still the
workhorse device for creation-centric BYOD users. It is not surprising that IDC's survey results reveal that BYOD notebook users across Asia
spend more time on creating content when compared with smartphone and tablet users. IDC believes while notebooks may compromise
on device portability, in the hand of the right user, they are in fact far more productive than users depending purely on just smartphones
and tablets.

Benefits of BYOD
The core benefit of BYOD is that it is the perfect model to complement the shifting paradigm of work. With the transition from fixed to
mobile happening at a fast pace, BYOD allows employees to use the devices they are familiar with, which can improve general productivity,
foster increased collaboration, and drive innovation. For organizations, a well-secured and managed BYOD model can deliver benefits that
are categorized into three: operational, financial, and organizational.

Operational Benefits
The results of well-deployed and supported mobile solutions will not only improve business operations but also raise employees' job
satisfaction levels. The days when people were happy to sit behind their desks from 9 to 5 are over. Employees want flexible working

Organizational Benefits

alternatives, and it is up to the IT department to provide the solutions that support such work arrangements and employees to use both

Consumerization of IT has damaged the reputation of IT in many organizations. In the past, IT was viewed as the enabler that provided the

company-issued and employee-owned devices.

technology that drove the business. Now, users typically have more powerful devices (e.g., laptops and smartphones) at home than in the
office, and users view the IT department as the blocker that restricts their productivity. A well-defined and implemented mobility strategy

This should also lead to higher productivity as employees will now have access to solutions during traditional downtime when out of the

can change that perception while still providing the overarching security framework that secures the devices, applications, and content.

office, particularly when they can access those solutions on their preferred devices.
Additionally, a mobility strategy that is aligned to both the organization's IT and business strategy will deliver the tangible results that drive

Financial Benefits

the business toward its strategic objectives and makes mobility central to that success.

Companies have a difficult time assessing the returns they get from their initial mobility investments for a variety of reasons, including the
difficulty of measuring soft benefits like productivity, and the challenge of identifying and allocating all the associated costs, including voice

Challenges of BYOD

and data charges as well as support costs. However, once mobility solutions move beyond mobilizing the person to mobilizing the process,

When asked, most organizations state that security is the biggest challenge for implementing BYOD in their environment. While security is

it will be easier to quantify and measure business impact (e.g., sales and/or sales conversion rates).

certainly the biggest issue with enterprise BYOD, it certainly is not the only challenge. The bottom line is that managing consumer mobile
devices is a complex problem to tackle; there is no one point solution that can address the issue. For enterprises, the challenges of BYOD,

Another financial benefit for companies is that BYOD initiatives are a great way to increase the number of productive "assets" in the

whether it is security, management, enablement, and so on, merely reflect the need for organizations to view the mobility challenge

organization without the associated capital expenditure, even though management and support of those devices creates an ongoing

holistically and develop a more sustainable enterprise mobility strategy.

operating expense.

Driving Business Value with BYOD

WHITE PAPER

Managing BYOD

that are designed to integrate with MDM solutions which ensure the right level of access is granted based on device type and user
credential.

FIGURE 1

Enterprise Mobility Ecosystem

Source: IDC, 2013


Unified communications and collaboration. Enabling unified communications and collaboration capabilities of personal devices can
generate additional value to organizations by improving employee productivity. This can be done by integrating existing enterprise
communications and collaboration solutions to employees' personal devices, which will allow users to participate in virtual meetings
and produce inputs regardless of user location.

Secure remote access. Secure remote access enables personal devices to log into the corporate network securely from outside the
corporate network. However, BYOD users may not have the expertise to set up solutions like secure VPN on their mobile devices.
Therefore, IT should leverage capabilities from MDM solutions or other sources to remotely configure end-user devices in order to
minimize end-user complexity.

The following eight focus areas demonstrate the growing complexity of the enterprise mobility ecosystem (Figure 1), which has evolved

Mobile application and content management. Existing corporate resources may not be optimized for mobile devices. At the same

dramatically in recent years. Organizations looking to properly manage BYOD in their environments would need various solutions from

time, applications designed specifically for mobile devices can drive additional productivity. Therefore, IT must look into solutions that

different vendors to address the need to mobilize their users and business processes.

can manage and secure mobile applications and content delivery to employees' personal devices. Many MDM vendors are already

offering mobile applications and content management as part of their solutions. Additionally, organizations should also consider

Defining users. Just because every user in an enterprise can practice BYOD does not mean everyone in the enterprise should. The first

converting or upgrading certain internally developed applications that employees often use on their mobile devices, as a mobile-

step an organization would need to take is to classify the users in its environment to allow or disallow BYOD access. At the end of

optimized version will yield higher usability and therefore productivity. During this process, customers can use software development

the day, if a user cannot realize tangible benefits from leveraging BYOD in the enterprise, then there is no case for allowing such user

kits (SDKs) from third parties to improve the overall manageability and security of the applications.

to BYOD. Developing a BYOD policy based on user definition is the first thing any organization needs to do when designing a BYOD
strategy.

Mobile device management (MDM). For enterprises dealing with BYOD, MDM is becoming an indispensible solution in ensuring
general device management and security. As many organizations have either permitted or cautiously allowed a BYOD corporate
policy, MDM is the foundational technology to manage employee-owned devices. In recent years, MDM solutions have evolved to
take into account the changing needs and complex mobile requirements of the modern enterprise. MDM solutions that can support
and consolidate management and security of multiple mobile OS environments, which is the reality in most workplaces today, should
be the only type organizations consider. As MDM technologies continue to evolve, and larger IT vendors begin to venture into the

Virtualization. Desktop virtualization is useful for users who use the notebook PC and tablet BYOD models. Technologies such as
virtual desktop infrastructure (VDI) host multiple unique and isolated desktop operating systems aboard a single server or group of
servers in the datacenter. The virtual desktops are delivered to the end users' devices via the network. By doing so, end users will have
complete access to all corporate resources and applications while security is ensured. The virtualization model enables IT to manage
personal notebooks and tablets without the need to invest heavily in device management since all resources users access are located
in the datacenter, where policies can ensure security. While desktop virtualization differs from device management technologically,
depending on the organizational need, virtualization can either complement or replace device management.

MDM space, customers should expect MDM solutions becoming increasingly integrated with the organization's infrastructure such as
networking.

Organizations facing management challenges from BYOD should look to their infrastructure before evaluating specific software solutions.
Traditional networking infrastructure is ill suited to manage the myriad of new devices coming on to the corporate network. Organizations

Additional security. Additional security means any security measure beyond what existing MDM or enterprise security solutions

not only have to consider access level management but also need the ability to manage bandwidth, traffic, and resources allocated to

can deliver. This can mean either a policy-driven approach or additional device intervention, or both. With the policy approach,

the mobile devices. Organizations' underlying networking access and security layer for mobile devices should leverage purposely built

organizations should actively educate users on what they can and cannot do with their personal devices in the corporate environment,

hardware-based solutions. Because of the immediate management benefits the infrastructure-level solutions can deliver and the necessity

what applications they should use and should not use, and the best practices when working with their own devices. With additional

for hardware-based solutions in the holistic enterprise mobility ecosystem, IDC recommends that companies tackle rightsizing their

device intervention, IT can install additional tools designed at activity monitoring, limiting device functions based on location, and data

infrastructure before evaluating specific software-based solutions. Additionally, organizations can create synergistic results by implementing

encryption.

mobility-related infrastructure components such as server and storage. By improving the overall infrastructure layer, organizations can ensure
fully scalable capacity that anticipates the additional load created by enterprise mobility while minimizing downtime. Vendors that address

Wireless LAN access control. With BYOD, organizations should revisit their wireless LAN access control capabilities to ensure service

customers' mobility infrastructure needs through either a converged or holistic solution can help customers minimize implementation costs

delivery to personal devices as well as access to sensitive data is not compromised. This may mean acquiring new networking solutions

while speeding up time to market.

Driving Business Value with BYOD

WHITE PAPER

Developing an Enterprise Mobility Framework

Phase 1: mobilizing the person. Mobilizing the person means the organization should make the investment to fully support the
incoming consumer-level mobile devices, regardless if it is personally owned or corporate owned. In this phase, the challenges will be

With the influx of consumerization and BYOD, corporate IT departments have been pushed into opening up their normally secure

mostly technical. In fact, mobilizing the person is very similar to what an organization should do to in addressing BYOD management

infrastructure to support such trends. To mitigate the new risks that this creates, companies have deployed MDM solutions to manage both

issues (refer back to Figure 1). The goal of mobilizing the person is to lay the ground work for a mobility platform to which IT can scale

company-issued and employee-owned devices. However, few organizations have developed any kind of mobility strategy that establishes

and grow to other parts of the business in order to drive value creation. While the technical aspect of this phase may be challenging,

user access profiles based on role, or to implement solutions that protect the applications and content on the devices or solutions that

only IT and some high-level buy-in are needed. Additionally, capital investments in mobilizing the person will be high and the ROI not

enable access, storage, and sharing of files across their network. The extent of an organization's enterprise mobility strategy usually begins

as easily measured.

and ends with the capabilities of the MDM solution it currently uses.

While 2012 saw the explosive proliferation of MDM solutions in enterprises, 2013 will likely be the period when companies will take

Phase 2: mobilizing the process. Mobilizing the process can happen once the underlying foundation for enterprise mobility has
been established. This is also the phase in which the value of enterprise mobility can be fully realized. At the same time, more business

stock of their current mobility solutions and rewrite their mobility strategy. Many organizations are realizing that their reactive approach to

groups are involved in this phase. Essentially, mobilizing the process means taking existing business processes and optimizing them to

BYOD has left them in a situation in which their existing mobility investments will not support their long-term objectives. Going forward,

be used on mobile devices. For example, the sales department can use mobile-optimized CRM applications to log client interaction

companies will likely to take a more methodical, structured approach to mobility by engaging a wider stakeholder audience to develop a

with their smartphones or tablets. By mobilizing business processes, better productivity and efficiency can be realized, and benefits can

future-proofed mobility strategy. In a way, many companies took one step forward by launching BYOD initiatives, but now many will take

also be measured. Drawing on the pervious example, a business can directly measure the amount of logged client interaction from

two steps back to put a proper mobility strategy in place.

mobile devices to observe the increase in employee productivity. The challenges of mobilizing the process are twofold: first, there will
be more stakeholders involved; it could sometimes involve every line of business within an organization. Companies would need to

IDC has developed a three-phase framework for enterprise mobility that organizations looking into making a strategic approach to mobility

carefully analyze each business process to determine the most suitable ones to be mobilized, and therefore maximize the ROI. Second,

should focus on.


FIGURE 2

mobilizing the business process can be a complex technical challenge for some organizations. It will require procuring additional
The Three-Phase Approach

software solutions or reengineering existing solutions, or sometimes both. The additional cost of which can become a barrier from

Source: IDC, 2013

Mobilize the
Person

Mobilize the
Process

gaining stakeholder buy-in.

Mobilize the
Channel

Phase 3: mobilizing the channel. Mobilizing the channel involves collaboration between the organization and its value chain
partners. This is very much like the second phase, but the organizational and technical complexities are much higher. However,
the payback of mobilizing the channel can also be tremendous if properly designed and implemented. Mobilizing the channel can
streamline the entire value chain operation, allow quicker time to market, and resolve issues before they become problems.

10

Email
BYOD
Security
Secure Remote Access
UC&C
Campus WiFi

Field Services
Sales
Business Intelligence
ERP
HCM
CRM
Contact Center
Customer Interaction

Supply Chain
Manufacturing
Healthcare
Banking
Retail
Education

For organizations dealing with BYOD, it is not enough to operate in a reactionary manner; instead, they will need to be forward-looking
and focus on the measureable business benefits mobility can deliver to their environment. It is true that in the initial phase, enterprise
mobility benefits are harder to quantify, as the foundations are still being laid. But once the mobility platform has being built, organizations
can begin to extract the value of it by re-architecturing the way businesses are operated.

11

Driving Business Value with BYOD

WHITE PAPER

FUTURE
OUTLOOK

ESSENTIAL GUIDANCE
There is no doubt that MDM has been the key discussion point for many companies looking to address their BYOD challenges in the past.
However, going forward, organizations are realizing that MDM alone is no longer sufficient to support their enterprise mobility vision.
Companies developing a future-proof mobility strategy will need to not just focus on device management but also extend their strategy
to cover their entire end-user environment. To capitalize on the momentum BYOD has created, organizations will need to streamline their
entire end-user space to fully realize the measurable benefits. In a way, many companies took the first step toward enterprise mobility by
launching BYOD initiatives supported by MDM, but the ongoing enterprise mobility needs will quickly outgrow what MDM can address.
What this means is that pure-play MDM solutions will give way to solutions that will help customers build mobility platforms that support
multiple requirements as well as integrate with other consumerization trends. While MDM is still a vital part of the basic solution, it is
playing more of a supporting role in the mobility platform discussion. IDC believes the days of the pure-play MDM solutions are at an end.
The next phase of mobility will require customers to consider a much wider set of capabilities, from datacenter hardware to endpoint

As we enter the second half of 2013, enterprise customers will no longer seek point solutions to address their mobility requirements such as

devices to management solutions to services that touch all parts of the end-user environment.

pure-play MDM, but rather seek out mobility platforms that support multiple requirements as well as integrate with other consumerization
trends. Many large security and enterprise systems vendors have already built or acquired MDM solutions as part of their platform offerings.

While increasingly complex, enterprise mobility is key for customers to address immediate challenges such as BYOD, and to establish

Larger enterprise vendors' platform approach means they can provide more enticing, integrated, and fully supported solutions to enterprise

long-term competitive advantages. Approaching enterprise mobility requires the right mindset. IDC recommends that the following be

customers where singularity in offering is always valued. Hence, IDC believes the days of pure-play MDM vendors are limited. To drive

considered by organizations:

business, vendors in the enterprise mobility space have to approach customers through a platform message with technology professionals
while fostering a longer-term, strategic discussion with key company stakeholders and business leaders.

Be strategic. IT must work with mobility solution stakeholders, including the lines of business, security business units, and employees,
to develop a thorough mobility strategy that includes detailed user profiles and solution road maps. This mobility strategy should be
aligned with both existing IT and business strategies, as it is fundamental to both. More often than not, mobility can also be cross-

For customers that already have a solid mobility strategy in place, 2013 will be the period when they will start to be more aggressive in

leveraged with other solutions to further extend business value.

leveraging the advancements in technology to drive more disruptive changes in their organizations. Enterprise mobility's role in business will
move beyond mobilizing people and business processes; new business models and work styles will emerge as a result of what mobility can

enable. Gone are the days when ideas were limited by the technology; innovation in todays workplace is only limited by what partners and

Be secure. Extending applications and corporate data to a variety of mobile devices will increase the risk of company-sensitive data
being lost or stolen. Make sure that the devices allowed onto the network are subject to the same IT security policy requirements as

vendors can deliver. As to whom customers turn to, vendors and partners that understand customers' strategy and deliver solutions that

connected devices to mitigate this risk.

align with customers' vision are better positioned in the marketplace.


Be selective. There are hundreds of vendors that will claim to solve customers' mobility challenges; however, it is vital that the vendor

Ultimately, enterprise mobility is just a part of the overall end-user workspace. While BYOD is the catalyst for organizations to seriously

meets the customer's technical requirements, understands the business, integrates with existing technical infrastructure, and provides

address the need to manage the shifting paradigm of work, the fact remains that without a holistic end-user workspace strategy, enterprise

a mobility solutions platform that will support and extent future mobility deployments.

mobility will always be only a partial end-user solution. What vendors are now looking to create are end-to-end solutions for users that
tie together multiple platforms that can truly drive next-generation productivity. The ideal use case for such solutions is for today's whitecollar workforce, in which employees can use mobile devices while out of the office and switch seamlessly to a more productive desktop
environment while in the office. Technologies required for such solutions usually involve multiplatform application (desktop and mobile)
support, content, and device management that span across multiple parts of enterprise IT such as infrastructure, virtualization, mobility,
end-point devices (PCs, thin clients, smartphones, and tablets), and services. Vendors that can streamline the delivery of the next-generation
workspace solution will be favorably positioned in the market.

Be prepared. The mobility industry is constantly changing with the launch of new devices, operating systems, and solutions. Futureproofing mobility investment would require that the overall strategy and the selected partners can adapt to incorporate them.

Organizations will always view the emergence of mobility differently, depending on the effect it has on their business. Companies have
to ask themselves: What exactly mobility means to our organization? And how can mobility positively affect our business? Without truly
understanding the value proposition of enterprise mobility for them, organizations will always approach BYOD and mobility as problems to
be solved, instead of opportunities to be harnessed. IDC suggests that the first step for organizations facing BYOD challenges is to take a
step back and view mobility as a business problem instead of a technical one, and create the mobility strategy for the company based on
the business value it can generate.

12

13

CONCLUSION
It should be painfully clear to companies that consumerization and BYOD are not just a trend or fad, but the new normal in corporate IT.
Additionally, the emergence of Gen Y and Z into the workplace will herald a culture in which mobility and social media drive new models of
productivity. There is no better time than now for decision makers to start planning for this eventuality. While mobility began its life in the
enterprise simply to provide ubiquitous email access to selected individuals, the overarching theme since then has been one of intelligent
transformation. It is perhaps one of the greatest transformational technologies of our time. Mobility should not be viewed as a threat or be
feared, but should be considered an opportunity that can bring far-reaching improvements in the way organizations function.

Companies embarking on the mobility journey should know that they are not alone. In fact, many vendors have already started to offer
specific enterprise mobility solutions. For customers, the best partner to have on the mobility journey is one that shares a mutual vision and
has the holistic hardware, software, and service capabilities to deliver a scalable and secure platform for the customers to grow with.

Copyright Notice

External Publication of IDC Information and Data Any IDC information that is to be used in advertising, press releases, or promotional
materials requires prior written approval from the appropriate IDC Vice President or Country Manager. A draft of the proposed document should
accompany any such request. IDC reserves the right to deny approval of external usage for any reason.

Copyright 2013 IDC. Reproduction without written permission is completely forbidden.

You might also like