Today, there are more mobile phones in service in the U.S. than there are people. It is estimated that 40% of these phones are smartphones, and this percentage will likely double in the next four to five years.
Smartphones and tablets offer a broad range of functionality that will improve the mobile customer service offerings of enterprise contact centers. To date, contact center application providers have only scratched the surface of the many possibilities.
Where policy for mobile devices is managed is a critical question.
To say we are moving into a post-PC era does not imply that the PC is going away, only that much of the energy in the computing markets is moving to newer, more nimble devices. PC shipments in 2011 were down about 4% year over year. This is attributed mostly to the rise of interest in tablets and smartphones, which can both assume some of the tasks traditionally performed by PCs. This is an important point to emphasize when thinking about the endpoint security markets. Firstly, there will be a strong market for PC client security products for years to come. And because of this, traditional endpoint security vendors believe they have potent leverage when moving into the markets for securing tablets and smartphones: namely, that enterprise customers want to consolidate and integrate endpoint security policy across all end user devices. (Everybody better start thinking more holistically about identity management by the way. But that is a discussion for another post). Continue reading “Endpoint Security in 2012”→
Mobility to be the next big product trend for enterprise video conferencing technology
There are a number of ways to extend corporate video conferencing solutions to mobile devices
The increasing adoption of video conferencing systems in the enterprise combined with the increasing adoption of video-capable mobile devices is set to both challenge and annoy IT departments. One of the problems is that the software and systems that deliver business-class video conferencing (from Cisco, IBMLifeSize, Magor, Microsoft, Polycom, Vidyo etc.) are completely different from the software that runs on the mobile devices wheedling their way into the enterprise as part of the BYOD phenomenon (from Apple, Google, Fuze, Skype, Tango, etc.). It’s unlikely that the two will learn to coexist peacefully anytime soon. Enterprise IT departments will continue to deploy on-premise or cloud-based video conferencing solutions that meet security and compliance requirements. And end users will separately use separate consumer-friendly video conferencing technology on their mobile devices with or without IT’s formal blessing. Continue reading “Extending Corporate Video Conferencing to Mobile Devices”→
At a high level, U.S. businesses are taking similar strategic approaches to the introduction of both tablets and smartphones into the enterprise.
Not surprisingly, the majority of survey respondents want to buy these devices and manage them.
Current Analysis recently completed a survey of enterprises in the U.S. to determine strategic direction for the adoption of tablets and smartphones in enterprise networks. While it is often assumed that enterprises will approach the adoption of tablets and smartphones differently (with tablets treated as simple laptop replacements), our research suggests this is not the case. Continue reading “Addressing the Adoption of Tablets and Smartphones in the Enterprise”→
Huge rise in mobile device usage in the enterprise is kick-starting use of telecom expense management (TEM), mobile device management (MDM) and mobile security
Current Analysis research shows that most enterprises still patch together solutions from third-party vendors; trust in managed services will take more time
In a recent Current Analysis survey of approximately 600 businesses in the U.S. and Europe, 82% of respondents noted that employee-owned mobile devices are accessing data residing on corporate networks or servers; however, only 60% of the companies explicitly allow this practice. Further, 73% of these businesses are planning to buy tablets for their employees, adding to the smartphone types and OSs already in the mix. Clearly the environment for managing costs, reining in the usage and application types accessed by employees, and centralizing device management and security is becoming very complex.