© Copyright 2011. Yankee Group Research, Inc. All rights reserved.
This is the predominant deploymentscenario or mobile proessionals, oremployees who spend less than 25percent o their weekly working hoursat their primary business oces(not home oces).This scenario will apply tofeld service segments andretail and hospitality sectorsthat are using paper-basedor other non-mobileprocesses today.This scenario will applyto some feld sales and serviceemployees, as well asphysicians and specialty roles.O employees who use tablets or work purposes, 81 percent also use bothsmartphones and laptops, according toour 2011 US Enterprise Mobility:Employee Survey, Wave 2.
Tablet as acomplementary,oradditive, deviceTablet as a netnewdeviceTablet as areplacementdevice
Exhibit 3: Three Enterprise Tablet Deployment Scenarios
Source: Yankee Group, 2011
Exhibit 4: Employee-Owned Devices Lead in the Enterprise
Source: Yankee Group’s 2011 US Enterprise Mobility: Employee Survey, Wave 2
In 2011, between 60 and 70 percent of tablets and smartphones in
the enterprise are bought on the consumer’s dime (see Exhibit 4).Today’s mobile professional tablet adoption is concentrated at
the top of the organization: Sixty-nine percent of tablets used forbusiness purposes are being used by managers and executives,according to our employee survey.Enterprise decision-makers more rapidly adopt new devices withproven business benefits. The percentage of employees withemployer-provided tablets is already nearly one-third of what wesee with smartphones. This impressive trend toward quick adoptionwill further drive the overall growth in the device category in theenterprise. Where the mix of corporate-liable to individually liabletablet purchases ultimately lands remains to be seen. One thing iscertain, however: The trend toward acceptance of consumerizationof the enterprise will continue and enterprises will have to geton top of this trend. From a traditional mobility managementperspective, companies will need to ensure individually liable tabletsare secured and aren’t leaking or compromising important data.