You are on page 1of 14

CIO Strategies for

Consumerization:
The Future of
Enterprise Mobile
Computing

by Paul D’Arcy, Executive Director,


Large Enterprise Marketing

Dell CIO Insight Series


CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Series

The Inevitable equivalents. Today, the issue is Five Trends Shaping the
Consumerization of most pronounced with consumer Future of Enterprise Mobility
smartphones, media tablets, and
Employee Devices &
Internet applications which have
Applications been intentionally excluded by 2011 will see a perfect storm of
many company’s IT policies. consumerization as five trends
It’s been a generation since the first intersect to create an important
workers to grow up with personal With the cloud providing workplace inflection point:
computers at home entered the applications and computing
workforce. Twenty years ago, power to anyone with a credit Trend # 1: The rise of social media
this new generation of workers card, employees are increasingly as a business application
helped fuel the massive expansion bypassing IT altogether to get
the tools and technology that It’s hard to underestimate the
of business computer use and the impact of social media on not just
productivity gains that ensued. they desire without the hassle
of outdated IT processes. the workplace, but on society in
Unfortunately, employee self- general. By the beginning of 2011,
2011 will mark a similar milestone the average Facebook user spent
as the first new knowledge workers provisioning of third party cloud
services includes complex enterprise 1,400 minutes, or 23.3 hours, on the
raised with the Internet begin site each month.2 With more than
graduating from college and applications that may store sensitive
corporate data in the cloud. 500 million active users around the
entering the workforce. When world, U.S. Facebook users spend
these workers learned to read, the the equivalent of roughly 29% of
World Wide Web and email were For IT, the key issue is what we call
the “Consumerization Catch-22” their leisure time on the site.3
in a period of mass expansion and
commercialization. They were in which can be summarized along the The newsworthy growth of
elementary school when the dot- following lines: Corporate IT policies social media goes well beyond
com boom peaked, and in college that ban the use of employee- the meteoric rise of Facebook.
as social media and smartphone owned devices in the name of According to Nielson, “the world
usage exploded. security inadvertently create new now spends over 110 billion minutes
bigger security holes as users skirt IT on social networks and blog sites.
Already, the expectations of a new restrictions. In other words, locking This equates to 22% of all time
generation of workers are resetting down the employee computing online or one in every four and
the CIO agenda. As social media environment forces users to find half minutes. For the first time ever,
becomes a foundational component their own alternatives, undermining social network or blog sites are
of work life and corporate the very policies that IT is trying visited by three quarters of global
collaboration, as new mobile to enforce. Often, one of the first consumers who go online, after the
devices and application platforms offenders is a C-level executive numbers of people visiting these
proliferate, and as more employees who requires
work from home, traditional network access for
corporate policies on personal their own personal Corporate IT policies that
smartphone, PC, or
computer usage, data security,
tablet.
ban the use of employee-
and application usage are quickly
becoming antiquated. owned devices in the name of
This difficult
The result is the rapid situation is echoed security inadvertently create
consumerization of IT. We define by Gartner which
advises that, “most
new security holes.
consumerization as the migration of
consumer technology -- including organizations realize
electronic devices, platforms, and that they cannot stop the influx of sites increased by 24% over last
applications – into enterprise personal devices and are looking year. The average visitor spends 66%
computing environments as to the post-consumerization era, more time on these sites than a year
home technology becomes, in seeking ways to stop managing the ago.” 4
some instances – as capable and devices used by workers.“1
cost effective as its enterprise With the growth of social media, it’s
not just technology that is changing,

3
Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing

it’s people and society itself that are Trend # 2: The blurring of work the flow of corporate information
evolving alongside the new online and home and intellectual property beyond the
world. Few statistics demonstrate company’s walls. IT departments
this better than the fact that one- For CIOs, the blurring of work and need to develop policies to deliver
in-six U.S. couples who married in home environments complicates and secure sensitive date on both
the last three years met online.5 the development of employee IT-owned and employee-owned
Around the world, social media and technology policy. Flexible work devices.
new mobile devices are becoming arrangements that encourage
extensions of personal relationships employees to
in a way that makes it difficult work from home
to separate the technology from – or any location – Over the next year, 35%
make it difficult to
personal social networks.
control employee of employers plan to
It’s in this context that today’s technology usage. provide more flexible work
employees arrive at work
each day. They expect instant For employers in arrangements for employees.
communication and access to the United States,
the sorts of applications that help the adoption of
them be effective in their personal flexible work arrangements is rapidly Trend # 3: The emergence of new
life. For knowledge workers, accelerating. Over the next year, mobile devices
personal devices and consumer 35% of employers plan to provide
social networks are ideal tools for more flexible work arrangements Every decade, the world sees a new
building work relationships and for employees. In particular, 73% paradigm for end user computing.
conducting business. But at work, plan to implement flexible schedules So far, there have been distinct
56% of employers prohibit access and 41% plan to implement eras for mainframe computing,
to non-work related websites telecommuting options.7 As a result, minicomputers, personal
and 63% prohibit the storage of 43% of the American Workforce – computing, the desktop Internet,
personal data and files on company more than 63 million workers -- will and most recently, devices for
resources. As a result, a recent telecommute occasionally by 2016.8 mobile Internet access.
study reports that “Nearly half of all As knowledge workers increasingly With each era, there has been
iWorkers (46%) surveyed give their work from outside the office, it is exponential growth in the number
employers extremely low marks for difficult for corporations to control of devices in use at any one point in
the integration of consumer devices device usage, application usage, time: When there was a worldwide
and social networks with enterprise and most importantly, to monitor market for a million mainframes,
applications.” 6 the market for minicomputers was
closer to 10 million+ units, the early
New Computing Cycle Characteristics PC market was 100 million+ units,
Computing Growth Drivers Over Time, 1960 – 2020 and the desktop internet market is
1 billion+ units. In the next era --
1,000,000
Mobile/Gadget mobile Internet devices including
Internet smart phones, media tablets, and
100,000
internet-connected personal media
Devices/Users (MMin Log Scale)

Desktop
Internet
10,000 10,000? players – the number of new
1,000 1,000+
devices will far exceed the size
PC
of the total PC market. According
100
Minicomputer
100+ to Vinod Khosla, a prominent
10 10+
entrepreneur and investor, it is
Mainframe possible that ten years from now the
1 1+ full market for these devices could
be as high as 10 billion units (Fig. 1).9
1960 1970 1980 1990 2000 2010 2020
By next year, global smartphone
Figure 1. shipments – a subset of the mobile
Note: PC installed base reached 100MM in 1993, cellphone / Internet users reached 1B in 2002 / 2005 respectively;
Source: PC
Note: ITU, installed
Mark Lipacis,
baseMorgan Stanley100MM
reached Research. in 1993, cellphone / Internet users reached Internet device market – will exceed
1B in 2002 / 2005 respectively; Source: ITU, Mark Lipacis, Morgan Stanley Research.

4
CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Series

personal computer shipments for As the use of social media social networks. Some customers
the first time in history. Just a year and mobile devices explodes, even create Web sites or blogs to
later, in 2013, global smartphone it is changing the technology praise or punish brands.”14
shipments are expected to exceed relationship between employers
personal computer shipments by and employees. These same trends As more of the economy
more than 150 million units.10 also affect the relationship between shifts towards personal
businesses and their customers recommendations and social
With these changes, employees and public institutions and their media accelerates the impact of
are showing up to work with their constituents. personal recommendations on
personal devices with increasing almost every type of business,
frequency. A September 2010 With an explosion of mobile devices, companies will increasingly need
Gartner survey of 512 U.S.-based mobile ecommerce is expected to a new set of workforce skills. In
knowledge workers found that “33% grow to one quarter of ecommerce particular, companies will need
of respondents used their personal sales in the United States by next Internet savvy knowledge workers
devices while at work during the year.13 With the proliferation who can navigate the complex
past 30-days (of the date of the of mobile devices and mobile ecosystems of social media. As the
survey) to access social networking operating systems, businesses are control of corporate brands shifts
sites such as Facebook”.11 According challenged with developing new to online conversations outside of
to a separate study, “iWorkers report mobile applications and Internet corporate control, organizations
using an average of four consumer services to interact with their will increasingly value employees
devices and multiple third-party customers. who are influencers in their social
networks.
While mobile
“33% of respondents used their commerce is an It’s in this context that
personal devices while at work important trend
for businesses,
consumerization will become as
much of a business decision as
during the past 30-days (of the it pales in a technology decision. To attract
comparison to and retain the right employees
date of the survey) to access the impact that – and to make sure they thrive –
social networking sites such as social media is many organizations will need to
already having increase the types of devices and
Facebook”.11 on many applications that they support and
traditional pay for.
applications, such as social industries. According to McKinsey
& Company, “word of mouth is Trend # 5: Employee expectations
networking sites, in the course of of corporate IT are changing
their day.”12 the primary factor behind 20
to 50 percent of all purchasing With a new generation of
Today’s IT departments typically decisions. Its influence is greatest knowledge workers, end user
decide what devices and software when consumers are buying a technology is increasingly
to deploy on their environment. product for the first time or when becoming a talent recruitment and
This approach simplifies support, products are relatively expensive, retention issue. Companies that
image management, application factors that tend to make people invest in end user technology and
deployment, as well as device conduct more research, seek more implement innovative technology
maintenance, security, and opinions, and deliberate longer policy will see advantages as they
management. With the coming than they otherwise would. And look to recruit the new generation
proliferation of devices, applications, its influence will probably grow: of knowledge workers.
and operating systems, IT the digital revolution has amplified
departments will face tremendous and accelerated its reach to the According to a recent study, “a
challenges to deliver end user point where word of mouth is no majority of employees indicate
service and support. longer an act of intimate, one-on- that the technology tools provided
one communication. Today, it also to them and supported by their
Trend # 4: Shifting business operates on a one-to-many basis: organizations would be a critical or
models require tech savvy product reviews are posted online positive factor in taking a job with
employees and opinions disseminated through a new employer.”15 Unfortunately,

5
Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing

When the employee opens their user technology that limits many
companies’ ability to attract talent
new PC, they are even more and compete in the new business
area.
surprised to see that the new
This same gap also limits the ability
computer is running a locked of leadership to drive productivity
down version of an operating gains that can come from these
new technologies. According to
system that was first released McKinsey & Company, “the heart
of what knowledge workers do
when a 2011 college graduate on the job is collaborate, which
was 12 years old. in the broadest terms means they
interact to solve problems, serve
most new employees are shocked customers, engage with partners,
to find that their employers -- For most organizations,
consumerization quickly becomes a and nurture new ideas. Technology
while keen to innovate and eager and workflow processes support
to compete in this fast changing talent management issue – it’s a key
part of any strategy for workforce knowledge worker success and are
technology era – provide new increasingly sources of comparative
employees with little more than an enablement in the coming
entry-level PC. When the employee decade of
opens their new PC, they are even technological “a majority of employees
change. Today,
more surprised to see that the new
too many
indicate that the technology
computer is running a locked down
version of an operating system companies tools provided to them and
that was first released when a 2011 are driving for
college graduate was 12 years old. innovation in supported by their organizations
As These Trends Collide,
the market
but restricting
would be a critical or positive
Consumerization Becomes a internal factor in taking a job with a new
Business Decision technology
usage with employer.”
While all 5 of these trends are yet policy
to peak– social media as a business frameworks that are at best differentiation. Those able to use
application, the blurring of work and outdated, and at worst hindering new technologies to reshape how
home, new mobile devices, shifting the innovation that the business they work are finding significant
business models, and changing is seeking. It is this increasing gap productivity gains.”17
employee expectations of IT – they between business strategy and end
are already creating significant
pressure for change in most IT Moving from... ...to
organizations.
Limited connectivity Always on, anywhere
For the CIO, consumerization
represents the confluence of Email or IM
Freedom to participate
communications
a difficult set of IT challenges
(security, technology policy, data IT chooses the PC Devices that reflect “me”
protection, end user technology)
and business strategy (new business
Primary device is fixed Primary device is mobile
models, talent strategy, corporate
brand and identity). For this reason, Users want agility
Gartner has declared that “for CIO’s, IT has control
and freedom
ensure that consumerization of IT
is always factored into business One device, one task One device, many tasks
strategy development exercises.”16 Boundary-less security
Management and security
inside the firewall and manageability

6
CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Series

As companies embrace and policies to attract and retain owned smartphones, tablets,
consumerization, a number of employees? and PCs.
changes will need to occur:
• How strongly is your company • Consider “containerized” security
These changes, however, can be moving towards flexible working solutions which deploy secure
difficult to execute. For most CIO’s, arrangements?
many questions come to mind: How
do companies maintain security • Are business 77% of very large businesses
executives
and protect data as they loosen IT
advocating
said securing corporate data
standards? How will companies
support heterogeneous employee for expanded on mobile devices was their
devices? Does consumerization device usage
apply to all employees or only to or trying to most important mobile security
certain employee segments? What prevent it?
objective.18
will companies pay for that they • What
don’t pay for today? What happens regulations and security containers for applications and
to employee IT platforms? Which concerns limit your options? data onto mobile devices which
applications need to be modernized can be managed by IT.
to work with a broader set of • In your organization, how
employee devices? important are the Internet and • Consider desktop virtualization
social media to driving customer and remote application portals
CIO Roadmap: 9 Key engagement? to provide secure computing
Recommendations on environments on a wide variety
Recommendation # 2: Recognize of devices.
Consumerization & the New
that IT security and data
Era of Enterprise Mobility protection policies that restrict • Provide employee email access
the use of personal devices and on personal devices using
social media applications may technology that secures email
Recommendation # 1: Articulate data.
your company’s end user actually increase security and
workplace and technology data loss risk. Begin evolving • Manage data loss risk --- and
philosophy and use that as a security policies to protect device loss risk –- through
basis for setting consumerization data in a heterogeneous device clearly communicated employee
strategy. environment. policies and by using tools that
As the pressure for restrict the flow of sensitive
Technology philosophy, like information off of the network or
business strategy, is unique to consumerization continues to grow,
security capabilities will create to unsupported devices.
the culture and purpose of every
organization. When evaluating obstacles for organizations looking • Prioritize application
technology changes, there are to implement progressive end user architectures that store data
seven questions that can help you technology policy. According to a securely in the cloud or on
ascertain how far and how fast your Dell/TBR study, 77% of very large servers to allow secure access
organization can move to embrace businesses said securing corporate from employee-owned
the new era of consumerization: data on mobile devices was their devices, mitigating the need for
most important mobile security employees to store data locally.
• What are the demographics objective.18
or your user population and • As uncontrolled platforms,
what type of work do your user In the post-consumerization era of consumer devices – especially
segments do? heterogeneous devices, companies PCs – carry a significantly
increased risk of malware
• Where are your employees will need to re-architect security. As infection. Companies need to
doing their work? part of this evolution, companies develop policies that mitigate
should: the risk and potential damages
• Develop clear policies for from malware – especially
• Does your company take pride
business use of employee botnets – that may arise through
in offering innovative benefits

7
Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing

the use of employee-owned computers, smartphones, and allowed, accessing the corporate
devices for business purposes. tablets. Employees often skirt many directory.
restrictions on technology usage
• Extend guest networks to by forwarding email, using guest 3. Smartphones are expensive and
employees to allow on- networks, and by leveraging web- most organizations will not pay
premise use of personal mobile based file storage and transfer for smartphone voice and data
devices without compromising services. According to the Unysis plans for the broad employee
corporate networks. / IDC study, employees “report population. Since employees are
using an average of four consumer making these investments and
• IT should educate the business bringing the devices to work,
on the risk of breached policies devices and multiple third-party
applications, such as social expanded use can benefit end
– reinforcing compliance and user productivity.
fiduciary duties – to make the networking sites, in the
business aware of the broader course of their day.”20 As companies increase the business
issues related to the new Why start with smartphones? There use of smartphones, they will
technology era. are three reasons: need to implement solutions that
allow them to manage policies
As more applications move to the 1. No area of personal technology and security on a broader range of
cloud and more devices move off is growing as fast. According devices. In particular, companies
the network and out of IT’s direct to Ericsson, mobile broadband will need the capability to enforce
control, the framework for end subscriptions have skyrocketed: passwords and enable remote data
point security will also benefit from growing from 200 million mobile deletion for lost or stolen devices.
cloud-based delivery. Increasingly, Internet subscribers in 2008 to
this means using Managed Security 500 million mobile broadband Recommendation # 4: Launch
Service Providers to provide cloud- subscribers in mid-2010 and 1 enterprise applications that
based end-point protection for billion at the end of 2010. By replicate the best aspects of
distributed devices. According 2015, the company believes consumer communication and
to Gartner, “An increasingly that there will be more than social media within your worker
common scenario will be high- 3.8 billion mobile broadband community.
value employees accessing critical subscriptions globally.21
business and customer information In this era of consumerization,
stored in the cloud from employee- it’s important to recognize that
owned PCs or smartphones. Gartner end users want more than just
believes that delivering security liberalization of technology
as a cloud-based service will be restrictions. The heart of the
a key component of how many 4 billion consumerization is a human
enterprises will enable this scenario, desire -- end users want to work
while achieving a balance of 3 billion in the same way that they now live
security and manageability.”19 -- using the Internet to facilitate
relationships and communication.
2 billion
Recommendation # 3: Liberalize
rules that prohibit business use Consumer tools, although powerful
of employee-owned technology 1 billion and rapidly evolving, can’t fully close
in your environment, start by this expectation gap. This provides
encouraging the business use of an opportunity for organizations
0
employee-owned smart phones. to introduce corporate platforms
08

10

10

15

that replicate the best aspects of


20
20

20
20

id

of

In most organizations, start by successful consumer platforms.


M

d
En

allowing employees to do what they In particular, organizations need


already are secretly doing today. Figure 2. to complement email with rapid
communication options such as
While most organizations limit instant messaging and community
employee use of personal devices 2. Smartphones are important tools social applications such as
on the corporate network, for managing contacts, email, Salesforce.com’s Chatter. They
employees have always found ways calendar, social media, accessing need to build collaborative wiki-
to get work done on unsanctioned cloud data, and when

8
CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Series

like Intranets and deploy internal “The age where price dictates one options that meet corporate
portals that allow end users to computer per person has long past, security, manageability, and lifecycle
provide feedback, rate content, and tablets represent convenience planning needs.
and participate in community over necessity. It is also inevitable
discussions. that these units will find their way The stratification of end user
into enterprises. IT has shown that it computing into PCs for content
By harnessing the web’s innate is powerless to stop such incursions, creation and media tablets for
ability to crowd-source ideas and as adoption is often fueled by upper content consumption parallels
to collaboratively sort information management,
through, IT organizations can
harness the trends behind
and the tools By segmenting users based on
provided by the
consumerization while increase tablet vendor are information usage patterns,
employee engagement and extremely effective
productivity. at circumventing
organizations can closely align
Recommendation # 5: Pilot IT security and use match device strategy with
policies.”23
media tablets with field workers
and executives to see if they can
unique segments of their user
As IT organizations
replace other devices; look at consider piloting population.
allowing other populations to company-paid
bring personally owned tablets to and/or employee-owned tablets to the stratification of knowledge
work. the workplace, there are important workers. Today, there are three main
The media tablet market is poised considerations: categories of knowledge workers
to grow dramatically: expected to segmented by the way they work
• Users love media tablets, user with information:
go from 19 million units in 2010 to satisfaction is very high, support
208 million units in 2014.22 As a costs appear to be low. • Information Multiplexers
broad selection of new devices hit create, consume, and process
the market, tablet use is expected • Media tablets are great devices information. These users are
to skyrocket based on convenience, for the road and for quick most likely to stick with full
high levels of customer satisfaction, access to email, the Internet, featured client platforms due to
and relatively low device prices. calendaring, social media, rich functionality, demand for
mobile business applications processing power, and overall
The new generation of media from companies like Salesforce.
tablets will create tough decisions utility. These users often carry
com, and for access to corporate 2-3 devices.
for IT organizations. While the application portals and
market for such devices is booming virtualized desktops. • Information Consumers
and user satisfaction is very primarily read and review
high, the devices do not replace • Media tablets are not practical content – they do much of their
smartphones or PC’s for most users. for content creation. processing on mobile devices
So, while user demand is high, the such as a BlackBerry. For these
business case to add tablets is hard • Media tablets will replace many
vertically-owned users, media tablets are highly
tablet PC’s and attractive. This is one reason
“...by 2013, 80% of businesses specialty devices. why many executives are
attracted to media tablets.
will support a workforce using When this is the
case, the units will • Information Processors process
tablets.” be provided and information created by others
supported by IT. using cloud-based tools and
to justify for most organizations and • Media tablet theft rates are very applications typically accessed
users. high. through the browser. These
users can work with less
According to Gartner, “by 2013, Throughout 2011, device and richly configured clients. This
80% of businesses will support a platform choice will dramatically category includes executives
workforce using tablets.” Further, expand providing enterprises with and white collar workers who

9
Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing

use their mobile device as the • Companies will increasingly pay For most organizations, the hidden
key platform and then view/ for IT-owned laptops instead of costs will come from management
consume on client or tablet. Also desktops for knowledge workers. and security changes that will
includes call center sales and be required to support users
service professionals who use • For workers using vertical and protect the enterprise in a
browser-based tools to process PC tablet applications, heterogeneous device environment.
customer information. companies will provide media
tablets instead of PC tablets / Recommendation # 7: Consider
By segmenting users based on application-specific specialty desktop virtualization and other
information usage patterns, devices. new technologies to reduce
organizations can closely align security and data loss risks as
match device strategy with • For companies that provide the demand for consumerization
unique segments of their user company-paid mobile phones, grows.
population. Thus, as enterprise- these
phones will
ready media tablets come to market,
increasingly be
For most organizations, the
organizations should seed them to
key user populations – executives, smartphones hidden costs will come from
with company-
IT, and select field and sales workers
-- to evaluate their future potential. paid voice and management and security
Recommendation # 6: Develop a
data. changes that will be required to
clear point of view on company vs. • Companies will
save money
support users and protect the
employee cost sharing. Develop
a business case for incremental by eliminating enterprise in a heterogeneous
desk phones
investment by linking end user
for employees device environment.
technology strategy with human
resource planning, facilities with company-
planning, and business strategy. paid mobile phones. In a heterogeneous device
• In general, the third device environment that includes
For CIO’s, one of the biggest employee-owned devices, the
challenges of driving will always be paid for by the
employee. primary CIO concern is preventing
consumerization will be the data loss and ensuring security
development of the business • Some companies with high- across unmanaged devices.
case to justify incremental value knowledge workers
investments. While improving in competitive fields will Desktop virtualization will become
end user technology, enabling differentiate their workplace a primary model for organizations
new capabilities, and allowing by allowing three paid devices to securely drive consumerization.
employees to make better use of per employees (management By storing data and applications on
their own technology will improve consultants, executives, software the server in controlled standardized
productivity and help companies developers, etc.) images, desktop virtualization
move to next generation business combines the benefits of corporate
models, the immediate benefits are • Increasingly, tablets will become images, centralized storage,
“soft’’ and hard to measure. For most standard devices for customer- centralized management and policy
organizations, consumerization facing field roles including enforcement with the freedom to
will likely increase IT costs as sales, retail, and hospitality use a wide variety of company and
organizations increase their environments. employee provided devices.
investments in technology and
expand security, management, and • Some organizations will link Virtual desktops, as well as web-
support capabilities. technology changes to flexible based application portals, allow
working arrangements in users on a wide variety of devices
Who will pay for all of this new order to offset new technology – including smartphones and tablets
technology in the new post- investments with facility cost – to access corporate resources
consumerization era? CIO’s should reductions. efficiently and securely and to move
expect the following to occur: between devices. With the advent of

10
CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Series

client hosted hypervisors, the same agreements) will need to pay for technology choice creates improved
benefits can be extended to laptops licensing for the new devices. For user satisfaction. With a better user
and other mobile devices that need most organizations, IT will need to experience should come improved
to remain fully functional when consider three licensing scenarios employee morale, productivity, and
disconnected from the network. as part of their consumerization use of technology to meet business
efforts: requirements. Unfortunately, real
In addition to virtualization, some world pilots show that stipend
mobile applications may be • Rights to access email and other programs often fail to deliver on
better suited to more traditional server applications from the new these promises for the following
native or platform applications devices. reasons:
– especially those devices with
smaller screen sizes (5” or less). • Rights to run a server-based • Many employees are not able
In these cases, Mobile Enterprise operating system in a virtual to choose technology on their
Application Platforms (MEAP) allow desktop environment if used. own: they often pick equipment
IT departments to securely manage • Rights to access applications that is mobile and small but
access and deployment of corporate running on a server or in a underpowered for enterprise
applications, as well as enable “write hosted desktop environment (i.e. work.
once, deploy many” scenarios Office).
which support the variety of devices • It’s impossible for IT to provide
and carriers in the enterprise today. All of these scenarios typically great end user support to a
require additional licensing fees for population with an infinite
Recommendation # 8: Understand the new devices whether they are combination of devices. As a
the software licensing implications employee or company owned. As result, the support experience
of consumerization. organizations connect additional usually receives poor marks from
endpoints, especially net new both end users and the IT team.
As company-issued smartphones
and tablets are increasingly used endpoints like tablets, they need • It is difficult to tune applications
to access email, virtual desktops, to look closely at the licensing to work with an infinite variety of
and server-based applications, implications. For organizations that end user configurations causing
companies will need to look at are broadly adopting new devices, additional device compatibility
software licensing agreements and it may make sense to restructure and user satisfaction issues.
practices to ensure compliance. licensing agreements to be user-
The introduction of employee- oriented as opposed to device- In the end, pilots have shown
owned devices further complicates oriented. poor end user satisfaction with the
licensing as large vendors like stipend experience, negating the
Recommendation # 9: Avoid end primary benefit that these programs
Microsoft® make distinctions user stipends.
between categories of users in their were designed to achieve.
licensing agreements. Many organizations have piloted An alternative to stipends is to
user stipend programs where provide employees with a broader
In particular, organizations that employees are selection of IT-supported PC’s and
provided funds
The introduction of employee- to purchase the
work requirements. When combined
with policies that enable employees
owned devices further PC or computing to bring employee-owned devices
device of their
complicates licensing as choice. In the vast
to work, companies should be able
to reap the broad benefits of end
majority of pilots,
large vendors like Microsoft poor user and IT
user consumerization.

make distinctions between experiences have


led companies to
categories of users in their cancel plans for
licensing agreements. further stipend roll
outs.
have device-based licenses (the Stipend programs are designed
default under Microsoft enterprise around the assumption that user

11
Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing

Conclusions able to attract talent, execute help organizations streamline PC


new business models, and evolve management and security. With Dell
management capabilities to improve KACE, organizations can manage
Consumerization is but one key competitiveness. more devices with greatly reduced
element in an important change labor and capital investment.
that is happening today in the CIO Strategies for KACE Appliances make efficient
relationship between employees Consumerization: computer management and server
and employers. New technology How Dell Can Help management a reality by providing
and the expanding role of the a low cost alternative to computer
Internet are forever changing At Dell, we are uniquely prepared
management software using an
social relationships, management to help our customers embrace
appliance-based architecture.
philosophies, and business models and manage consumerization and
Simply plug the appliance into your
around the world. the challenges and risk that come
network, give it an IP address and
with consumerization-related
you are ready to begin managing
changes. With
IT consumerization and nearly 100,000
all your desktops, laptops and
servers. Unlike traditional computer
the rethinking of employee employees
worldwide, Dell
management software, KACE
Appliances typically deploy in one
technology is the foundation can help your
day.
company develop
for the next wave of business, strategies for the
Learn More ›
Dell.com/KACE
management, and employee next generation
of end user Managed Security Services with
change. computing Dell SecureWorks
and implement
In the words of Gary Hamel, a the changes needed to ensure In order to expand network
prominent management professor security and manageability in a access to new device categories
and author, “while no company heterogeneous device environment. and employee-owned devices,
would put up with a 1940s- companies need to review and
era phone system, or forgo the In particular, Dell can help modernize security for the network,
efficiency-enhancing benefits of companies of all sizes through the end points, and applications. In early
modern IT, that’s exactly what following services and solutions: 2011, Dell announced its intention
companies are doing when they to acquire SecureWorks, one of the
fail to exploit the Web’s potential Desktop Virtualization leading managed security service
to transform the way the work of Solutions & Services providers.
management is accomplished. Most Whether you need to secure SecureWorks provides managed
managers still see the Internet as employee data in a heterogeneous services and consulting to help
a productivity tool, or as a way of device environment, you want to companies manage security
delivering 24/7 customer service. enable employees to use their own threats. SecureWorks managed
Some understand its power to devices at work, or you just want to service offerings including Security
upend old business models. But centralize your data and ensure that Information Management, Log
few have faced up to the fact that your workforce benefits from a rich Monitoring, Intrusion Prevention
sooner or later, the Web is going to productivity environment, Dell can Systems, Counter Threat Unit
turn our smoke-stack management help companies design, pilot and Intelligence, Firewall Management,
model on its head.”24 implement desktop virtualization in and Web Application Scanning.
For companies with knowledge your organization. Learn More ›
workers, IT consumerization and the Learn More › Dell.com/SecureWorks
rethinking of employee technology Dell.com/virtualdesktops
Dell Software Inventory and Usage
is the foundation for the next wave Distributed PC & Device Management
of business, management, and Management with Dell KACE
employee change. Companies For IT organizations,
that adapt quickly and actively As consumerization drives large consumerization of IT creates
change the relationship between increases in the number of devices challenges for application
IT and end users will be better under management, Dell can
12
CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing Dell CIO Insight Series

compatibility and software Dell Smartphones and Tablets Microsoft Enterprise Agreement
licensing as the number and types Licensing
of devices expands. To embrace Dell’s full line of enterprise-ready
consumerization, companies need smartphones and tablets includes Dell’s Microsoft Enterprise
to understand application usage smartphones running Android Agreement and volume software
patterns and they need to have and Windows Mobile 7, 5” and 7” licensing expertise can help
clear picture of software licensing Android tablets, as well as tablets you choose the best software
compliance. The Dell Software and convertible PC tablets running heterogeneous device environment
Windows 7. under the most favorable licensing
Learn More › program. And our flexible
To embrace consumerization, Dell.com/ distribution options can help you
smartphones- configure and deploy software
companies need to understand tablets quickly and easily, from virtually
application usage patterns Dell Application
anywhere you do business.
Learn More ›
and they need to have clear Services Dell.com/microsoft-licensing
picture of software licensing Dell Services To learn more about Dell’s solutions
provides
compliance. consulting,
and services, and to schedule a
conversation to discuss how Dell
application can help enterprises embrace IT
Inventory & Usage Management development, Integration and consumerization, contact your
service automates asset discovery, testing services to help companies account representative or complete
helps monitor usage and simplifies modernize application architecture the form at Dell.com/talktoDell.
license compliance to help eliminate and take advantage of new
unused applications, track licensing mobile application platforms.
compliance, and profile application We help you assess your existing
usage across the organization. application portfolio and design
Learn More › the appropriate architecture to
Dell.com/usagemanagement enable IT optimization over the
long term. We also help you choose
Dell Enterprise-ready Notebooks & the appropriate development tools
Tablets and packaged applications to meet
Dell™ Mobile Computing solutions both current and future goals. Using
let your employees decide where our deep levels of experience in
and when to get their work done diverse development platforms,
— and they can use the device we work closely with your team to
of their choice. You can also use implement, develop, and deploy
Dell Mobile Computing solutions the best application solutions for
to satisfy the demands of the your organization. In the case of
new tech-savvy generation of enterprise applications, we help
employees who expect to use you implement and customize
their personal computing devices these at multiple locations. We
in the workplace. Dell services- help reduce risk prior to deploying
backed Mobile Computing solutions applications in a heterogeneous
accommodate workforce flexibility device environment by testing
and protect your mobile devices their conformance to requirements
and data without adding excessive through manual or automated
IT burden. So give your talented testing. We deliver services at a
workforce the freedom to be lower cost while reducing time-to-
productive and tap into their full market.
potential. Learn More ›
Learn More › Dell.com/applicationservices
Dell.com/mobility

13
Dell CIO Insight Series CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing

Footnotes
1. Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies
(G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.

2. Facebook (2011). Press Room Statistics. Retrieved January 18, 2011 from http://www.facebook.com/press/info.php?statistics

3. Bureau of Labor Statistics. (2009). American Time Use Survey. Retrieved January 18, 2011 from http://www.bls.gov/tus/charts/

4. Nielsonwire. (2010, June 15). Social Networks/Blogs Now Account for One in Every Four and a Half Minutes Online. Retrieved
January 18, 2011 from http://blog.nielsen.com/nielsenwire/global/social-media-accounts-for-22-percent-of-time-online/

5. Admin (Tom) (2010, April 30). Match.com Releases Study on Trends in Online Dating. Retrieved January 18, 2011 from http://www.
datingsitesreviews.com/article.php?story=Match-Releases-Study-Trends-Online-Datin

6. Unisys. (2010). Unisys Consumerization of IT Benchmark Study.

7. Sloan Center on Aging & Work at Boston College. Barriers to Workplace Flexibility. Retrieved on January 18, 2011 from http://
workplaceflexibility.bc.edu/Barriers

8. Forrester Research, Inc. (2009, March 11). Telecommuting Forecast, 2009 To 2016.

9. Khosla, V. (2010, November 16). Innovation vs Punditry Presentation 1 [Powerpoint slides]. Retrieved on January 18, 2011 from
http://www.web2summit.com/web2010/public/schedule/detail/15537

10. Morgan Stanley (2010). Internet Trends. Retrieved on January 18, 2011 from http://www.slideshare.net/CMSummit/ms-internet-
trends060710final

11. Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies
(G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.

12. Unisys. (2010). Unisys Consumerization of IT Benchmark Study.

13. Morgan Stanley (2010). Internet Trends. Retrieved on January 18, 2011 from http://www.slideshare.net/CMSummit/ms-internet-
trends060710final

14. Bughin, J., Doogan, J., & Vetvik, O. J. (2010, April). A new way to measure word-of-mouth marketing. McKinsey Quarterly.
Retrieved on January 18, 2011 from http://www.mckinseyquarterly.com/A_new_way_to_measure_word-of-mouth_marketing_2567

15. Unisys. (2010). Unisys Consumerization of IT Benchmark Study.

16. Gartner. (2010, February 10). Findings: In January 2010, the Consumerization of IT Became a Business Strategy Issue (G00174465).
Raskino, M.

17. Manyika, J., Sprague, K., & Yee, L. (2009, October 27). Using technology to improve workforce collaboration. McKinsey &
Company’s What Matters. Retrieved on January 18, 2011 from http://whatmatters.mckinseydigital.com/internet/using-technology-
to-improve-workforce-collaboration

18. Dell. (2010, November). Mobile Device Management and Security. Technology Business Research, Inc.

19. Gartner. (2010, September 2). Securing and Managing Private and Public Cloud Computing (G00206019). Pescatore, J.

20. Unisys. (2010). Unisys Consumerization of IT Benchmark Study.

21. Johnson, S. (2011, January 11). Mobile broadband users seen hitting 1 billion in 2011. Reuters. Retrieved on January 18, 2011 from
http://www.reuters.com/article/idUSTRE70A2JS20110111

22. Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies
(G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.

23. Gartner. (2010, November 18). Predicts 2011: Network Capacity and Consumers Impact Mobile and Wireless Technologies
(G00208871). Dulaney, K., Redman, P., Milanesi, C., Baker, V. L., Basso, M., & Fiering, L.

24. Hamel, G. (2007). The Future of Management. Boston, MA: Harvard Business School Press.

Microsoft, Encarta, MSN, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or
other countries.

14

You might also like