Professional Documents
Culture Documents
by Lawrence Miller,
Kevin Strohmeyer, and
Mark Margevicius
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Digital Workspace For Dummies®, VMware 2nd Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2019 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written
permission of the Publisher. Requests to the Publisher for permission should be addressed to the
Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011,
fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making
Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons,
Inc. and/or its affiliates in the United States and other countries, and may not be used without written
permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is
not associated with any product or vendor mentioned in this book.
10 9 8 7 6 5 4 3 2 1
For general information on our other products and services, or how to create a custom For Dummies book
for your business or organization, please contact our Business Development Department in the U.S. at
877-409-4177, contact info@dummies.biz, or visit www.wiley.com/go/custompub. For information about
licensing the For Dummies brand for products or services, contact BrandedRights&Licenses@Wiley.com.
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
Development Editor: Elizabeth Kuball Business Development
Representative: Karen Hattan
Copy Editor: Elizabeth Kuball
Production Editor: Magesh Elangovan
Acquisitions Editor: Katie Mohr
Editorial Manager: Rev Mengle
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 1
Foolish Assumptions............................................................................. 2
Icons Used in This Book........................................................................ 2
Beyond the Book................................................................................... 3
Where to Go from Here........................................................................ 3
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 5: Unifying Device Management.......................................... 25
Shifting to Modern Management...................................................... 25
Changing Endpoint and User Security Strategies............................ 27
Recognizing the Benefits of Modern Management........................ 28
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
T
he digital workspace is transforming entire industries,
enabling new ways for businesses to connect to employees
and information. Now, the digital workspace is evolving
further to take advantage of machine learning and other advanced
technologies, to effectively secure information, handle increas-
ingly sophisticated threats, and leverage next-generation pro-
ductivity tools.
Introduction 1
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Foolish Assumptions
It’s been said that most assumptions have outlived their useless-
ness, but we assume a few things nonetheless!
This icon points out information you should commit to your gray
matter — along with anniversaries and birthdays!
These alerts point out the stuff your mother warned you about
(well, probably not), but they do offer practical advice.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Beyond the Book
There’s only so much we can cover in 48 short pages, so if you
find yourself at the end of this book, thinking, “Where can I learn
more?,” just go to www.vmware.com/digitalworkspace.
Introduction 3
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Looking at current trends
Chapter 1
Recognizing the Drivers
of the Digital Workspace
I
n this chapter, you get started by learning about some important
trends driving the digital workspace, the business benefits of the
digital workspace, and the key requirements that every organiza-
tion must address to successfully implement the digital workspace.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
creating new business models across entire industries.
Employee engagement is the key to successful adoption,
and the digital workspace is the employee interface and
tool for many of these digital transformation initiatives.
»» Heterogeneous computing environments: Today’s
computing environment is a mix of systems and applications
deployed on-premises, in enterprise data centers, and in the
cloud. Employees access these applications, systems, and
data on a variety of devices (including PCs, laptops, tablets,
and smartphones) running different operating systems
(including Windows, Mac, Linux, iOS, and Android).
»» Growth of Software as a Service (SaaS) apps and mobility:
SaaS and mobile applications are everywhere. Users love
them because they’re easy to use, they’re convenient, and
they can be accessed from anywhere.
»» Disappearing network perimeters: As cloud and mobile
trends have grown, traditional network perimeters have all
but disappeared. Users access applications and data from
anywhere, on any device, and at any time.
»» Desire for self-service and choice: Users today not only
want self-service delivery of applications based on their
personal preferences — they expect it. Organizations must
increasingly adapt to this new user-driven model to maxi-
mize productivity and employee engagement.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
many IT management operations to enable more simplified
and efficient management of devices and platforms.
»» Enabling application portability and “bring your own
device” (BYOD) environments: The digital workspace
enables applications to be delivered when and where
they’re needed, on any device.
»» Improving security and compliance everywhere:
Information security and regulatory compliance are top
priorities for every modern business today. The digital
workspace enhances security and compliance with greater
control and visibility of the digital workspace — without
overly burdening your employees.
»» Empowering employees on day one: Using modern
applications and devices that are familiar to users ensures
they can be productive on their first day. This is particularly
true of millennial and Gen Z workers who were practically
born with mobile devices in their hands!
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
also 12-year-old Windows apps, internally developed Java-based
apps that no longer have internal owners, and old spreadsheets
with macros that don’t work in more recent versions of
Microsoft Excel. It also means web apps delivered internally
through complex and ever-changing virtual private network
(VPN) tools, or SaaS apps accessible from anywhere, but with
passwords no one can remember.
»» Embracing modern management: Modern management is
based on the now-universal trend that modern operating
systems need to be updated on demand, anywhere, from the
cloud, in an effort to manage billions of devices at scale and
ensure application compatibility for developers. To allow
enterprise organizations to effectively manage the experience
and security policies of devices, modern management applica-
tion programming interfaces (APIs), that potentially expose
hundreds of policy options and context data for each operating
system, have been exposed through mobile device manage-
ment (MDM) tools. Modern management has been extended to
every modern device operating system: Windows, Mac, Chrome,
Android, iOS, and various flavors of embedded Linux.
»» Managing through insights: IT can’t proactively drive
successful experiences if they can’t measure the adoption
of those experiences. However, IT has never been in an
ideal position to track the adoption and usage of applications
across devices. Sure, you can run reports and try to look back
through historical data, but these tend to be one-off efforts
that look at the past with a hit-or-miss approach based on
what information is available across disparate platforms. True
insights from data are gained from the ability to spot patterns
and trends, identify potential gaps in experience or security,
and make recommendations for change.
»» Automating everything: To handle the scale of a digital
workspace, automation is critical, whether onboarding a
new employee or device, deploying apps, installing patches
and updates, or automating remediation steps to ensure an
employee’s device is compliant with policy. These tasks
must all be achieved without generating tickets that require
administrators or application owners to take manual actions.
In this way, operational costs are minimized, and gaps are
eliminated, for example, due to human error in the applica-
tion of inconsistent security policies, or devices left in non-
compliant states due to the inability to resolve an issue in a
timely manner.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Knowing where you are and where you’re
going
»» Embracing challenges
Chapter 2
Creating a Digital
Workspace Strategy
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
endpoints and devices are being used and are supported by the
organization.
Prioritizing Goals
Planning the digital workspace is a collaborative effort among
business leaders, stakeholders, and end users. An effective strat-
egy is a “design in progress” that is always changing to reflect
new business drivers, technological advances, and, most impor-
tant, end-user dynamics.
When planning the digital workspace, aligning with the goals and
objectives of your business is crucial. Not only does this approach
take the goals of the entire organization into account, but it also
serves as the basis for measuring success. Business and IT leaders
must work together to prioritize goals and establish performance
metrics.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Building Consensus
Building consensus with key stakeholders throughout the proj-
ect is another key to success. Stakeholders include representa-
tive cross-functional business leaders; IT systems, applications,
desktop, and user support teams; and, most important, end users.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
It may be necessary to plan and implement each of the different
platform components (discussed in the previous section) as indi-
vidual projects. In some cases, there will be project dependencies
(for example, identity and access management is an important
foundation for each of the other platform components) that must
be addressed.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Delivering identity and access
management transformation
Chapter 3
Simplifying Identity
Management
I
n this chapter, we describe identity and access management
(IAM) deployment scenarios, how existing solutions provide
value, and how simplified access management can deliver the
user experience that organizations aspire to and that their
employees increasingly expect.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
To support this environment, most organizations have embraced
a multi-modal style of end-user computing that enables any user
to potentially work with any application, any devices, and any
infrastructure. Although this approach is beneficial in terms of
productivity and user engagement, it introduces other challenges
including gaps in employee experience, complexity in access pro-
cedures, and exposure to new risks and issues.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
different types of devices, with many applications still residing
outside of any IAM system. For the user, this means multiple sets
of credentials are required to access the applications they need.
Complexity, support issues, frustration (“Which username and
password do I use?”) and lost productivity are the result.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 3-1: Conditional access.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
prohibited. Some organizations find that having the ability to
apply management policy based on scenarios and context
offers more granular control, better reliability, and increased
protection of IT applications and data.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Indirect cost savings: Other indirect cost savings resulting
from simplified access management adoption include
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Living in a self-service world
Chapter 4
Building a Self-Service
Application Delivery
Model
W
e’ve all grown accustomed to self-service today: We
pump our own gas, skip the bank tellers with ATMs,
book our own flight and hotel reservations, and scan
and bag our own groceries. With YouTube videos available on how
to fix practically anything, many of us even venture into minor
home improvement projects (sometimes with mixed results!).
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Empowering users with self-service access to applications is an
increasingly important component of a fully integrated employee
and/or customer experience. Self-service enables organizations
to focus on higher-value human-to-human interactions that
increase productivity and efficiency, improve user experiences,
and create business agility.
By and large, users are savvy in the use of technology and have
few qualms when it comes to being their own IT providers. They
inherently know their own requirements, devices, and application
sources (such as app stores, websites, and portals). Plus, if they
lack information, they know how to research and find the solu-
tions they need.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Several key factors have contributed to the rise of self-service
applications delivery, including the following:
»» The world has gone mobile. Over the past few years, we’ve
reached a mobile tipping point. Thanks to the rollout of 4G,
Wi-Fi, and inexpensive devices, smartphones have over-
taken PCs as the most popular way to browse the Internet.
Smartphone users look at their devices somewhere between
150 and 200 times a day, according to Forrester Research, and
mobile phones are now the de facto communications method
for most people. For many workers (especially millennials) the
preferred device is a smartphone rather than a PC.
»» There are fewer resources and touchpoints to manage.
Despite best intentions, hierarchical organizational structures
designed to help users and provide customer service often
fail. Good help that can quickly and easily provide answers
and value is hard to find. Building processes so that users
can acquire applications themselves dramatically reduces the
number of touchpoints (and subsequent possible points of
failure) and reduces the time to productivity, while also
reducing the number of people needed to deliver applications
to users.
»» Self-service shifts much of the mundane administrative
work from centralized IT to the user. Online self-service
application delivery means that most of the application
delivery process is completed by users — the ones who
already know their requirements. They do the work of
finding the applications they need, selecting how and where
the applications get delivered, and configuring key applica-
tion information. The need to hire or manage IT staff for
these tasks is significantly reduced, if not eliminated
altogether.
»» Processes are streamlined. Along the same lines of
resource allocation is the benefit of automation — that
wonderful invention for handling repetitive tasks so people
don’t have to. Self-service applications allow users to
circumvent arduous and complex application delivery
structures that are often flawed and frail. For example,
the traditional way to deliver a Windows application often
requires a multistep process involving emails, authorization
approvals, written justifications, licensing acquisitions,
procurement approvals, and so on. In some organizations,
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
this process can take weeks and, in some extreme cases,
several months to complete. Streamlining processes
associated with self-service application delivery is less
expensive to support, improves user perception, helps
eliminate phone tag, and is often simpler and more viable
than traditional methods.
»» There is 24-hour availability. By embracing self-service
application access and delivery, users can initiate access at
their convenience. With self-service access, they’re free to
access their applications on weekends, in the wee hours of
the morning, after work on the commuter train, or at any
other time.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Provisioning self-service application access is a great way to allow
users to self-discover applications and allow the business units to
approve access to those applications. You can also allow the busi-
ness units to manage the credentials assigned to those users for
unified access through single sign-on (SSO).
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
There’s no “one-size-fits-all” approach to self-service appli-
cation delivery. Every organization’s readiness, willingness,
and aversion to risk varies. However, the benefits of self-service
application delivery far outweigh most disadvantages and can be a
catalyst for change: offering self-service applications often forces
organizations to optimize application delivery (and management)
processes. Perhaps the greatest advantage is that automation and
self-service make operations a shared responsibility between
users and IT, which reduces costs and increases customer satis-
faction. Customers are not just ready for self-service applications;
they prefer it to other forms of application delivery.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Leveraging Windows 10 and modern
management
Chapter 5
Unifying Device
Management
T
he way organizations provision, manage, and secure end-
user computing (EUC) devices is changing under modern
management as the next generation of operating systems
are deployed on new PCs, Macs, and mobile devices. In this
chapter, you learn how modern management unifies device
management and benefits organizations.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
As the complexity of devices and applications has grown, so too
have operational costs. In best-practice organizations today, PC
operational costs are usually at least four times more than capital
costs, and the user-to-IT staff ratio is typically 250:1. Thus, it
often takes hours — and often days — to provision devices or
update them when users change roles.
Today, the way that EUC is delivered and experienced is all about
the employee experience. The emergence of modern manage-
ment, as well as the availability of low-cost devices, pervasive
online access to new applications, and tech-savvy user expecta-
tions of self-sufficiency are driving this new focus.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Windows 10 is a transformational opportunity for IT and busi-
ness. It’s not just a new version of Windows. Instead, it’s a next-
generation platform explicitly designed to manage and secure
using modern management techniques. This progressive make-
over allows IT organizations to bring together mobile device and
Windows PC management under a single management pane.
Organizations that have taken the modern management approach
are seeing positive outcomes for IT and the businesses they serve.
According to Forrester Research, the typical cost savings can be as
high as 75 percent when leveraging modern management.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Granular levels of security controls are applied via context
and per-app VPNs.
»» Device validation and identification are performed indepen-
dent of ownership.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Significantly lower management costs and overhead
»» Real-time support for off-network and off-domain devices
Modern management can also help organizations reduce both
direct and indirect costs normally associated with PC manage-
ment. Most organizations spend $718 per user per year on ongo-
ing management using PCLM, which is an unappreciated expense
that is continually scrutinized. Modern management offers sig-
nificant cost reductions, as high as 62 percent, spread across
operating expenditures (OpEx) and capital expenditures (CapEx),
as shown in Figure 5-1.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Indirect benefits of modern management include the following:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Centralizing application delivery
Chapter 6
Transforming Windows
Application Delivery
I
n this chapter, you get an overview of different delivery meth-
ods (we’re not talking about couriers and drones here!) for
Windows applications, learn the pros and cons of each, and
examine common scenarios for their use.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
applications are business-critical and offer no easy route to
replacement with a more device-independent application type —
such as web-based, Software as a Service (SaaS), or modern
native applications. Making these applications available from
unknown or untrusted devices and from a range of OSs is a func-
tional necessity. As the lines continue to blur between corporate-
owned and personally owned devices and between work offices
and home offices, today’s mobile and global workforce requires
and expects access to Windows applications anywhere, at any
time, and through any device.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
data center has happened for very good reasons, including the
following:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 6-1: VDI architecture.
Both VDI and RDS are used by organizations for application deliv-
ery. VDI is most commonly used for those users that require the
full fidelity of Windows, so that users can install, configure, and
use their desktop just as they would a normal PC. RDS is common
for applications that are targeted to many simultaneous users (for
example, those working in a call center). It is not uncommon for
organizations to use both VDI and RDS, depending on user needs
and application requirements.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Virtualization has enabled IT administrators to deliver a more con-
sistent and seamless desktop application experience to the rapidly
expanding population of employees who use multiple devices for
their work. Users can access the same desktop instance or appli-
cation from each new session, as well as securely access corporate
data and applications anytime and anywhere, through a single set
of policies and log-in credentials. All of this takes place regardless
of the device type, operating system, or location of the user.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Windows-based applications can now be made available and
delivered to users in a number of ways:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Looking at the exponential growth of
mobile
Chapter 7
Building a Mobile-First
Application Framework
I
n this chapter, we describe the attributes of a mobile-first
strategy, why it’s important to understand, and the impact it
can have on your organization.
»» More than five billion people are now using mobile phones,
and there are nearly one billion more smartphones in use
than PCs. That’s pretty amazing considering the total world
population is 7.5 billion!
»» Sixty-two percent of mobile users access the Internet with
their mobile device and 50 percent of e-commerce traffic
comes from mobile devices.
»» More than 60 percent of digital content is consumed on a
mobile device.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Plus, mobile use within the organization has changed how, where,
and what employees are doing:
Mobile apps do just one or a few things well and can be used in the
moment — when it’s convenient for the user.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
and data in ways that are unconstrained by network, device, or
location. The resulting flexibilities have quickly become expec-
tations in many environments, with users now demanding an
“anywhere, anytime, any device” approach to work.
Mobile first does not mean “mobile only.” It’s important to rec-
ognize that a mobile-first approach does not eliminate the need
for other application platforms (for example, Windows or web).
The ongoing delivery of applications on those platforms will likely
persist for many more years.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Many organizations have now established a posture in which
mobile first is not just a method for keeping mobile web brows-
ers satisfied, but an overall strategy for their business. The use
of mobile apps is often preferred by employees because mobile
apps are so quick to use, making work processes and functions
instantly available. Mobile apps can be easily optimized for spe-
cific tasks, enabling work to be done faster than with a Windows
application or website. Most mobile apps are also easily updated
and available offline. In the (increasingly rare) scenario that
devices do not have network connections, users can still perform
certain tasks in a disconnected state.
Being mobile first means designing products and services for the
most limited computing devices first. For most organizations,
the most limited device would be a mobile phone. Development
then continues to deliver versions of those applications for larger
and more advanced devices with larger screens and more com-
puting power — tablets, laptops, and desktops, respectively —
that incorporate additional functionality. With the core functions
present from the beginning in the most stripped-down mobile
devices they were originally designed for, there’s no loss of the
most crucial functionality.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Look mom, no hands (well, one hand): Nearly 50 percent
of users use their phones with one hand. For app designers,
keeping the most used functions easily accessible via one
hand provides significant ergonomic benefits to the user.
Keeping navigation options within thumbs’ reach is key.
»» Intuitiveness: Many mobile app developers abide by the
mantra of “one screen, one task” in their design. Each page
within the app should have a discretely defined function that
is easy to learn, use, and expand for subsequent versions.
»» Crisp and clear presentation: For mobile apps, less is
more. Overloading users with too much information or
details is a deterrent to use, regardless of the value of the
data. Good apps allow for white spaces to exist between
various elements on a page. Clarity of message is a top
priority.
»» Keeping it snappy: Mobile users are often impatient with
their devices. Having apps that are fast and responsive
greatly enhances their chances of adoption. Developers can
do this by pre-executing tasks as background tasks.
»» Leveraging context: Users find great value in apps that
apply context (specific scenarios that consider location, day,
time, and other specific characteristics that are currently
present). For example, the use of location services as part of
an in-app experience creates app stickiness. Knowing the
location of the nearest ATM, parking lot, or restaurant as
part of a retail or shopping apps provides additional value to
the user.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Driving employee engagement,
productivity, recruiting, and retention
Chapter 8
Ten Benefits of a Digital
Workspace
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Support rapid changes in business such as growth, new
facilities, mergers and acquisitions, and so on.
»» Deliver new mobile workflows that enhance productivity
with anywhere, anytime, any device access.
»» Improve customer experience through more informed
employee interactions.
»» Enable visibility and insights over applications and
devices, on or off the corporate network.
»» Embrace risk while improving IT and security operations
to reduce internal and external security threats.
»» Eliminate manual and mundane management tasks by
reducing the cost and complexity of multiple tools.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.