Vox Mobile can help your business vision through strategic consulting which defines your mobility blueprint and how our on-going support and services can enable complete enterprise mobility.
Vox Mobile and AirWatch collaborate with TELUS to launch Mobile Device Management Made Easy http://t.co/0fXSwL3hSH
1. Understand the scope of the organization’s mobile collaboration needs: The first step toward a strong mobile collaboration management strategy is to understand what people are doing with mobile collaboration tools and what kind of data is being shared. A key part of understanding the scope is to assess the risks involved, both from a monetary perspective and liability exposure point of view. Once these questions are answered, it’s possible to develop a solid business case that aligns IT initiatives with target business outcomes.
2. Implement controls: When the scope of the company’s mobile collaboration requirements is clear, the next step is to implement controls to protect data and other company assets. As the enterprise survey indicated, people are already using collaboration tools such as Dropbox, so the IT team will need to develop a solution to manage document access and protect enterprise data. An enterprise-level version of Dropbox or collaboration solution such as SharePoint can enable greater security and control.
3. Deploy collaboration apps: In the absence of a comprehensive mobile collaboration management strategy, it’s likely that employees are using a range of unauthorized apps on their local devices, and it’s impossible for IT to control what happens to documents that are accessed via the app. To get app use under control, companies can deploy collaboration apps via an app store, making sure they designate apps that meet all of the end users’ needs while enabling centralized control and integration with applicable enterprise systems to eliminate data silos and ensure access to current information.
4. Assess the mobile app environment: On an ongoing basis, IT professionals should evaluate the mobile app environment, determine what kind of apps are being used and identify business purposes. One company that evaluated its mobile app environment determined that about 20% of its employees were using document scanning apps, some of which stored data in the cloud. The company didn’t know which apps were being used, which meant they couldn’t be certain that their data was secure. A comprehensive mobile collaboration and app management solution dramatically reduced risks and restored control.
5. Collaborate with users: Enabling collaboration has to be a collaborative process in its own right, both at the outset of mobile collaboration management policy development and in the ongoing process of adjusting the policy to meet emerging needs. It’s important for the IT team to understand business requirements and develop a process by which employees can request approval to add new collaboration apps. It’s also critical for the IT team to have the toolset it needs to analyze apps and identify where data is stored.Mobile collaboration management is a process rather than a destination, and IT teams that want to address enterprise risk and enhance productivity must be prepared to engage for the long haul. The risks are real: Approximately 80% of app developers generate revenue by scraping data for third-party use. Sometimes the uses are completely benign, but there are unscrupulous players in the mix, and with an app that is used for business, it’s vitally important to know that sensitive information won’t fall into the wrong hands. By creating a mobile collaboration strategy that addresses the scale of company activities, uses sensible control solutions, empowers employees with authorized apps, continuously evaluates app usage and seeks user consensus, IT leaders can effectively manage mobile collaboration. Ongoing collaboration with all stakeholders in policy development and implementation is the key to enabling users to work efficiently with colleagues, clients and partners in the mobile age.
-- Watch our most recent Executive Roundtable: The 2014 MQ on MMS: An Executive Perspective - Watch Here --The 2014 Gartner MQ on MMS portrays a very different industry and market than the 2013 edition. Gartner estimates that the worldwide number of corporate-liable and individual-liable devices to be placed under management by ESPs will grow by more than 75% in 2014. Driving this rapid adoption is the fast commoditization of EMM software service prices, and the recognition that enterprises require third-party IT services to better manage their mobile estate. The criteria grew aggressively in 2014. According to Gartner, two of the seven inclusion and exclusion criteria include: Providers must have at least 400,000 smart mobile devices under management and providers must support at least 15% of their installed base outside their home geographies. Because of this, I am even more proud of our inclusion and placement with organizations like AT&T, IBM, Deutsche Telecom, DMI, Enterprise Mobile, Fujitsu, HP, Motorola Solutions, Orange, Tangoe, Telefonica, Vodafone, and Wipro. We believe that this extraordinary growth means that we will most likely see an even more diverse representation of providers in the 2015 version of the Gartner MQ. The challenge for Vox Mobile this year goes beyond simply being included and having a niche position in the 2014 Gartner MMS Magic Quadrant Report. We need to continue to be inventive and understand that we can leverage our legacy capabilities to meet the market's explosive growth, invest in talent and technology to extend our service catalog capabilities, and build-out partnerships that complement the requests for non-core mobility services. Only when we exceed expectations and deliver on our promise of Complete Enterprise Mobility, for our clients that are living 'Connected Lives', will we have distinguished ourselves in an industry positioned for unparalleled growth. It will happen fast in the coming months and we will have even more exciting news related to the Gartner MMS MQ and beyond. Stay tuned!
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Vox Mobile. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner Magic Quadrant for Managed Mobility Services, Eric Goodness, Gianluca Tramacere, Katja Ruud, 24 July 2014
The Court of Appeal in Cochran v. Schwan's Home Service stated:
"We hold that when employees must use their personal cellphones for work-related calls, Labor Code section 2802 requires the employer to reimburse them. Whether the employees have cellphone plans with unlimited minutes or limited minutes, the reimbursement owed is a reasonable percentage of their cellphone bills.” [Read the CIO article here]Despite my heavy consumption of Judge Judy and Law & Order (hotel room TBS), Vox’s legal counsel insisted I open with a disclaimer that I am in no way providing legal advice. K? That is out of the way… Here is how I view things: When I drive my car to work, I expect Vox to pay me for its use. Vox Mobile maintains a BYOD strategy and I expect them to pay me for using my device for business purposes. Conversely, they could always give me a car and a corporate phone (I’m open to discussing this car option further @KrisSnyder). What I feel happened here is that California told businesses to pay their employees a reasonable amount if they use their device for work. Not surprisingly, their mandate met with some resistance and it ended up in court. This isn’t complicated, I promise, but first I need to give you your new corporate BYOD plan. You’ve spent a year on it, but I can deliver it in 4 easy steps.
1) If you are using an MDM, employees have to agree to a full wipe of their personal device at any time.
2) Employees have to consent to the fact that their phone may be held for e-Discovery. This has not happened at your organization, ever, but if it does you will give them a “loaner” phone.
3) You will give them a stipend through payroll. If your finance team decides it is taxable, you will give them a higher amount to make up the difference. You will tier the amount: Voice Only, Data Only, Voice and Data.
4) Hourly Employees will not be given DataApply these rules and segment your user base. That’s it, your plan is complete! If you don’t want to take my advice, email me and I’ll come out and throw down all kinds of consulting for you and your CIO. Finally, buy Vox Choice, Now! [contact us] You’re undoubtedly skeptical so I’ll give you some reasons:
• When you try to run your BYOD stipend through T&E, you’re going to Fail. This strategy will add hundreds, or even thousands, of dollars’ worth of processing time, each month, to your program. Also, cost center managers and the finance team will begin cursing your name behind your back.
• You will invariably create a “simple form” for someone to sign and submit. I don’t have a lot of characters left so I will simply ask: Why did you stop doing that for laptops, licensing, pens, pencils and everything else you buy? (Answer: It doesn’t work).
• You will compile a really simple spreadsheet for finance, each month, detailing who to pay a stipend. EPIC Fail. I see so many organizations try this. So many problems: You are not informed when someone changes jobs and is no longer eligible. You forget who is allowed to have 1 connection, voice only, data only etc. and it turns into a management disaster. Some will even forget to check their MDM to see who is actually connected. Rita, that chic in marketing that always brings in doughnuts, will get paid every month for an iPad that hasn’t checked in on the MDM for over a year and a half!
• Time. This is simple. Your team has the time to do this. You already know that you don’t.This brings me back to Vox Choice. Vox Choice manages all of this for you, and more! It automates your corporate policy to prevent the request before it even starts. If the user is eligible, it routes for approval. Once approved, it will auto-provision into the MDM. Every month it checks who actually connected to the MDM and builds a payroll file. No longer eligible, no problem: it compiles a user feed every night. An employee exits? Boom – it wipes the device. “But I have a Hybrid environment!” No worries. Choice handles that too. Choice can accommodate split billing for features and rate plans. It slices, it dices and it can split hardware charges any way you can think of: upsize to bigger storage, ineligible replacement etc. In summary, California’s latest ruling on BYOD is not one of the 20,000 ways your everyday life could kill you. I over-simplified your plan, but you will inevitably fall into the traps I described if you choose to venture-forth alone. Implementing a BYOD strategy is a difficult journey and, without guidance, could fail miserably. However, once you have your strategy, Vox Choice can automate your regulatory adherence and compliance, including the details specified in this ruling.
1.) Outline a formal acceptable use policy. The first step organizations can take to reduce BYOD risks is to create an acceptable use policy, often referred to as a mobile policy. The policy should provide rules and protocols that govern BYOD deployment company-wide, setting standards for users. IT managers can take the lead by kicking off stakeholder discussions about BYOD rules now and into the future and designating a committee to promote and control mobile policy. It’s a good idea to require program participants to review the company’s mobile policy and acknowledge that they’ll abide by it via a signature.
2.) Identify users and create program participant segments. A crucial step in developing the organizational policy is to define BYOD users and identify various categories of program participants. This exercise gives the mobile policy committee the opportunity to think about any device type restrictions that may be needed, application restrictions and content issues. It also provides an opportunity for committee members to think through the financial implications of establishing a formal BYOD program, including user stipends or business expense rules applicable to employee devices.
3.) Select and deploy an enterprise mobility management platform. After the mobile policy is in place, committee members should assess their options and choose an enterprise mobility platform, keeping in mind their current technology and security needs and planning for future requirements. With technology evolving rapidly and employees choosing their own devices, it’s critical to think ahead and select a platform that can accommodate emerging technologies while keeping up with user demand and protecting corporate assets. The platform should feature strong network access controls.
4.) Plan to provide support for user-owned devices. Some company policy-makers mistakenly believe that BYOD means they no longer need to provide device support. This is a mistake that can lead to security breaches and decrease employee job satisfaction. Instead, companies should develop support protocols to manage all phases of BYOD, from device procurement and provisioning through decommissioning. By providing support and helping employees manage assets, technical professionals will gain valuable opportunities to ensure BYOD policies are followed, identify emerging vulnerabilities and help employees comply with safe practices.From an enterprise IT perspective, BYOD is one of the most significant workforce technology trends ever. That means it’s absolutely essential to manage it proactively. By establishing a formal acceptable use policy, identifying policy decision-makers and user groups, selecting a management platform and providing ongoing support, IT professionals can maximize the benefits of BYOD and minimize the risks.
- Best Practice: Short articles on best practices as gleaned from our consulting group, Vox Architect, and from our R&D teams working on various technologies.
- Webinar Abstracts: We produce a number of web events and recorded presentations, usually lasting between 30 and 60 minutes. The abstracts will give you a better sense of what is covered in the full event so you can decide whether it is the right resource for you.
- New Products: Overviews of new products that may be of interest to our clients, including hardware, systems, apps, and services
- Tutorials: Step-by-step instructions on technical or policy concerns that require some attention
- White paper Abstracts: We will provide some of the key take-aways and the most interesting info graphics from our research and reporting so you can find the right white papers more easily and so those with short attention spans can learn a few things
- Mobile Thought Leaders surveys and results: The Mobile Thought Leaders program (MTL) is helping hundreds of organizations fro around the globe to share their stories, insights and concerns about enterprise mobility. Throughout the year, MTL sponsors market and technology research projects. We will use the blog as one of the many places you can keep up with the opportunities to participate or access MTL research.
- Event recaps: Not everyone can attend all the industry events, like Mobile World Congress, AirWatch Connect, Gartner Symposium, to name a few. As our team members take part in these events, they will attempt to bring back some notes on the experience, the themes and the lessons learned.
As I said, the list of materials and information is extensive, but we see this kind of information sharing as a critical part of our mission:
We empower our clients to achieve their business vision through Complete Enterprise Mobility. [learn more]I look forward to sharing with you and welcome your thoughts and feedback.