The 3 Most Commonly Missed Opportunities in EMM, and What To Do About Them



Enterprise mobility is a fast-moving, constantly shifting space, and decision-makers are looking to address a range of needs all at once. Among them: security, flexibility, scalability, extensibility, integration, and simplicity. As a recent IDC report puts it:

“Many [organizations] struggle with how to mobilize in a way that is coordinated, secure, scalable, efficient, and user-friendly, and that addresses an often extraordinarily diverse set of management scenarios.”

Buying teams are large, and internal stakeholders often have competing priorities. The Request for Quotation (RFQ) documents they send to shortlisted vendors may include 300-500 questions – and decision-makers then have to review multiple responses.

As a result, organizations may miss opportunities that are screaming for attention. Here are three of the most important ones.

1. Creating multiple opportunities for consolidation.

As consumerization took hold in IT, and the MDM space evolved to accommodate it, enterprises found themselves adopting and managing a number of point solutions.

Many still are.

Marco Gocht, CEO of the mobility innovation leader ISEC7, says that the enterprise customers his company works with today have, on average, more than three MDM solutions in place already: “They often have BlackBerry Enterprise Servers, another solution to manage software or app deployments, and then a third-party MDM solution to manage their iOS devices. Now, they’re looking to consolidate all of this into one platform to cut operating costs and lighten the administrative burden on IT and support staff,” he explains.

Bolting together point solutions to make device security acceptable greatly increases complexity, which – in turn – drives up costs. Integrated end-to-end enterprise security has been proven to provide the lowest cost of ownership.

This is just one reason smart businesses are looking to consolidate their EMM infrastructure wherever possible.

2. Ensuring that EMM security enables the business.

Every week there’s another data breach and another brand struggling to minimize the damage. For CIOs, those nagging questions keep resurfacing: Have we done everything we can? Where’s the weak link in our chain? What’s the worst that could happen – and will it?

Conversely, business leaders are focused on business enablement, productive user experiences, ROI, and TCO (total cost of ownership). They tend to think of mobile security as a barrier, imagining increased password requirements and blocked access to critical information.

But with the right EMM solution in place, security can actually facilitate these goals. Enterprises today should be looking for every opportunity to leverage security to enable and deliver on key business drivers.

Take containerization, for example. Many mobile work spaces lack tamper resistance, seriously hamper the user experience, or include controls that impact the enterprise application environment, impeding features, adding costs, and increasing complexity.

Forward-thinking enterprises insist on highly productive mobile work spaces, across platforms, which include securely integrated work productivity tools and apps:

  • Secure enterprise email and PIM.
  • A secure web and intranet browser.
  • A secure and transparent enterprise application environment (with no source code changes required).
  • Secure document viewing and editing.
  • Secure file management, secure shared drive access, and more.

All of these capabilities should be delivered with transparent security that optimizes, not hinders, employee productivity.

3. Choosing a solution that delivers flexibility in several key areas.

Enterprise mobility is liquid, constantly moving and changing. Businesses must contend with peaks and valleys in human resource requirements, not to mention new app requirements, new devices, operating system updates, and more.

Device ownership is a prime example (among many) of how important flexibility is in EMM.

As a recent Ovum report puts it: “There is no one-size-fits-all policy that suits all organizations – or even all roles within a particular organization…. The majority of firms [will] adopt a mix of BYOD, CYOD, COPE, and COBO strategies, applying different rules to different teams and employees depending on their particular requirements, security profile, risk profile, and the kind of apps and the type of data that they need access to. Having an EMM solution capable of supporting all scenarios simultaneously would therefore be advantageous to organizations implementing mixed corporate and personally owned device deployments.”

Smart enterprises are prioritizing EMM solutions that give them flexibility in the following areas, among others:

  • Security: Does the solution offer enough control to account for the multiple profiles in your organization?
  • Deployment: Does the solution offer you cloud, on-premises, and hybrid models?
  • Architecture: Are scalability benchmarks published, and do they meet your requirements?
  • Support: Is it customizable to suit your specific needs through the solutions lifecycle, from planning, to migration, to day-to-day issue resolution and beyond?

About Luke Reimer

@Luke_Reimer is a Senior Marketing Manager at BlackBerry helping to design, launch, and manage enterprise marketing programs - particularly concerning content across digital mediums. Beyond spreading BlackBerry goodness in enterprise communities, you can find Luke cooking up a storm, out on his motorcycle (when Canadian weather allows), or digging into a good science fiction book.

Join the conversation

Show comments Hide comments
+ -
blog comments powered by Disqus