Showing posts with label mam. Show all posts
Showing posts with label mam. Show all posts

Mobile Expert Interviews: Apperian's CEO Brian Day

The enterprise mobility marketplace is changing rapidly as companies consolidate and transform.  While some enterprise mobility vendors disappear and leave the market, Apperian continues to grow and take on additional investment.  This week they announced a C level round of investment for $12 million.  I wanted to learn more about their strategies and why VCs continue to bet on them.  Enjoy!

Video link: https://youtu.be/0CBf-qwnbVc


************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
The Center for the Future of Work, Cognizant
View my profile on LinkedIn
Read more at Future of Work
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Mobile Expert Interviews: Apperian's Cimarron Buser

Land Rush
I was honored to be able to attend and speak at a mobile security conference this week in beautiful and sunny San Francisco (I wrote about it here). While attending I had the privilege of meeting and interviewing Apperian's SVP of Global Business Development, Cimarron Buser.  Cimarron's parents named him after the novel of the same name, written by Edna Ferber and published in 1929, about the Oklahoma land rushes of 1889 and 1893.  In this story ambitious settlers attempted to race ahead of their competition and stake claims to newly available territories, much like the way startups attempt to capture newly discovered markets in Silicon Valley.  How is that for a world class segue?

Apperian is a MAM (mobile application management) solution provider that focuses on managing mobile application lifecycles.  In this interview we discuss how their solutions work with and compliment other categories of mobile solutions including MDM and EMM.

Video Link: http://youtu.be/5RjYapkJpdE?list=UUGizQCw2Zbs3eTLwp7icoqw



Are you attending Cognizant's Community conference at the Ritz-Carlton Orlando on October 19-22nd in Orlando,  http://www.cognizant.com/community/home.aspx where the following subjects will be the focus of a stellar group of analyst, business leaders and futurists.  Here are some of the session descriptions:

Delivering Hyper-Personalization: Adding the Next Layer of Engagement with Social, Mobile and Sensors
Get equipped to evaluate, implement or enhance mobile hyper-personalization technologies and strategies that deliver superior experiences to customers, a smarter workplace for employees and a collaborative environment for partners.

Generating Value from Signal: A Working Session on the Economics of Meaning Making
Find out how a richer understanding of customers, products, employees and partners is reshaping business processes and changing the nature of competition from Paul Roehrig, managing director of Cognizant’s Center for the Future of Work.

Putting the Experience in “Digital Customer Experience”
Hear the latest research about how companies are working to deeply engage and delight customers by reshaping business processes and adding value to their services from Ben Pring, co-director of Cognizant’s Center for the Future of Work.

A Day in the Digital Life
Experience firsthand the power of the Internet of Things, Google Glass, digital marketing and more in this immersive guided tour that brings to life how digital technology and data are transforming daily interactions at home and work as well as entire industries.

************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Mobile App Security, Vulnerabilities and App Development

I had the privilege of attending a mobile security event this week and speaking with many experts on the matter.  I am not a mobile security expert, so my role was to speak on mobile strategies and trends and to learn as much as I could.

What did I learn?  I learned the difference between a mobile security containers and mobile app wrapping.  I confess prior confusion in the matter.  Mobile app wrapping is a process of securing an existing app, by injecting code into and around the app that secures it and provides monitoring analytics. Mobile security containers, in contrast, enable mobile app developers to develop new apps inside a security container that protects it and provides a framework for security.  Don't ask me more as I have reached the limit in this subject with those two sentences.

I also learned there are potential vulnerabilities when you have third-parties develop your mobile apps.  Manageable vulnerabilities, but ones that must be considered and addressed.  Most mobile app security solutions are designed to protect an app from outside attack, but what happens if the app code is designed and developed purposely with nefarious intent?  Mobile security systems are not designed specifically to find or prevent that event.  What if the mobile app has been developed purposely to store credit card data and then to send it off-shore?  The mobile app has not been attacked or hacked, it was developed that way and delivered to an unsuspecting vendor.  Yikes!!!!

With that vulnerability in mind, companies having third-parties develop apps need ways to test and verify the code and behavior of the mobile app matches the original intent, purpose and design.

I also learned that MAM (mobile application management), MDM (mobile device management), EMM (enterprise mobility management) with a pinch of mobile application lifecycle management can all be found in the same vendor, or not.  It seems all of the mobile security vendors are both partners and competitors emphasizing different aspects of their solutions and ambitions depending on if their partners are present in the room or not.

The bottom line, however, is that my weekly newsletter on Mobile Cyber Security is the most read newsletter I publish each week.  This is a very important topic.  It appears from all of the sessions I attended that today it may take a combination of mobile security vendors to cover your full mobile security and application management needs.


************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Mobile Expert Video Series: Kurt Stammberger

Last week at SAP's Sapphire Now 2013 in Orlando, Florida, SAP announced they would begin reselling mobile secure app solutions from Mocana.  In this press release they describe the role of Mocana in their mobile security portfolio.  In this short interview with Mocana's VP of Marketing, I ask about their solutions and how they fit in the SAP Mobile Platform strategy.  Enjoy!

Video Link: http://youtu.be/KTnV6HXjcUU


*************************************************************
Kevin Benedict, Head Analyst for Social, Mobile, Analytics and Cloud (SMAC) Cognizant
View Linkedin Profile

Read the whitepaper on mobile, social, analytics and cloud strategies Don't Get SMACked
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility

Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and SMAC analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Soti, Enterprise Mobility and the Changing World of MDM

I had the opportunity to be briefed by the MDM  (mobile device management) vendor Soti a couple of weeks ago.  The briefing gave me a glimpse into the changes happening in this space.  In days gone by when the mobility projects I was involved in were all about rugged handhelds and bar code scanners, MDM vendors like Soti were critical, not so much for mobile security, but for their ability to help debug mobile device problems in the field.

In 2006 nearly all enterprise mobility apps were custom.  Every app deployment was complex and time consuming.  MDM vendors like Soti provided the remote access and monitoring of mobile devices that app developers needed to understand bugs.  Mobile devices had so little memory that running out of memory was a common problem.  In order to solve this problem, either the user would need to bring in the device, or software from companies like Soti would allow you to remotely access, control and debug the device.  This enabled the helpdesk to discover and resolve problems while leaving the device to be productive in the field - a useful and cost effective solution.

When your custom mobile app was the only app on the device, and there were only a few hundred users, there were much fewer security concerns.  Today security is a huge concern, but MDM vendors have stretched out way beyond just mobile security.  Here are some of the areas that Soti just announced:
  • Web Filtering
  • Real-Time Antivirus/Malware Protection
  • Mobile Help Desk Suite
  • Telecom Expense Management
  • Secure Content Library
In this article I use the common acronym MDM, but most vendors in this space have moved beyond this term.  Soti today uses the term Enterprise Mobility Management to cover the full range of capabilities.

Another interesting development is that MDM or EMM is now for more than just security conscience companies.  Many of Soti's deployments these days involve mobile devices in schools.  You can understand the connection to web filtering and real-time anti-virus and malware protection given this environment.

Mobile security concerns today have evolved beyond just smartphones.  Vehicles, equipment, smart homes and appliances all have the ability to wirelessly communicate today.  It will be interesting to continue to watch how this industry evolves.
*************************************************************
Kevin Benedict, Head Analyst for SMAC, Cognizant
Read The Future of Work
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and SMAC analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

MDM is Not Dead - Ask the Right Questions

In my former career as the CEO of a mobile application company, I remember my professional services team coming into my office one day and asking me to buy licenses of an MDM (mobile device management) solution from a vendor called Soti. My team wanted to be able to troubleshoot new mobile applications on a large variety of different mobile devices.  They wanted remote access to both the device and the apps so they could understand bugs and issues that were reported from the field.  This is still a very useful feature.

Today, however, few of the MDM/MAM vendors adequately support this feature.  In my experience, the ability to have remote access and remote control of a mobile device is very useful.  I recently interviewed a CEO who shared how it had taken several years and many rounds of change management classes to get his field services technicians comfortable and using mobile technology.  In these kinds of work environments, the team deploying the mobile technology is often struggling to understand if reported software bugs are real, a lack of user knowledge, or a mobile device issue.  In these cases it is far easier for the help desk or professional services team to simply take remote control of the device and investigate the issue themselves.

My professional services team found remote access and remote control to be the fastest way to understand and resolve mobile solution issues.  I would strongly recommend that you ensure your MDM/MAM vendor provides this capability, especially if you are working on customized mobile applications.

Another interesting MDM requirement I have seen in many secure and classified work environments involving research, government and military organizations, is the need to control different mobile applications based on the geographic (GPS) location.  For example, when you enter a particular campus your mobile device camera, Bluetooth and audio recording apps are automatically disabled.  When you leave that geo-fenced area, they are again enabled.  This solution combines GPS tracking, geo-fencing and remote device control.

One of my friends, who is an SAP Mentor, shared that her university work site for years would not allow mobile devices to be brought to work because they contained cameras that were not allowed on the secure research site.  That policy evolved to mobile devices needing to have tape over their camera lenses.  Of course, we can all guess how effective that was.

Many of the MDM/MAM vendors today seem only to target today's consumer type smartphones and mobile applications.  However, in many industries with mission critical mobile applications running on ruggedized industrial grade mobile smartphones and handheld computers, there is a need for a much stronger mobile device management solution.

It is interesting to me that many MDM/MAM vendors champion the cause of BYOD (bring your own device) at work but then don't support that environment.  Many of the MDM/MAM vendors still have a very difficult time supporting all Android OS versions and manufacturer's devices.  When you are selecting an MDM vendor, dig deep with your questions in this area.  Find out, in truth, what exact Android devices and OS versions they can support.  It is almost always a limited subset.  Ask if they have the ability to remote access and remote control mobile devices.  If not, that is OK as long as you understand that up front and it fits your needs.  You just don't want to be surprised and disappointed later.


*************************************************************
Kevin Benedict, Mobile Industry Analyst, Mobile Strategy Consultant and SAP Mentor Alumnus
Follow me on Twitter @krbenedict
Full Disclosure: I am an independent mobility analyst, consultant and blogger. I work with and have worked with many of the companies mentioned in my articles.

Changing Times for Enterprise Mobility

As I was running this morning in the Boise foothills, OK walking at a brisk pace, I was pondering how fast enterprise mobility is evolving.  Today, HTML5 and Android security are critical check box items for any company considering standardizing on a mobile application development platform and a mobile application management platforms.

The MAM (mobile application management) and MDM (mobile device management) vendors have all been working hard to bring order out of chaos in the Android space as demonstrated by this recent announcement, "SOTI Inc., an Enterprise Mobility Device Management (MDM) vendor, has unveiled new technology that enables corporations to consistently manage security policies across Android devices from all manufacturers."  It has been a challenge for most vendors to provide enterprise quality security for Android devices due to the many different versions of the Android OS that manufactures use.  Most vendors would only support or secure a limited subset early on.  It seems vendors are becoming more confident in their abilities these days, as measured by the number of recent announcements around securing Android devices that I read about.

On the topic of HTML5, most vendors now have an HTML5 hybrid solution and strategies that enables them to add proprietary features to a container that supports HTML5.  This container enables them to solve problems and address challenges that may not yet have been addressed in the HTML5 standard.

I would advise that you regularly get briefing from your mobile vendors of choice about developments in these two areas as they are fast moving.  I would also recommend against purchasing from a mobile vendor that does not have HTML5 or HTML5 hybrid solution or strategy, and have answers to how you can secure Android devices.

*************************************************************
Kevin Benedict, Mobile Industry Analyst, Mobile Strategy Consultant and SAP Mentor Alumnus
Follow me on Twitter @krbenedict
Full Disclosure: I am an independent mobility analyst, consultant and blogger. I work with and have worked with many of the companies mentioned in my articles.

Interviews with Kevin Benedict