Vendor Spotlight Template - Symantec

As iOS devices first ... to security vendors and systems management vendors. ... While the OS/device diversity and complexity brought on by BYOD create a bevy ...
253KB Sizes 8 Downloads 87 Views



Mobile Enterprise Management and Security: The Impact of the Consumerization of IT January 2013 Adapted from Worldwide Mobile Enterprise Management Software 2012–2016 Forecast and Analysis and 2011 Vendor Shares by Stacy K. Crook, Stephen D. Drake, and Ben Hoffman, IDC #236835 and Worldwide Mobile Enterprise Security Software 2012–2016 Forecast and Analysis by Stacy K. Crook, Charles J. Kolodgy, Sally Hudson, and Stephen D. Drake, IDC #233664

Sponsored by Symantec As the trends of consumerization of IT and bring your own device (BYOD) continue to expand, the challenges enterprises face in terms of managing and securing mobile devices and information increase. Along with data security and compliance issues on the corporate side, enterprises must contend with privacy concerns among employees who are using personal devices to access corporate data and applications. In response to these dual demands, there is a growing convergence between the mobile device management (MDM) market and the mobile application management (MAM) market. As a result, IDC has defined a new market called mobile enterprise management (MEM) software. According to IDC, worldwide MEM software revenue will grow from $444.6 million in 2011 to $1.8 billion in 2016 at a CAGR of 31.8%. This Market Spotlight discusses the trends propelling the increasingly important market for MEM software and describes some of the technologies that are available in this growing market.

Introduction Over the past few years, mobility has had a tremendous impact on enterprise IT. As iOS devices first started to infiltrate the enterprise in the 2009 time frame, organizations began to realize they were going to need additional solutions to manage the reality of multiplatform computing. This new world requires management and security platforms that are able to handle multiple operating system (OS) types and that are appropriate for both corporate-owned and BYOD device deployments. In fact, IDC believes that 68% of all business-use smartphone devices worldwide were employee owned at the end of 2012. While remote wipe/lock has been a standard feature of MDM solutions for some time, security traditionally took a backseat to inventory management, configuration management, and other features typical of a PC management solution. Since consumer devices entered the enterprise, information security has become much more important, and a new type of mobile management solution is needed that addresses the various challenges presented by this trend. Consequently, the market has been flooded with new entrants ranging from pure-play MEM vendors to security vendors and systems management vendors. As more and more companies have adopted BYOD as a standard practice, a new type of solution has begun to emerge that focuses on managing the corporate footprint of information on the device as opposed to managing the entire device platform. Called mobile application management (MAM), this segment of the market has brought with it a slew of new companies focused on this space. However, many of the companies that got started in the MDM space have also added MAM capabilities to their products.

IDC 1441

While the OS/device diversity and complexity brought on by BYOD create a bevy of security challenges, some of the most complicated pieces of the equation are not technology issues but issues that fall in the realms of liability, ownership, and privacy. Consumerization is not only about devices but also about other consumer technologies that end users want to leverage for business. For example, as users have become accustomed to superior application experiences on their mobile devices, they won't appreciate being forced to use kludgy business applications that don't meet their needs. Given the breadth of productivity apps in the app stores, mobile workers can easily find workarounds if their company does not offer them suitable mobile working tools — but the security paradigms of these