Tag: smart device MDM
The Mix of Consumer and Rugged Mobile Devices in the Enterprise
Has your experience at retail stores been different lately? Or perhaps you’ve had a different experience at a medical facility? Maybe your own work has changed recently. A significant change across industries has been in the number and types of mobile devices being used by all sorts of workers. Whether you’ve completed a sales transaction by signing on a smartphone, or checked in at your doctor’s office using a tablet, there is no denying that mobile devices are proliferating in enterprise use cases.
In most mission-critical mobility deployments, enterprises have deployed rugged mobile computers. Consider the devices carried by parcel couriers, stockroom workers and others. There’s an obvious need for durability, so that these mobile computers can withstand frequent drops, extreme temperatures, and in some situations, hazardous environments (think oil rigs). Technologies that help these workers accomplish their tasks include advanced data capture capabilities, such as barcode scanning, RFID, and perhaps payment transaction capabilities.
As consumers, we don’t often interact with these workers as they complete their tasks. The use cases are not typically consumer-facing. However, there is an increasing contingent of enterprises that are placing more mobility into the hands of workers who are visible, and directly interacting with consumers. These workers are still performing mission-critical activities – particularly in revenue generating roles, for the enterprise.
Over the past few years, companies have explored the evolving smartphone and tablet options for these workers. In some cases, the benefits of these consumer-grade devices have proven not to be the best fit for the business, due to fragility, theft, or other limitations. These enterprises have generally opted to revert to the familiar – the rugged mobile computers that are likely being used in traditional task-based use cases. By contrast, there are enterprises across industries that have chosen and successfully deployed consumer smartphones and tablets into consumer-facing use cases.
There is no denying the selection of enterprise mobility hardware has expanded significantly over the last five years. Whether going with traditional, rugged mobile computers, or consumer-grade devices, it is exciting to see the accelerated adoption of mobility across enterprises – especially as it gets into the hands of the workers with whom we, as consumers, interact. However, this also creates a new IT challenge: Some workers are carrying rugged mobile computers, others have consumer devices. There is overlap in applications and content access as well. For all these users, there is a bottom line benefit to their mobile productivity. Fortunately, Wavelink Avalanche is there to be able to ensure all these users – task-oriented and customer-facing, are optimally productive.
Posted by Robert DeStefano
It’s a final nod to American football references from me (at least until the draft in May), but consider the requirements of an enterprise mobility policy: there are a lot of parts that need to be considered to make a deployment successful, similar to a championship winning team. When the strategy is thorough and the numerous “what-if” scenarios are played out, success is far more likely than for a team that doesn’t plan.
BYOD, like any other component of an enterprise IT strategy, needs to be strategically implemented for the best results. Just as no individual player on a team is greater than the team, BYOD should not be viewed individually; so as not to exclude other mobility initiatives across the enterprise.
To continue the “BYOD as an athlete” analogy, BYOD needs to be a versatile, balanced policy. This means that it needs to support all the leading mobile operating systems equally (or at least as equally as Google, Apple, and Microsoft allow). It needs to enable the mobile worker to be optimally productive – regardless of their hardware selection.
However, as a component of a larger enterprise mobility strategy, BYOD needs to be deployed in a manner that unifies it with the requirements of complementary mobility components – like teammates. For example, managing BYOD should be unified with the solution for managing other mobility hardware deployed within the company – such as rugged mobile devices used at the loading dock, in the warehouse, etc. Why would an enterprise want a different console for managing BYOD? A separate management system specific to BYOD creates the kind of friction synonymous with a self-interested player on the football team – disruption, confusion, and complexity, as IT administrators need to toggle screens and systems just for BYOD users.
The big play that scores points with IT administrators and mobile users is to deploy BYOD policies in a common enterprise mobility management solution like Wavelink Avalanche. Doing so enables enterprises to unify the management of all their mobile deployments. It enables BYOD support without compromising the support that mission critical mobility users need. Want to throw the winning touchdown? Using Wavelink Avalanche also allows for management of the entire enterprise deployment – all enterprise mobile devices (BYOD, rugged mobile computers, etc.), mobile applications and content access, network infrastructure, and printers. That’s a game plan that will enable maximum worker productivity, and maybe earn you a ride on the shoulders of your fellow IT administrators and mobility users.
Posted by Robert DeStefano
It’s always fun to look back at what the past year has meant to our industry, and (in a tip of the hat to William Shakespeare) if “what’s past is prologue”, then what is to come in the next year? Indeed, 2013 has seen a few significant themes take shape. Mobile device management has become significantly commoditized – as customers have begun to look past the common device-oriented features to larger, unified mobility solutions. A handful of new, mission-critical mobile devices have come to market – in some unique and interesting forms. Legacy voice vendors have struggled to get away from their Cold-war era technologies. Consumer smartphones and tablets have entered the enterprise through every door, window and loading dock available.
Yes, 2013 has met our expectations of continued evolution in enterprise mobility! 2014 has even more fun in store (and in the warehouse):
- The limits of the consumer device will become clear. Enterprises will see a more precise delineation between where BYOD or consumer smartphones/tablets can be used, and where rugged mobile computers will continue to be deployed.
- Voice-enablement will expand beyond stock picking. With full voice functionality, faster deployment, and at a lower cost, even companies that have deployed legacy voice for warehouse picking will be giving Speakeasy a fresh look for expending multi-modal data capture across supply chain tasks.
- There will be a reduction in point-product mobility providers. As more enterprises began doing in 2013, even more will seek out mobility solution providers that can offer more than just a single product. Unified mobility solutions – those that are designed together and, when deployed together, offer even greater value to the business, will be at the top of enterprise mobility wish-lists.
As these and other events unfold for IT in rugged environments, Wavelink is here to help you navigate. What are your enterprise mobility predictions for 2014? Please post your predictions in the comments section below.
Posted by Robert DeStefano
A Look at the Difference between Mobile Device Management and Mobile Deployment Management
“Mobile Device Management (MDM) enables businesses to address challenges associated with mobility by providing a simplified, efficient way to view and manage all devices from the central admin console.” That’s all you need, right? This is how one vendor describes it – right from their website. At first glance, one might expect that if I can manage the mobile device, that’s what I need.
But then again. What about the applications residing on those mobile devices, which also need to be managed? Well, sure, typical Mobile Device Management products can cover most of that. Surely they can push applications, maybe blacklist some apps not appropriate for use at work, and remotely lock a lost or stolen mobile device to maintain a level of corporate data security.
One of the challenges when looking at MDM vendors is that there isn’t a whole lot of differentiation among the capabilities, for example, they all face the same restrictions when managing iOS devices. Similarly, many vendors predominantly hype their iOS and Android device management capabilities. And everyone talks about BYOD.
There’s a big difference between Mobile Device Management and Mobile Deployment Management. Managing enterprise mobility deployments is about more than just the device. Consider all the aspects of deploying mobility in the enterprise.
- Users: Who are the users, and how will they be using mobility?
- Hardware: What kind of mobile devices are best – rugged, barcode scanner-enabled or smart devices?
- Connectivity: What kind of connectivity will be needed – Wi-Fi? Wi-Fi and Cellular? Connectivity to peripheral devices such as printers?
- Mobile Applications: What types of applications will the user need? Are they leveraging application streaming of data located on a host server? Through terminal emulation? Using a browser? Native apps?
Unlike Mobile Device Management, Mobile Deployment Management refers to managing this complete set of consideration, ultimately with the goal of maximizing the productivity of the user of this mobility solution. With the Wavelink Mobile Enterprise Productivity Suite, a mission-critical mobility deployment can be unified under a single vendor and completely managed through Avalanche.
Go ask MDM vendors if they can check all the boxes for the mobility deployment considerations above. They can’t. Managing mobile devices – ‘everyone’ can do that.
Posted by Gemma Randazzo
If you’ve gone shopping anywhere in the last year or so, you may have noticed the iPads, iPhones and even a few Androids that are increasingly being used as cash registers. While the trend is perhaps most noticeable in mom-and-pop stores (if you’ve been any non-Starbucks coffee shop in the last six months, you know what I mean), it’s certainly not limited to that. Department stores and major retailers are making the switch as well.
In fact, research group IHL recently released a study examining the projected growth of mobile POS systems. The firm found that by 2017, over 3.6 million tablets will have been shipped to retail and hospitality companies in North America alone, projecting that these shipments will result in some fundamental changes in many of these companies. The group also projects that shipments of non-rugged small format handhelds for mobile POS systems will increase 380% from 2013 to 2017. At the same time, overall POS shipments will be reduced by 12% in 2016, and in some segments, may be reduced by as much as 20% from previously forecast volumes. Those are some pretty striking numbers and it’s easy to see that mobile POS systems will have a large and far-reaching impact on the service industry.
For a start-up company, the appeal is easy to see. They can skip the investment of a traditional cash register and POS system and can instead purchase or repurpose an iPhone or iPad and use a cost-effective system like Square.
But what about for an established company? They’ve already invested in cash registers, credit card machines, and all the other bells and whistles that come with a traditional POS system. What’s the appeal?
Well, for one thing, it means your workforce is more mobile. Workers are no longer tied to the cash register. They are free to move around the store helping customers, restocking inventory and tidying the store floor. And while they do these things, each employee is a walking sales opportunity. Since each employee working effectively becomes a cash register, check out times are no longer limited by the number of cash registers available, but by the number of employees. This can speed up check out times for customers. And of course, it does give your company a bit of sleek modernity to be able to check out customers from anywhere in the store at the drop of a hat.
One cautionary note, however, is security. Most of these systems have security features built into them to ensure consumer PII and credit card information isn’t stored locally. Be sure you’re careful reviewing those features. It also wouldn’t go amiss to look into MDM software. Chances are, if you use ruggedized mobile devices in your back room or warehouse, your organization is already using MDM. While we tend to think of it as closely related to BYOD, mobile device management policies and technology protect corporate-owned devices as well.
Posted by Gemma Randazzo
In the most recent edition of Inbound Logistics, writer Marty Weil takes a closer look at how mobile communication tools are keeping supply chains on the go connected. “Mobile solutions are at work in every part of the supply chain. They are a key part of many warehouse environments, especially in directed picking applications. In transportation, mobile technology has been particularly significant for expedited parcel carriers that use it to improve customer service and continually optimize operations. Private fleets and motor carriers also use mobile devices for tracking shipments and collecting driver performance data.”
In our line of business we see a lot of enterprises who need to manage their operations in real time without impacting their bottom line from an efficiency and cost perspective. Through mobile technology solutions like Mobile Device Management (MDM) and Mobile Productivity Platforms (MPP) it really is easy to take advantage of technology that starts streamlining your supply chain operations immediately. As part of the article, Marty spoke with Wavelink customer Goya Foods, who are using Wavelink’s MDM solution, Avalanche and Wavelink’s MPP voice-directed solution, Speakeasy along with ruggedized mobile devices to improve efficiency in and outside the four-walls. Through mobile solutions they keep the goods moving without worrying about making adjustments on the fly.
For supply chain agility, Marty recommends that enterprises look towards four goals as outlined by consulting firm PwC –
1. Integrating the supply chain with other business functions. Companies that acknowledge the supply chain as a strategic asset achieve 70 percent higher performance. Taking steps to connect supply chain operations to functions such as marketing and sales can help strengthen the entire business.
2. Facilitating supplier partnerships and collaboration. Potential supply chain disruptions make it more critical than ever for companies to share data
and strengthen relationships with key suppliers.
3. Enabling companies to adjust quickly to changes. The better the information companies have at hand, the more responsive their supply chains can be. Without mobile devices, supply chain information can be slow to reach managers.
4. Measuring and managing supply chain data. Companies can use mobile tools to collect supply chain data that informs strategic decisions.
Through the use of mobile solutions supply chain operations can be agile, resulting in increased productivity, visibility and efficiency in moving product, saving money and meeting the growing demands of the customer. To read Marty’s article in its entirety click here. Want to take a closer look at how MDM and MPP tools like Wavelink Avalanche and Wavelink Speakeasy can add agility to your supply chain operations? Contact the Wavelink Sales Team.
Securing the First Responders: With today’s critical infrastructure threats, how can you ensure your city’s response team’s rugged devices are secure?
Posted by Gemma Randazzo
In an emergency first responders need to be focused on their number one priority – be it saving lives, protecting citizens and preventing crimes. Worrying about the security of the technology they have with them shouldn’t be of concern. In fact keeping onboard laptops and smartdevices that are the make-up of numerous fleet vehicles, such as police and fire vehicles secure shouldn’t even be a secondary thought. It should be simple and should just run in the background. With technology changing rapidly it is vital to ensure information that is sent to public servants, law enforcement officials and military personnel is secure. But while technology is changing rapidly it doesn’t mean that budgets are increasing to account for all these new devices or the changing climate of new threats.
Simple to use, simple to manage device management that protects the infrastructure of every city’s government is possible and in most cases requires very little in way of investment.
What should a city or government entity look for in a mobile device solution?
- 802.11 provisioning with industry standard encryption and authentication protocols
- Access Point (AP) detection and reporting with various IDS-oriented enhancements to assist with identification, alerting, monitoring and reporting of potential threats and a holistic view into the state of the agency’s security
- Ability to remotely manage configurations and updates of all Access Points across a city from one location
- Encryption of all communication channels and database encryption
- Device location mapping; enabling the lock down and wiping of devices when needed
- Push down all device software updates over the air without the need to physically bring in critical devices that are needed 24/7. Industrial laptops are powerful tools but they can be rendered virtually useless in an emergency if they are not kept up-to-date. Push down a security patch from a central location and save critical time and money
- Device management that doesn’t take up valuable bandwidth. Send out a software package in seconds without it hindering GPRS that is being used not only to update software applications but basic data communications with officers and firefighters out in the field
- Security for all wireless data transmissions that includes a seamless handoff between the various wireless network infrastructures in operation
Remember you don’t need to buy the latest and greatest device with the pretense that because it’s newer it’s going to be more secure. By making simple IT infrastructure changes using existing devices it is more than possible to stick to the budget without sacrificing security. A simple to use centralized mobile device management solution that plans, deploys, secures, monitors and maintains enhances the reliability and security of the tools first responders need to use.
It started with a simple $5 wristband in November 2011; Let’s Create Jobs for USA was founded with a $5 million contribution from Starbucks and a promise to create jobs for the American people. I vividly remember purchasing my wristband when they went on sale (ironically I was in the company’s hometown of Seattle). As someone who lives in a state that’s seen substantial unemployment, I was eager to play a small part in launching the movement.
As part of my weekly Starbucks visits (I won’t admit to a daily addiction), I recently noticed that they’ve taken this movement one step further by assisting small businesses on the technology payment front through a payment processing option called Square Mobile Card Readers.
Available in every company operated Starbucks store in the United States, “Square’s Mobile Card Reader with the free app, Square Register, enables anyone to easily accept credit cards so individuals and business can connect with customers anywhere their business takes them.” This simple tech attaches to an iOS or Android device and enables any size business to accept credit and debit cards. According to Starbucks roughly two-thirds of the 27 million small businesses in the United States do not currently accept credit or debit payment due to expensive processing fees and extensive applications. Think of the potential this small mobile card reader can bring to a small business and talk about a low investment – these card readers cost only $10 and come with a $10 rebate!
Say what you will about fancy and expensive coffees, but this is a highly effective tool that allows small businesses to generate new ways for income. Having said that, I won’t lie that my second thought was PCI compliance and keeping those devices secure. Any mobile device, be it rugged or consumer, has the capability to suffer a security breach. Add additional devices to your network and you further increase the importance of keeping them not only secure but maintaining peak performance. A Mobile Device Management (MDM) solution therefore still provides substantial value to any business whether you have two or three devices or two or three thousand devices.
For small business owners, a MDM solution that you manage in the Cloud is a perfect way to ensure devices are not only secure, but configured and managed from an easy-to-use console and without the need to purchase servers or an entire IT department. With MDM you also get the capability to lock down these consumer devices if they go missing and immediately protect them by securing and wiping confidential data. You even have the power to detect foreign devices entering your network and define specific parameters that your device(s) can be utilized in.
In closing, while we look at new ways to add jobs let’s not forget the critical nature of protecting the devices that come with them.
Posted by Brandon Hill
I came across an interesting read from Forbes that was posted over the summer about the growing threat of mobile device security. It has some fascinating figures on mobile device usage and the inherent risks associated with our growing demand on mobile technologies. It’s becoming such an issue, that the White House and other leaders are entering the discussion.
Some of the more interesting (and/or frightening) highlights include that “six out of every 10 cyber-security breaches occur as a result of a mobile device.” Why is that an issue? Well, consider the following that the author, Kevin Johnson points out:
We’ve reached an inflection point where the lightning-fast adoption of powerful, smart devices is outpacing our ability to secure our mobile lives. In a world of 7 billion people, there are now 5.9 billion mobile-phone subscribers. Here in the U.S., we have more mobile-phone subscriptions than people. The mobile Internet that we’ve come to rely on ― for everything from financial transactions to business operations to emergency-response procedures ― is increasingly vulnerable.
Think about that. In the US, we have more mobile-phone subscriptions than people. Take into account that many, if not most, are accessing some combination of personal and corporately-liable informations, and you can see why the issue is being trust onto center stage. Take a look at the article and let us know what strikes you the most about it. It’s a good read.
Posted by Brandon Hill
Today’s post comes from our friends at LANDesk. I wanted to point you to their blog and some of the topics they cover on a regular basis, which are well-worth the read. The post I’m sharing today discusses the benefits and/or burdens of mobility in the healthcare mobile ecosystem. You can read the full post in the link above, and check out the cool infographic below!