Mobile Technology Strategy
The mobile future promises great new potentials, but also holds challenges for enterprises. We develop and implement a suitable and custom-built device strategy for you.
Targeted use of mobile devices through a proactive strategic alignment
Internal and external drivers call for action
Employees increasingly demand to smartphones and tablets in the corporate environment, which they are
already using personally ("consumerization"). In addition, the eroding market share of BlackBerry puts
external pressure on many organizations since they have to look for possible alternatives.
New opportunities stemming from mobile technologies
Modern mobile devices, especially tablets, help to optimize business processes with regards to process
efficiency and incline in sales.
Strategic alignment via predefined dimensions
A holistic strategic alignment requires the consideration and definition of different aspects while using
mobile devices applications.
Analysis
Definition
Added value through our standardized methodology
Roadmap creation
We will apply our tried & tested approach, but tailored
towards your needs – from analyzing enterprise specific requirements over working out the strategic dimensions up to
compiling recommendations and putting them on a roadmap.
–1–
Operating systems
and terminals
Terminal types
Supportorganization
BYOD
MDM
Access
technologies
Our methodology is based on six predefined strategic
dimensions and therefore enables use to compile a
mobile device strategy in a very structured way.
© Detecon
Our tried and tested approach
Mobile Technology Strategy
The mobile future promises great new potentials, but also holds challenges for enterprises. We develop and implement a suitable and custom-built device strategy for you.
Analysis
Conception
Definition of the project objectives
Detailed analysis of the current
customer situation
Definition of evaluation criteria
based on the project objectives,
customer situation and the mobile
market environment
Creation of different scenarios
from selected strategic
dimensions
Development of recommendations to implement the chosen
scenario
Detailed assessment based on
the defined criteria
Classification based on the
estimated implementation time
Compilation of a document to
prepare a decision on the
evaluated scenarios
Optional assessment of the costs
of implementation
Scenario 1
Smartphone
Multi
Support Organization
Windows Phone
BlackBerry 10
20%
38%
Marketshare
7%
> 1%
06/2007
09/2008
Market Entry
02/2010
01/2013
JB 4.2 (11/2012)
Current
Version
?
H1 – Determine device portfolio
Tablet
Evaluation Criteria
Einzel
Google Android
Recommendations
(Implementation period )
Device Types
Operating Systems & Devices
Mobile
OS
Apple iOS
Roadmap creation
Mobile Device Management
Scenario 2
Self
Outsourced
Container
Bring-Your-Own-Device
Full MDM
Apollo 8 (10/2012)
BB 10.1 (05/2013)
Yes
No
GSM/UMTS
Mid-term
(3 - 12 Months)
H2
H3 – Establish BYOD pilot programm
H4 – Create usage policies
Long-term
(> 12 Months)
H1b
H3
H4a
H5 – Introduce BYOD programm
Access Technologies
Scenario n
iOS 6.1 (01/2013)
H2 – Introduce MDM system
Short-term
(1 - 3 Moths)
H1a
H4b
H5
H6
H6 – Mobilize of business processes
Public WiFi
Investment cost of each recommendation is represented by the diameter of the circles
iOS +
Provider A
Operating
system
MDM System
Mobile PIM support
Supports the IT strategy
License and device costs
Lync support
Meets IT-security requirements
Developer community
Sharepoint support
Support of personal liable devices
…
Meets requirements of the data
protection department
Corporate stability of vendor and
manufacturer
…
Ist possible to support with the
current help desk structure
…
Market situation
(All)
Provider A
BB10 +
Provider B
Profile2
Profile 2
(entitled)
(All)
Operating
system
BB10
Private devices
MDM System
BES
Provider B
Recommendations (Hx)
Time span of implementation
Creation of a modular security concept for corporate and personal liable mobile
devices
Mid-term (xx - xx Months)
Implementation details
Security and privacy
policy
Separation of personal and business data at the operating
system level
Attractiveness of
private use
Attractive devices, widespread in private use
Private apps can still be used
Private iOS users don‘t f ind a f amiliar UI an UX and if
applicable they have to re-purchase the Apps
Compilation of a modular security concept for the use of corporate an personal liable mobile devices makes security
risks transparent and help establishing mitigation measures and creates awareness
E-mails are synchronized continuously in the background
and so they can be opened immediatly.
Sharepoint and Lync-integration not yet available
Apps f or consumers not available f or BB10
Security requirements as well as the threat and risk catalog of the concept should be formulated for the general use of
mobile devices and applications
Business
applications
Synchronization of e-mails only at the start of the mail
application, which may lead to longer loading times
Sharepoint and Lync-integration existing
Definition of security measures and residual risks should be made per operating system and MDM solution, as well as
for personal and corporate devices, as mobile operating systems and MDM solutions provide different technical options
for mapping the security requirements
External
market factors
Solid market statistics and f uture prospects
Large ecosystem with many apps and peripherals
Future development of BlackBerry still unclear
BB10 ecosystem is not yet at the level of iOS
A classification (for example: open, internal use, confidential, strictly confidential) of the processed data and systems
as well as the integration into the overall security approach is necessary to avoid inconsistencies
Devices
Only devices with touch-screen
Devices with touch-screen and keyboard
When provisioning AppleID must be created
Provisioning is possible by simple enterprise activation
without BlackberryID
Operations and support just f or one solution
Need to operate two solutions
Operations &
support
Company situation
Profile 1
Profile 2
Private devices
Numbers and names open f or third-party provider-Apps
Costly secure connection data (VPN)
Provisioning
Project goals
Profile 2
(entitled)
iOS
Costs
The sustainable establishment of the measures, with the help of the MDM system, organizational rules and awareness
of the employees, is essential for ensuring the safety requirements
Cost estimation
For the internal development and coordination of a comprehensive security concept there is to be expected a cost of
about xxx - xxx PD. If the necessary, for security measures exceeding the functionality of the MDM system, additional
costs will occur for extra solutions (e. g. VPN or firewall)
If external support is necessary, costs of approximately xxx - xxx K€ will occur without actual implementation of the
measures
In the f irst assessment, slight advantage f or BlackBerry solution due to lower equipment costs. More meaningf ul
comparison is only possible af ter detailing the license-, operating- and support costs.
–2–
© Detecon
Profile 1
Evaluation criteria
Contact Information
Jörg Heinzelmann
Phone: +49 89 546 365 92
Mobile: +49 175 57 893 30
E-Mail: [email protected]
Thomas Herzig
–3–
© Detecon
Phone: +41 43 88 874 44
Mobile: +41 79 74 119 12
E-Mail: [email protected]
© Copyright 2026 Paperzz