Skip to main content
Aug 14, 2015

Gartner Catalyst 2015 Recap

This week’s Gartner Catalyst event kept its promise as the must–attend event of the year for technologists tasked with executing on a strategy to leverage mobile, cloud, & big data. Attendees who were eager to learn about implementing mobile strategy, architectural design, and technologies from analysts and peers packed the mobility sessions. There were a few key trends that attendees heard:

  • Balancing Security and User Experience: Mobile security is a top priority as we’ve heard in our 2015 Enterprise Mobility Report. But it is extremely important to make sure the mobile enabled users have an experience that they love. If the only focus is on security, the mobile assets that are being delivered may never get used, diminishing the value of your mobile initiative. Our partner Mocana, had presented best practices for delivering the highest levels of mobile security while facilitating a consumer-like experience employees expect.
  • Understand Your Customer & App Demands: Not all mobile app deployments are created equal. Different types of apps have different management requirements based on the platform they are built on and the data in which the app is delivering, collecting, and storing. The same goes for user populations, who are really the customers of the app. Deploying apps to internal users with managed devices, unmanaged BYOD users, the extended enterprise (e.g., contractors, dealers, partners, hourly workers), or a combination of all three requires special consideration. Companies are managing complex workforce environments with the requirement to deliver high rates of mobile app adoption in a secure fashion. Stand alone mobile application management without the requirement of device enrollment was one approach that various presenters verified satiates the demand of securely reaching 100% of mobile users. You can evaluate the right type of mobile approach based on your app portfolio in this Gartner research paper.
  • Critical Mobile Apps are Key: The value of mobility is in the apps and data. The day of strictly locking down devices is ending, and organizations are focused on finding new opportunities to use mobile to reduce costs, increase productivity, and find streams of revenue. How? By creating and curating critical mobile apps for their internal and extended workforce. Many organizations are working to identify apps that can change the way their employees work or even transform an entire industry. The first step in identifying apps that matter is for IT and the line of business to collaborate and learn about the end users that you are mobilizing. By understanding how they currently work, their mobile preferences, and barriers they have in getting their job done, critical mobile apps will become clearer. This video on understanding your customers provides a more in depth analysis of this very topic.
  • A Mobile Center of Excellence Can Work: Analyst and end user presenters all recommended forming a mobile center of excellence (MCOE), but one that is goal oriented with key deadlines and outcomes. Mobile moves too fast to be complacent and if formed correctly a mobile center of excellence can help accelerate mobile programs. MCOE’s can help identify prime user populations to enable with mobile and critical mobile apps to build, creating a technology stack that will help achieve the goals for the various mobile use cases an organization is dealing with.

Apperian will also be at Gartner Symposium to hear more great mobile insights from analysts and attendees. If you're going to be there let us know and comment below!

Apperian

More from the Blog
Sep 19, 2018

Arr Matey, Hear a Tale about Cyber-Piracy

It’s Talk Like A Pirate Day.
Read more
Sep 18, 2018

The App Is The Endpoint

Traditional Endpoint Security is dead, that is to say that hardening the laptop, desktop, or device is not a panacea. ...
Read more
Aug 29, 2018

Using real-time threat analytics to thwart a serial app attacker

How Arxan helped shut down continuous reverse engineering attacks Operating in the Dark It started after releasing an app u ...
Read more