SlideShare una empresa de Scribd logo
1 de 25
The New Mobility
Speakers
Sarah Howland, Editor-In-Chief
Field Technologies Magazine
Martha Vazquez, Industry Analyst
Frost & Sullivan
Andy Willett, Senior Vice President
NetMotion Wireless
2
Global Mobile VPN Products Market:Global Mobile VPN Products Market:
The New Mobility: How Mobile Applications and Devices are ChangingThe New Mobility: How Mobile Applications and Devices are Changing
Your Business.Your Business.
Martha Vazquez, Industry Analyst
Network Security
June 17, 2012
© 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of
Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
4
Functional Expertise
• Experience in market research, consulting sales and business development with expertise in the
Information Communications and Technology Network Security sector.
• Developing research and analysis in the Network Security industry in areas such as:
- Technology and Demand Trends
- Market Sizing
- Market Forecasting and Strategic Analysis
Industry Expertise
 Experience base in the information communication technologies sector, leveraging long-standing
working relationships with leading industry participants’ Senior Executives
- Mobile Security
- Endpoint Security
- Managed Security Service Providers (MSSPs)
- Content Filtering
What I bring to the Team
 Expertise in managing executive level relationships
 In-depth understanding of the network security market
 Experience in understanding market trends and forecasting
Career Highlights
 Sales Consultant in several leading Wireless firms:
- AT&T
- Verizon Wireless
Education
• Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas
• Bachelor of Science from Texas State University, San Marcos, Texas
Martha Vazquez
Industry Analyst
Frost & Sullivan
North America
San Antonio, TX
Today’s Presenter
5
Focus Points
• The rise in mobile field workers
• The needs and challenges for the remote worker
• The evolving security landscape
• Security solutions used to support the mobile field worker
• Defining a Mobile VPN
• The future outlook for the Mobile VPN market
• The Last Word
6
Poll Question
• What is the status of your mobile security strategy in place?
1. In place today
2. Don’t have one and are assessing what to do.
3. To be completed in 3 months
4. To be completed in 6 months
• Do you believe that remote workers threaten your corporate
environment?
1. Yes, we need to ensure employees securely access our
network
2. No, we don’t believe the threat is significant
7
The Rise in Mobile Field Workers
Proliferation of Wireless DevicesProliferation of Wireless Devices
Source: Frost & Sullivan analysis
8
The needs and challenges for the remote worker
MarketDriversMarketRestraints
1-2 years 3-5 years 6-10 yearsIncrease in advanced and complex threats drives
demand for Mobile VPN solutions to help manage security
on wireless devices
Compliance regulations requires organizations to
implement products such as mobile VPNs
Budget Concerns due to the global 2011/12
economic slowdown impacts the purchase of
mobile VPN solutions
Use of mobile or wireless devices within organizations
drives the demand for Mobile VPN solutions
The need to support multiple operating systems
slows down mobile VPN development and sales
Need for remote accessibility drives the
need for secure and continuous access to
critical data
Customer confusion about the importance of
mobile security solutions delays spending on
products including mobile VPNs
Impact: High Medium Low
Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020
Source: Frost & Sullivan analysis.
9
2006 2011 Beyond 2012
Trojans, Botnets, Root
kits (Zeus)
Mobile Malware
APT & *MaaS
The Evolving Threat Landscape
*Malware-as-a-Service (MaaS)*Malware-as-a-Service (MaaS)
Malware becomes more
sophisticated over time,
while malware tools
emerge as a popular
commodity.
Source: Frost & Sullivan analysis
10
Central
Management
Security solutions that support the remote worker
Data Loss
Prevention
Content Security
Mobile VPN
Network Access
Control
Application and
Device Control
Anti-malware
Complete Mobile Security SolutionComplete Mobile Security Solution
Source: Frost & Sullivan analysis
11
Defining a Mobile VPN
• A Mobile VPN is defined as a specific type of VPN that is
based on security standards such as Mobile IP, IPSec or
SSL but us built for wireless or mobile coverage.
o Security
o Session Persistence
o Application Persistence
o Network Transparency
o Bandwidth Optimization
Source: Frost & Sullivan analysis
12
Source: Frost & Sullivan analysis
Key Takeaway: An increase in using wireless devices will fuel revenue growth
through 2016
Key Takeaway: An increase in using wireless devices will fuel revenue growth
through 2016
Global Mobile VPN Market
13<N9B3-74>
Global Mobile VPN MarketGrowthrate2009-2010
NetMotion Wireless
Revenue ($ Million)
Cisco
Birdstep
Technologies
Smith Micro
Software
Columbitech
> 10% growth 10-20% Growth > 20% Growth
Key Takeaway: The highest penetration rates are expected to come from Cisco,
Juniper, and NetMotion Wireless
Key Takeaway: The highest penetration rates are expected to come from Cisco,
Juniper, and NetMotion Wireless
Competitor Growth Analysis
Total Mobile VPN Products Market: Global, 2010
IBM
Check Point Software
Technologies
Radio IP
Juniper
Networks
Note: Bubble size represents relative capitalization. The
base year is 2010. Source: Frost & Sullivan analysis.
14<N9B3-74>
The Future Outlook for the Mobile VPN Market
22 The value of the mobile VPN market is expected to reach $522M by
2017.
The value of the mobile VPN market is expected to reach $522M by
2017.
33 Demand for mobile VPN technologies is increasing as businesses adopt
more mobile devices.
Demand for mobile VPN technologies is increasing as businesses adopt
more mobile devices.
44 Mobile VPN will be integrated into security solutions suites and will not
remain a separate product.
Mobile VPN will be integrated into security solutions suites and will not
remain a separate product.
55 Adoption in the mobile VPN market remains high for telecoms and
government markets.
Adoption in the mobile VPN market remains high for telecoms and
government markets.
11 As the need for mobile device security continues to increase, the mobile
VPN market will experience a healthy CAGR of 18.4 percent
As the need for mobile device security continues to increase, the mobile
VPN market will experience a healthy CAGR of 18.4 percent
Source: Frost & Sullivan analysis.
15<N9B3-74>
For Additional Information
Mireya Espinoza
Global Director
Corporate Communications
(210) 247-3870
Mireya.espinoza@frost.com
Martha Vazquez
Industry Analyst
Network Security- ICT
(210) 247-3864
Martha.vazquez@frost.com
Jennifer Bates
Director of Consulting
Information and Communication
Technologies
(940) 455-7475
Jennifer.bates@frost.com
Craig Hays
VP of Sales, North America
Information and Communications
Technologies
(210)247-2460
chays@frost.com
The New Mobility
Andy Willet, SVP, NetMotion Wireless
Agenda
Background
Common Challenges to Mobile Deployments
Considerations for Mobile VPN Software
Q&A
17
Background
NetMotion Wireless
• Based in Seattle, WA
• Software provider focused
on challenges of mobile field
workers and wireless
Andy Willett
• 11 years at NetMotion
Wireless
• 11 years at AT&T Wireless
and Sprint Wireless
18
Common Challenges to Mobile Deployments
For Mobile Workers:
• Frequent log-ins, coverage drops
hurts productivity
▪Time taken away from project
▪Drain on IT helpdesk
▪Application crashes
• Complexity of technology leads to
low adoption
▪Field workers revert to old methods
▪Solution too complex
05/14/13 19
Case Study:
Regional Public Utility
The math added up:
•~ 200 field workers
•~ 1 hour per day troubleshooting
connectivity issues/re-logins
•Multiplied by hourly rate
•Added to IT helpdesk requests
•Equaled large amounts of lost
productivity each day
Common Challenges to Mobile Deployments
For IT Managers:
• Limited visibility, management and
control into mobile workforce
activities and devices
▪Limited control of data access while
mobile
▪Limited insight into bandwidth drains
▪No application control
• Limited control over at-risk data
and anti-virus support
▪Users and networks at greater risk
▪Limited ability to enforce policies
▪Limited control over device upgrades
05/14/13 20
Considerations for Mobile VPN Software
Management
• Centralized web-based console
• Granular view into all devices and usage
• Ability to generate historical reports
Security
• Advanced encryption and authentication
• Ability to quarantine, verify, and control
devices and applications
• Ability to create and enforce security policies
Productivity
• Low complexity, single sign-on
• Application persistence through suspend
• Optimization of bandwidth and connections
05/14/13
22
Summary
Overcoming Common Challenges
• Dropped coverage, application freezes hurt productivity
• Limited visibility into workforce activities limits policy control
• Lack of application level data control creates security risks
Requirements you Need
• Create granular visibility into your mobile workforce
activities with Management tools
• Ensure seamless roaming coverage to increase Productivity
• Get complete application level control of data in transit
with stringent Security coverage
Q&A
More Information…
05/14/13 24
(866) 262-7626www.NetMotionWireless.com/Resources
Thank You

Más contenido relacionado

La actualidad más candente

Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? Forescout Technologies Inc
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020Dharmesh Thakker
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Eswar Publications
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 

La actualidad más candente (18)

Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 

Destacado

MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...Grand View Research
 
Rysavy Research Trends in Enterprise Cellular Network Data Usage Webinar
Rysavy Research Trends in Enterprise Cellular Network Data Usage WebinarRysavy Research Trends in Enterprise Cellular Network Data Usage Webinar
Rysavy Research Trends in Enterprise Cellular Network Data Usage WebinarNetMotion Wireless
 
Telemedicine Strategies: Manageing Data and Mobile Devices
Telemedicine Strategies: Manageing Data and Mobile DevicesTelemedicine Strategies: Manageing Data and Mobile Devices
Telemedicine Strategies: Manageing Data and Mobile DevicesNetMotion Wireless
 
Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?NetMotion Wireless
 
NetMotion Wireless Troubleshooting Wireless Cellular Networks Webinar
NetMotion Wireless Troubleshooting Wireless Cellular Networks WebinarNetMotion Wireless Troubleshooting Wireless Cellular Networks Webinar
NetMotion Wireless Troubleshooting Wireless Cellular Networks WebinarNetMotion Wireless
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketNetMotion Wireless
 

Destacado (6)

MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
 
Rysavy Research Trends in Enterprise Cellular Network Data Usage Webinar
Rysavy Research Trends in Enterprise Cellular Network Data Usage WebinarRysavy Research Trends in Enterprise Cellular Network Data Usage Webinar
Rysavy Research Trends in Enterprise Cellular Network Data Usage Webinar
 
Telemedicine Strategies: Manageing Data and Mobile Devices
Telemedicine Strategies: Manageing Data and Mobile DevicesTelemedicine Strategies: Manageing Data and Mobile Devices
Telemedicine Strategies: Manageing Data and Mobile Devices
 
Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?
 
NetMotion Wireless Troubleshooting Wireless Cellular Networks Webinar
NetMotion Wireless Troubleshooting Wireless Cellular Networks WebinarNetMotion Wireless Troubleshooting Wireless Cellular Networks Webinar
NetMotion Wireless Troubleshooting Wireless Cellular Networks Webinar
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
 

Similar a Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Changing Your Business

Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psAccenture
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Network Monitoring Market.pdf
Network Monitoring Market.pdfNetwork Monitoring Market.pdf
Network Monitoring Market.pdfpavanjanawade1
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 

Similar a Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Changing Your Business (20)

Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Network Monitoring Market.pdf
Network Monitoring Market.pdfNetwork Monitoring Market.pdf
Network Monitoring Market.pdf
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 

Más de NetMotion Wireless

Consumerization at the Crossroads Infographic
Consumerization at the Crossroads InfographicConsumerization at the Crossroads Infographic
Consumerization at the Crossroads InfographicNetMotion Wireless
 
Perfectly Adapted, Not Quite Adopted Table Infographic
Perfectly Adapted, Not Quite Adopted Table InfographicPerfectly Adapted, Not Quite Adopted Table Infographic
Perfectly Adapted, Not Quite Adopted Table InfographicNetMotion Wireless
 
Telemedicine: Prepare for Take-off Infographic
Telemedicine: Prepare for Take-off InfographicTelemedicine: Prepare for Take-off Infographic
Telemedicine: Prepare for Take-off InfographicNetMotion Wireless
 
NetMotion Wireless Healthcare Goes Mobile Infographic
NetMotion Wireless Healthcare Goes Mobile InfographicNetMotion Wireless Healthcare Goes Mobile Infographic
NetMotion Wireless Healthcare Goes Mobile InfographicNetMotion Wireless
 
NetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless
 
NetMotion Wireless Continuity of Emergency Response Communications
NetMotion Wireless Continuity of Emergency Response CommunicationsNetMotion Wireless Continuity of Emergency Response Communications
NetMotion Wireless Continuity of Emergency Response CommunicationsNetMotion Wireless
 
NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...
NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...
NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...NetMotion Wireless
 
Rysavy Research Trends In Enterprise Cellular Network Data Usage Survey Results
Rysavy Research Trends In Enterprise Cellular Network Data Usage Survey ResultsRysavy Research Trends In Enterprise Cellular Network Data Usage Survey Results
Rysavy Research Trends In Enterprise Cellular Network Data Usage Survey ResultsNetMotion Wireless
 

Más de NetMotion Wireless (8)

Consumerization at the Crossroads Infographic
Consumerization at the Crossroads InfographicConsumerization at the Crossroads Infographic
Consumerization at the Crossroads Infographic
 
Perfectly Adapted, Not Quite Adopted Table Infographic
Perfectly Adapted, Not Quite Adopted Table InfographicPerfectly Adapted, Not Quite Adopted Table Infographic
Perfectly Adapted, Not Quite Adopted Table Infographic
 
Telemedicine: Prepare for Take-off Infographic
Telemedicine: Prepare for Take-off InfographicTelemedicine: Prepare for Take-off Infographic
Telemedicine: Prepare for Take-off Infographic
 
NetMotion Wireless Healthcare Goes Mobile Infographic
NetMotion Wireless Healthcare Goes Mobile InfographicNetMotion Wireless Healthcare Goes Mobile Infographic
NetMotion Wireless Healthcare Goes Mobile Infographic
 
NetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network Performance
 
NetMotion Wireless Continuity of Emergency Response Communications
NetMotion Wireless Continuity of Emergency Response CommunicationsNetMotion Wireless Continuity of Emergency Response Communications
NetMotion Wireless Continuity of Emergency Response Communications
 
NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...
NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...
NetMotion Wireless Survey on the Evolutionary Growth in Mobile Technologies U...
 
Rysavy Research Trends In Enterprise Cellular Network Data Usage Survey Results
Rysavy Research Trends In Enterprise Cellular Network Data Usage Survey ResultsRysavy Research Trends In Enterprise Cellular Network Data Usage Survey Results
Rysavy Research Trends In Enterprise Cellular Network Data Usage Survey Results
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Changing Your Business

  • 2. Speakers Sarah Howland, Editor-In-Chief Field Technologies Magazine Martha Vazquez, Industry Analyst Frost & Sullivan Andy Willett, Senior Vice President NetMotion Wireless 2
  • 3. Global Mobile VPN Products Market:Global Mobile VPN Products Market: The New Mobility: How Mobile Applications and Devices are ChangingThe New Mobility: How Mobile Applications and Devices are Changing Your Business.Your Business. Martha Vazquez, Industry Analyst Network Security June 17, 2012 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
  • 4. 4 Functional Expertise • Experience in market research, consulting sales and business development with expertise in the Information Communications and Technology Network Security sector. • Developing research and analysis in the Network Security industry in areas such as: - Technology and Demand Trends - Market Sizing - Market Forecasting and Strategic Analysis Industry Expertise  Experience base in the information communication technologies sector, leveraging long-standing working relationships with leading industry participants’ Senior Executives - Mobile Security - Endpoint Security - Managed Security Service Providers (MSSPs) - Content Filtering What I bring to the Team  Expertise in managing executive level relationships  In-depth understanding of the network security market  Experience in understanding market trends and forecasting Career Highlights  Sales Consultant in several leading Wireless firms: - AT&T - Verizon Wireless Education • Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas • Bachelor of Science from Texas State University, San Marcos, Texas Martha Vazquez Industry Analyst Frost & Sullivan North America San Antonio, TX Today’s Presenter
  • 5. 5 Focus Points • The rise in mobile field workers • The needs and challenges for the remote worker • The evolving security landscape • Security solutions used to support the mobile field worker • Defining a Mobile VPN • The future outlook for the Mobile VPN market • The Last Word
  • 6. 6 Poll Question • What is the status of your mobile security strategy in place? 1. In place today 2. Don’t have one and are assessing what to do. 3. To be completed in 3 months 4. To be completed in 6 months • Do you believe that remote workers threaten your corporate environment? 1. Yes, we need to ensure employees securely access our network 2. No, we don’t believe the threat is significant
  • 7. 7 The Rise in Mobile Field Workers Proliferation of Wireless DevicesProliferation of Wireless Devices Source: Frost & Sullivan analysis
  • 8. 8 The needs and challenges for the remote worker MarketDriversMarketRestraints 1-2 years 3-5 years 6-10 yearsIncrease in advanced and complex threats drives demand for Mobile VPN solutions to help manage security on wireless devices Compliance regulations requires organizations to implement products such as mobile VPNs Budget Concerns due to the global 2011/12 economic slowdown impacts the purchase of mobile VPN solutions Use of mobile or wireless devices within organizations drives the demand for Mobile VPN solutions The need to support multiple operating systems slows down mobile VPN development and sales Need for remote accessibility drives the need for secure and continuous access to critical data Customer confusion about the importance of mobile security solutions delays spending on products including mobile VPNs Impact: High Medium Low Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020 Source: Frost & Sullivan analysis.
  • 9. 9 2006 2011 Beyond 2012 Trojans, Botnets, Root kits (Zeus) Mobile Malware APT & *MaaS The Evolving Threat Landscape *Malware-as-a-Service (MaaS)*Malware-as-a-Service (MaaS) Malware becomes more sophisticated over time, while malware tools emerge as a popular commodity. Source: Frost & Sullivan analysis
  • 10. 10 Central Management Security solutions that support the remote worker Data Loss Prevention Content Security Mobile VPN Network Access Control Application and Device Control Anti-malware Complete Mobile Security SolutionComplete Mobile Security Solution Source: Frost & Sullivan analysis
  • 11. 11 Defining a Mobile VPN • A Mobile VPN is defined as a specific type of VPN that is based on security standards such as Mobile IP, IPSec or SSL but us built for wireless or mobile coverage. o Security o Session Persistence o Application Persistence o Network Transparency o Bandwidth Optimization Source: Frost & Sullivan analysis
  • 12. 12 Source: Frost & Sullivan analysis Key Takeaway: An increase in using wireless devices will fuel revenue growth through 2016 Key Takeaway: An increase in using wireless devices will fuel revenue growth through 2016 Global Mobile VPN Market
  • 13. 13<N9B3-74> Global Mobile VPN MarketGrowthrate2009-2010 NetMotion Wireless Revenue ($ Million) Cisco Birdstep Technologies Smith Micro Software Columbitech > 10% growth 10-20% Growth > 20% Growth Key Takeaway: The highest penetration rates are expected to come from Cisco, Juniper, and NetMotion Wireless Key Takeaway: The highest penetration rates are expected to come from Cisco, Juniper, and NetMotion Wireless Competitor Growth Analysis Total Mobile VPN Products Market: Global, 2010 IBM Check Point Software Technologies Radio IP Juniper Networks Note: Bubble size represents relative capitalization. The base year is 2010. Source: Frost & Sullivan analysis.
  • 14. 14<N9B3-74> The Future Outlook for the Mobile VPN Market 22 The value of the mobile VPN market is expected to reach $522M by 2017. The value of the mobile VPN market is expected to reach $522M by 2017. 33 Demand for mobile VPN technologies is increasing as businesses adopt more mobile devices. Demand for mobile VPN technologies is increasing as businesses adopt more mobile devices. 44 Mobile VPN will be integrated into security solutions suites and will not remain a separate product. Mobile VPN will be integrated into security solutions suites and will not remain a separate product. 55 Adoption in the mobile VPN market remains high for telecoms and government markets. Adoption in the mobile VPN market remains high for telecoms and government markets. 11 As the need for mobile device security continues to increase, the mobile VPN market will experience a healthy CAGR of 18.4 percent As the need for mobile device security continues to increase, the mobile VPN market will experience a healthy CAGR of 18.4 percent Source: Frost & Sullivan analysis.
  • 15. 15<N9B3-74> For Additional Information Mireya Espinoza Global Director Corporate Communications (210) 247-3870 Mireya.espinoza@frost.com Martha Vazquez Industry Analyst Network Security- ICT (210) 247-3864 Martha.vazquez@frost.com Jennifer Bates Director of Consulting Information and Communication Technologies (940) 455-7475 Jennifer.bates@frost.com Craig Hays VP of Sales, North America Information and Communications Technologies (210)247-2460 chays@frost.com
  • 16. The New Mobility Andy Willet, SVP, NetMotion Wireless
  • 17. Agenda Background Common Challenges to Mobile Deployments Considerations for Mobile VPN Software Q&A 17
  • 18. Background NetMotion Wireless • Based in Seattle, WA • Software provider focused on challenges of mobile field workers and wireless Andy Willett • 11 years at NetMotion Wireless • 11 years at AT&T Wireless and Sprint Wireless 18
  • 19. Common Challenges to Mobile Deployments For Mobile Workers: • Frequent log-ins, coverage drops hurts productivity ▪Time taken away from project ▪Drain on IT helpdesk ▪Application crashes • Complexity of technology leads to low adoption ▪Field workers revert to old methods ▪Solution too complex 05/14/13 19 Case Study: Regional Public Utility The math added up: •~ 200 field workers •~ 1 hour per day troubleshooting connectivity issues/re-logins •Multiplied by hourly rate •Added to IT helpdesk requests •Equaled large amounts of lost productivity each day
  • 20. Common Challenges to Mobile Deployments For IT Managers: • Limited visibility, management and control into mobile workforce activities and devices ▪Limited control of data access while mobile ▪Limited insight into bandwidth drains ▪No application control • Limited control over at-risk data and anti-virus support ▪Users and networks at greater risk ▪Limited ability to enforce policies ▪Limited control over device upgrades 05/14/13 20
  • 21. Considerations for Mobile VPN Software Management • Centralized web-based console • Granular view into all devices and usage • Ability to generate historical reports Security • Advanced encryption and authentication • Ability to quarantine, verify, and control devices and applications • Ability to create and enforce security policies Productivity • Low complexity, single sign-on • Application persistence through suspend • Optimization of bandwidth and connections
  • 22. 05/14/13 22 Summary Overcoming Common Challenges • Dropped coverage, application freezes hurt productivity • Limited visibility into workforce activities limits policy control • Lack of application level data control creates security risks Requirements you Need • Create granular visibility into your mobile workforce activities with Management tools • Ensure seamless roaming coverage to increase Productivity • Get complete application level control of data in transit with stringent Security coverage
  • 23. Q&A
  • 24. More Information… 05/14/13 24 (866) 262-7626www.NetMotionWireless.com/Resources

Notas del editor

  1. Mobility XE meets customers’ needs and, as a result, we have built an impressive base of more than 1,600 world-class customers in Canada and the United States, some of whom you see here.   These are great customers, whose ongoing needs kept us growing robustly through one of the worst recessions in decades.   This represents license sales for a cumulative total of more than 460,000 individual users, 89 per cent of them are under continuing maintenance contracts. Customers like us and our surveys say that 97 per cent of them would recommend us to others.
  2. Common Mistakes Connectivity Tacoma Power: Consider overtime costs Worker frustration Training
  3. Common Mistakes Visibility Working on the WAN does not work as easy on wireless Many applications don’t perform well in mobile world Mobile VPNs can ensure these apps work well in mobile world POLL IDEA How many applications does your IT dept support? Allow mobile workers to use multiple applications Gives workers more tools to be productive
  4. What mobile VPN can do for IT administration.   Gives customers three tools they didn’t have previously: Analytics module gives them the ability to look into their wireless deployments to see what their mobile workers are doing; Network Access Control module gives them the ability to ensure that only devices with the right security, controls and anti-virus protection can connect to their networks; and, Policy Management gives them the ability to control all of this… which applications can be accessed by which workers on which networks.   Tools enhance day-to-day management and control, cut down on help desk calls and troubleshooting. Yet more productivity gains…   Software easy to install, easy to use. delivered by Internet download– no professional services engagement – most customers get it running by themselves in as little as a couple of hours.