"With mobility and the consumerisation of IT, there has been a move to user-based computing," said Dimension Data development manager David Nicholls. "The new workspace places the user at its centre. Enterprises have to deal with all device types, manage the differing application needs and access rights of employees."
"We are seeing the move from mobile as an end state to mobility as a vehicle," he continued. "Enterprises are leveraging on mobility to drive competitive advantage by enabling users to increase productivity, enabling businesses by streamlining processes and reducing risk, and enabling organisations through increased engagement."
In sharing his organisation's experiences on mobility, KPJ Healthcare IT general manager Eric Sim pointed out that integration was the key to a successful outcome. "Processes and workflows had to be connected well so that there were no hiccups. Applications had to work properly. When done properly, mobile technology brings services up to a higher level and helps in decision-making," he said. "We redesigned processes to specific disciplines and simplified daily tasks. We did not just want to automate manual tasks, but wanted to support care providers in giving them the tools which enabled them to provide the best care possible to their patients."
"A culture of unified communication and real-time care delivery was developed through use of mobile devices. The result has been more effective communication and engagement between doctors, nurses and patients," said Sim. "We have leveraged the implementation and maintenance costs over the long term with an architecture which allows our people and hospitals to stay connected."
"The challenge in mobility used to be about managing devices. Now the challenge revolves around application and data management using different technologies," said VADS assistant general manager, Enterprise Mobility Services & IoT, Vishnu Shankar. "Enterprises should be focusing on security, middleware and infrastructure."
Shankar acknowledged that there was no one fit solution for all enterprise mobility requirements. "EMM is a key component with its ability to manage multiple point solutions and the growing security risks resulting from mobility deployment," he said. "Having the right middleware to integrate the different host and legacy systems is another crucial factor."
Sime Darby Holding Berhad's head of Risk & Security Management, Aizuddin Mohd Ghazali agreed that mobile security was not just about controlling devices. "An enterprise's security framework and planning must be holistic. There is no one-size-fits-all solution," he asserted. "You must know your own environment and situation. You must also realize that not everything can be addressed by technology. People and processes are equally imperative."
Users played a vital role in keeping data secure. "Remind your users to use strong passwords, update to the latest manufacturer's software updates and ignore suspicious messages with link or installation request," said Aizuddin. "They should also be mindful not to bypass security by allowing applications installation from unknown sources or jailbreaking or rooting their devices."
MobileIron director of Marketing & Products, Asia Pacific, Jonathan Andresen agreed that user behaviour was a key factor in ensuring security effectiveness. "Users expect everything to be user-friendly. Some have a low tolerance and will change secure parameters if their expectations are not met," he cautioned. "Enterprises must think of what the user wants when setting up their security parameters. Do not do security incorrectly."
Sign up for Computerworld eNewsletters.