With a growing consensus building that enterprise mobility is here to stay, the conversation is starting to shift towards the infrastructure used to support it. What’s the best way to integrate mobile devices into the digital estate and what are the consequences of getting it wrong?
Jimmy Sheahan, Technical Director at Ergo spoke to The Sunday Business Post’s Connected about the three prong approach Ergo deploy when helping businesses with their enterprise mobility strategy.
According to Sheahan, enterprise mobility is something he’s seeing a lot of demand for, going as far as to describe it as a ‘burning need’ amongst enterprise and mid-sized companies.
“Some organisations aren’t getting the most from their enterprise mobility activities because they have policy considerations at play and so they’re not really maximising or embracing it, even though they have a desire to,” he said.
“They need to understand the wider architecture and plan around mobility to get the business case together for it.”
Ergo has a three-pronged approach it uses to help people with their enterprise mobility strategy.
“The first is the productivity view — are you using mobile with its messaging and collaboration systems and voice solutions such as Skype for Business to its maximum?”
“The second prong is infrastructural — the rollout of mobile device management and security to your mobile estate, along with Bring Your Own Device (BYOD) policies and management around that,” said Sheahan.
“The third stream is about how companies can extend more business-centric capabilities out to the mobile? That might be through mobile application development or through mobile-enabled business process management and that’s where we bring in solutions like apps that facilitate expense claims and auditing — a lot of HR functions can be loaded up easily enough through mobile. We also see a lot of demand for services that our customers can push out to their customers in turn.”
More and more, we have been hearing about companies who are not yet fully compliant with GDPR. In the latest...Read now
Security architecture refers to a unified security design that addresses requirements and potential risks involved in a certain scenario or...Read now