If your organization is struggling to balance the need to support mobile devices with security and compliance concerns, you’re not alone. According to recent research from TechTarget, ” Growing demand for mobile computing will continue generating major new challenges for companies in many industries for at least the next year.”
Author Anne Stuart reports that two-thirds of survey respondents (3,300 business and IT professionals worldwide) “ranked mobile-device management as a ‘medium’ or ‘high’ priority for this year,” and 85% placed the same importance on security–yet “only 29% reported having a mobile device management (MDM) tools or policies in place.”
Among the report’s other findings, corporate IT support for mobile access varies considerably by device type, with 54% of respondents willing to allow employees to self-provision smartphones, but just 29% will permit them to connect their own laptop or desktop to the company network.
Three key challenges organizations face in this shift to mobile support are:
- redesigning business processes for mobile workers;
- ensuring connection, data and device security; and
- prioritizing the business processes to “mobilize” first.
Mobile Process Redesign
According to TechTarget, “Forrester (Research) studies indicate that companies will spend nearly $8 billion on reinventing processes for mobility this year.” While mobile process design presents some unique challenges, the fundamental approach should be the same as for any process redesign: start with the goal of a delighted customer.
Work backward from the user goal and experience to the required tasks on the business side, keeping the overall process as simple as possible (though not simpler, as Albert Einstein instructed), and always looking for automation opportunities.
Ensuring Mobile Security
While this topic could fill a book (and has–several books actually), one helpful approach where feasible is to use portal software (such as Kinetic Request) as a mobile, Web-based front-end (a system of engagement) between the mobile device and the back-end enterprise application (system of record).
The portal application utilizes existing security protocols and passwords while enabling specific device-level security that protects corporate systems and information without undue complexity for the user.
Prioritizing Mobile Processes
Not every process needs be mobilized, and not every process that does has equal importance. The TechTarget article advises looking “at the employee path of activity, what they’re trying to get done on mobile, and make sure that’s enabled. Let’s also make sure we are delivering what customers want…Don’t mobile for mobile’s sake. Instead, find proof that mobility will improve productivity or help the company better serve customers or reach some other business goal.”
This is where an agile approach to service management is valuable. It enables tackling the “low-hanging fruit” (i.e., processes that are very common, or very painful, or both, for mobile users) first–testing, tweaking and optimizing them. Often, these processes can then be cloned and modified to create new processes. This enables a gradual approach to process mobility, enabling IT to meet mobile users’ most pressing needs while minimizing business disruption.
The “seismic shift” as TechTarget describes it, from desktop to mobile computing, presents significant challenges for IT infrastructure, app dev, and support services. But taking an agile approach to mobility helps to balance user demands with cost and resource constraints.
To learn more:
- Download the white paper Enterprise Request Management: An Overview.
- Join the discussion in the Enterprise Request Management Group on LinkedIn.