Five steps to designing your

12:06 PM
Five steps to designing your - enterprise mobility strategy

Employees are more mobile. I must not tell you - you encounter every day. But the reality is that the world of the employee entering the office every day is finished; the world of the employee using the locked office run is complete; the world of crackberry is closed. I mention these things because I constantly hear of organizations are still managing enterprise computing and mobility as if we live in the world of yesteryear.

Recently I talked to many companies about their challenges with the new requirements around the need for employees to work from anywhere; the waiting staff to use their own devices, "cold"; and the fact that iPhones are the most important phones in history. If I had to summarize conversations, companies want to support these new requirements, but struggle with how

  1. Solidly allow BYO devices of all types
  2. secure corporate data on these BYO devices
  3. Mobilising all enterprise applications, including intranet, web and Windows applications
  4. provide single sign-on to SaaS and web applications
  5. engage in any security throughout their new native mobile and HTML5 apps to users.

After discussing these challenges, the real question of how to design a solution for these new set of requirements happen. Although not all customers have the same five clear objectives for computing and mobility, they have all the elements of the above. Fortunately, there are common elements of a well designed approach to mobility as any company can adopt a goal of any mobility strategy should be to securely manage corporate data on any device, simplifying the application management decentralized and improve enforcement and data. delivery

Here are five steps to design a mobility strategy that optimizes for the five most common goals that we hear about companies going mobile

  • Step 1 :. secure access to Windows and web applications through controllers: an approach controller can provide the necessary management through a wide range of application types. Providing Windows desktop applications from the datacenter through virtualization controller is a cornerstone of any business strategy. Like most Windows applications are designed for keyboard and mouse, the key is to use a solution that optimizes the user experience for mobile devices. However, there are also web and SaaS applications that are already optimized for mobile, but must be controlled and delivered to users safely. A controller can access these hosted applications and use VPN and single sign-on technologies
  • Step 2 :. Set a local content on mobile devices through containers A better approach to device management is through unit containers, moving access and security far from the camera , with fine-grained control of information in the hands of IT.
    • to native mobile applications, there are two keys to securing and providing mobile applications :. "Conditioning" of the application for native performance and providing flexibility for multi-platform development, such as HTML5 applications
    • to corporate data on mobile devices, this means encrypt files data on mobile devices, providing "follow me" access across devices, and supporting the ability to erase the data when needed
  • Step 3 .: apps available based on identity: with the proliferation of enterprise applications, a key issue is the mapping of applications to the job function. Basis of this principle is identity management based on roles. Solutions here include support for multiple authentication types, active directory federation, role mapping appropriate applications and data stores, authentication, and management of the "active" identity to automatically provision and de provision of access to resources.
  • Step 4: access control based on the policy: policy should provide access to mobile information "contextually aware key controls and policies should include. location, type of device, the network, the authentication requirements and things such as the detection of jailbroken device. These policies should then be applied to an application or a specific file allow or restrict access
  • Step 5 :. Empower users with an app store self-service: once the above steps have control made, you are ready for any application, device, or data. What remains is in balance control with a user experience built around convenience through an enterprise application store. the key elements of any app store business should include unified store for all applications and data, the availability of the application based on the role, request the application workflow, the self-service subscriptions, the delivery of the native application for mobile devices in use and "Follow me" access to information across devices.

Following these steps will allow employees to use so transparent devices of their choice and to work from locations that bet suit their working methods while allowing at the same time to keep the control over what matters to them -. all corporate applications and data used by employees

Citrix CloudGateway is a great way to start on your mobility initiatives - pair with ShareFile and XenDesktop and you have a solution that allows user choice and IT control over all applications and data. Try it, tell us what you think!

Previous
Next Post »
0 Komentar