cio guide wireless enterprise

Upload: parag-mahajani

Post on 14-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 CIO Guide Wireless Enterprise

    1/12

    Executive Overview

    The CIOs Guide toWireless in the Enterprise

    Over the past decade, wireless technology has made

    huge strides in security, reliability and throughput.

    Companies that are moving orward with business mobility

    initiatives must plan or wireless security and mobile device

    management rom the start. Learn about many o the notable

    trends and key issues associated with Business Mobility and

    where to nd additional resources or consideration.

  • 7/27/2019 CIO Guide Wireless Enterprise

    2/12

  • 7/27/2019 CIO Guide Wireless Enterprise

    3/12

    The CIOs Guide to

    Wireless in the Enterprise

    Executive Overview

    Table o Contents

    Executive Summary 2

    Introduction 3

    Wireless Technology Review 4

    Notable Trends or Enterprise Mobility 6

    Mobile Applications 6

    Unied Communications and Fixed Mobile Convergence 6

    Key Considerations or Enterprise Mobility 7

    Wireless Security 7

    Mobile Device Management 7

    Conclusion 8

  • 7/27/2019 CIO Guide Wireless Enterprise

    4/12

    2 The CIOs Guide to Wireless in the Enterprise Executive Overview

    When not properly managed, there is a potential risk to an increase

    in business mobility. More workers away rom the sae and secure

    connes o their workspace increases a companys exposure to

    security breaches rom lost or stolen mobile devices. Equally costly

    in the long term, the improper management o mobile devices can

    signicantly increase their total cost o ownership (TCO).

    Companies that are moving orward with business mobility initiatives

    must plan or wireless security and mobile device management rom

    the start. The CIOs Guide to Wireless in the Enterprise is the rst o

    several CIO Guides rom Research In Motion. It introduces many o

    the notable trends and key issues associated with business mobility

    and directs the reader to additional resources or consideration.

    Executive SummaryOver the past decade, wireless technology has made huge strides in security, reliability and throughput. The

    wireless networks o today are almost as ast and reliable as wired networks and provide much more convenience

    and fexibility. As a result, there has been explosive growth in wireless networks o all types, rom Personal Area

    Networks (PANs) to Wide Area Networks (WANs). This incredible growth and renewed consumer condence has

    ushered in the era o Pervasive Wireless the availability o reliable, high-speed wireless connectivity nearly

    wherever and whenever a user requires it. In return, pervasive wireless, together with more powerul mobile devices,has enabled a dramatic shit in employee work habits. More workers are spending more time away rom their desks

    and on the road, and wherever they are and whatever the time o day, they require the tools they need to do their job.

  • 7/27/2019 CIO Guide Wireless Enterprise

    5/12

    32010 Research In Motion Limited. All rights reserved.

    Equally as important, over the last ew years, mobile devices have

    made huge strides. A new class o mobile device, the smartphone,

    eatures more powerul microprocessors, increased storage and

    larger, more colorul displays. A smartphone is capable o running

    many o the day-to-day applications that the consumer, pro-sumer

    and business user have come to depend on. Popular applications

    such as email, calendaring and messaging are standard on most

    smartphones, and these devices are making it possible to mobilize

    high-ROI, industry-specic applications. Smartphones gained 14%

    o the handheld market in 2008 and, according to one industry study,

    are expected to comprise 31% o the market by 2013.

    Not just smartphones, but most o todays mobile devices go beyond

    mobile voice and utilize wireless broadband networks to provide a

    ull-eatured mobile internet experience. In many locations, multiple

    connectivity options are available to the user, including:

    Short-range communications over a Personal Area Network (PAN),

    Medium-range connections over private or public Wi-Fi, or

    Longer range connections using the public cellular network

    to provide a Wide Area Network (WAN).

    This overlapping umbrella o wireless connectivity sets orth a new

    era o personal communications, the era o Pervasive Wireless the

    general availability o reliable, high-speed wireless connectivity

    almost wherever and whenever the user requires it. This document

    will provide the reader with a high-level background on wireless

    communications technology and identiy important issues and

    key trends or urther reading and consideration.

    IntroductionBy any measure, wireless communications can be considered a colossal success. By the end o 2008, the

    International Telecommunications Union (ITU) estimated that there were over 4 billion cell phone users globally.

    Incredibly, this means that almost two out o every three people on the planet have a mobile phone. Much o this

    remarkable success has only recently happened, as the number o global subscribers was less than 1 billion at

    the end o 2002. During the same period o accelerated subscriber growth, wireless network coverage also grew

    dramatically. Wireless network operators were completing their 2G networks and were starting to build out their3G networks and planning or even urther down the road.

  • 7/27/2019 CIO Guide Wireless Enterprise

    6/12

    4

    Many dierent types o networks share the wireless spectrum.

    Each type o wireless network, such as Personal Area Networks

    (PANs), Wireless LANs and MANs, has dierent capabilities,

    distinctive strengths and weaknesses that make them more

    suitable in dierent situations.

    Personal Area Network (PAN)

    A Personal Area Network (PAN) is typically low-power and

    short-range (

  • 7/27/2019 CIO Guide Wireless Enterprise

    7/12

    5

    It is common when writing about or discussing mobile

    telecommunications to reer to industry acronyms such as

    2G, 3G or 4G. These Gs reer to the generations o mobile

    telecommunications technology. The rst generation (1G) o

    wireless telecommunications began in the early 1980s with

    commercial deployment o Advanced Mobile Phone Service

    (AMPS) cellular networks. AMPS networks used circuit-switching

    technology to carry voice-only trac. In the early 1990s, mobile

    operators introduced Cellular Digital Packet Data (CDPD) onto the

    existing AMPS inrastructure to allow data transers up to 19.2Kbps.

    The second generation (2G) o wireless telecommunications emerged

    in the mid 1990s. Multiple competing digital voice standards

    made 2G much more complicated than 1G. In North America, some

    mobile operators adopted the Code Division Multiple Access (CDMA)

    standard, while others deployed networks based on Time Division

    Multiple Access (TDMA). Outside o North America, the clear winner

    was Global System or Mobile (GSM) communications. Each o these

    wireless technologies also released interim (2.5G) standards such as

    EDGE and 1xRTT to improve network perormance and user experience.

    Unortunately, 3G telecommunications are even more complicated

    than 2G. The high-level goal was or the 3G standard (IMT-2000) to

    create a digital, packet-switched network with increased bandwidth,

    a minimum speed o 2Mbps or stationary users and 348Kbps in a

    moving vehicle. Three competing 3G technologies were introduced

    as evolutions rom 2G. Most GSM network operators settled on

    Universal Mobile Telecommunications System (UMTS), also known

    as Wideband CDMA (W-CDMA), to oer download speeds o up to

    1.8Mbps. CDMA network operators deployed Code Division Multiple

    Access 2000 (CDMA2000) and the more commonly known 1xEV-DO(Evolution-Data Only). EV-DO oered an advantage over UMTS

    in that it was easily deployed in an overlay to the existing 2G

    inrastructure. UMTS, on the other hand, would require a signicant

    investment in spectrum and telecom inrastructure by the mobile

    network operators. A third 3G standard, Time Division-Synchronous

    Code Division Multiple Access (TD-SCDMA), has been selected as

    the 3G standard or the Peoples Republic o China.

    Going orward, the ITU has created the requirements or 4G wireless

    networks. The requirement states that a 4G network should be an

    all-IP, packet-switched network that is highly backwards compatible

    with existing wireless standards. The goal or 4G is to achieve mobile

    data rates o 100Mbps or mobile endpoints and speeds up to 1Gbps

    or stationary terminals. The technology contenders or 4G include

    Long Term Evolution (LTE) and World Interoperability or Microwave

    Access (WiMAX).

    Most mobile network operators have moved beyond 2G and are well

    into their 3G and 3.5G deployments. Moreover, many large network

    operators are rolling out their 4G inrastructure and plan to have

    operational networks in early 2010. In January 2009, a market research

    company estimated that there were over 290 million WCDMA (3G)

    users worldwide. Another rm expects that the number o users o

    mobile broadband services (3G, 3G+ technologies) will grow to over

    2 billion by 2014.

    2010 Research In Motion Limited. All rights reserved.

  • 7/27/2019 CIO Guide Wireless Enterprise

    8/12

    Mobile Applications

    Todays mobile devices are completely viable computing platorms

    many boast the same processing power and physical storage as

    laptop computers a ew years previously. These days, workers away

    rom their desks are able to do much more than talk on the phone and

    check their email. However, 1st Generation mobile applications such

    as wireless email, calendaring and messaging are sae, logical and

    cost-eective rst steps in an enterprise mobility strategy. They have

    a tremendous ROI and can rapidly pay or an enterprise mobility

    inrastructure that can then be leveraged or new mobile applications.

    When considering next-generation mobile applications beyond

    wireless email, businesses should identiy the challenges and

    opportunities that exist, the expected returns and the associated

    costs. This analysis should orm the business case to dene the

    projects scope and justiy necessary investments. Regardless o

    the wireless solutions businesses choose, they should be fexible,

    secure and scalable beyond their users immediate needs.

    For more inormation about mobile applications, visit

    www.blackberry.com/solutions or download the CIOs Guide

    to Mobile Applications.

    Unifed Communicationsand Fixed Mobile Convergence

    Wireless communications are becoming so pervasive and aordable

    that there is a signicant global trend toward Fixed Mobile Substitution

    (FMS) where consumers and businesses are substituting mobile

    service or conventional landlines. According to a 2008 report, more

    than 17% o US households have a cell phone and no landline, and

    another 13% have a landline that they rarely use. These numbers are

    consistent in the EU, where more than 18% o households are mobile

    only and Finland leads the pack, where a massive 47% o households

    use mobile as their only access method. One o the key enabling

    technologies or FMS is Mobile Unied Communications (UC) and

    Fixed Mobile Convergence (FMC).

    UC is generally considered to mean the consolidation o multiple

    methods o communication, including voice, email, instant

    messaging, presence and collaboration into a single application,

    which is controlled by a user or both business and social purposes.

    For example, a UC user might have a common inbox or email,

    voice and instant messages. The UC client sotware makes the user

    experience similar, whether using it on a desktop or a mobile device.

    According to one study, more than hal o SMBs and almost 75% o

    large enterprises are evaluating, installing or running UC solutions.

    UC reduces communications ragmentation and improves employee

    reachability and productivity.

    An important component o Mobile UC is Fixed Mobile Convergence.

    Fixed Mobile Convergence (FMC) allows people to have one phone

    number and voice mail that can be used on both xed (TDM or IP

    desk phones) and mobile (standard mobile phones or smartphones)

    devices. It should also provide seamless handover o calls between

    xed and mobile networks. For example, the automatic ability to

    move an active call rom desk phone to smartphone and vice versa.

    For more inormation about FMC, visit www.blackberry.com/mvs

    or download the CIOs Guide to FMC.

    Notable Trends or Enterprise MobilityAll o these types o networks PAN, WLAN, MAN and WAN are becoming aster and more reliable, resulting

    in explosive growth and utilization. More mobile subscribers taking advantage o new fat-rate data plans has

    resulted in a huge increase in mobile data usage. One inrastructure manuacturer estimates that by 2011, mobile

    data will overtake voice trac and will continue to grow exponentially until 2013. Since mobile network operators

    are deriving more and more o their average revenue per user (ARPU) rom data services, as opposed to legacy

    voice, they are strongly motivated to add value to their data networks and manage costs. Mobile network operatorsare upgrading their 2G and 3G networks to increase concurrency and reduce costs, while mobile device users are

    happily using the extra bandwidth or more multimedia messaging, social networking, and entirely new classes

    o mobile applications or both the enterprise and the consumer.

    6 The CIOs Guide to Wireless in the Enterprise Executive Overview

  • 7/27/2019 CIO Guide Wireless Enterprise

    9/12

    7

    Wireless Security

    The growth in wireless network coverage and a new generation o

    aster, more capable mobile devices have given mobile workers a

    valuable tool to help do their work outside o the walls o the company

    oce. However, there is a potential downside to this trend. More

    mobile workers doing their jobs outside o the secure boundaries

    o the oce increases the risk o compromising data security and/or

    allowing malicious users access back to the corporate network.

    There is also a higher likelihood that a mobile device that contains

    sensitive corporate data will be lost or stolen. While losing data may

    be only an inconvenience or embarrassment or some organizations,

    signicant nancial loss and legal risks may result in many cases.

    Companies that are interested in securing their mobile workers

    devices and preventing unauthorized access to important company

    resources need to implement an enterprise wireless security strategy.

    To be eective, an enterprise wireless security strategy needs to

    include means o securing the mobile device and its data, securing

    the communications to and rom the mobile device to the corporate

    network, and optimizing the enterprise network to support business

    mobility. The most eective wireless security strategy is a proactive

    one, to develop, educate, enorce and maintain an enterprise-wide

    wireless security policy. For more inormation about wireless security,

    visit www.blackberry.com/securityor download the CIOs Guide to

    Mobile Security.

    Mobile Device Management

    Another important consideration or companies that are dealing

    with rapidly growing ranks o mobile workers is Mobile Device

    Management (MDM). MDM solutions allow IT administrators to

    manage mobile devices similar to the way that they manage

    desktop and laptop computers. It includes a capability to distribute

    rmware upgrades, applications and conguration settings over

    the air (OTA) to mobile devices no matter where the device is located.

    An enterprise MDM solution ensures that mobile workers are up

    to date with the latest versions o applications and data, and that

    their device is secure. An eective MDM solution should include

    these important eatures:

    Over the Air (OTA) OTA acilitates the conguration o mobile

    devices, application updates and device locks when the mobile

    phone is lost or stolen.

    Back-up and Restore Back-up o a mobile device is an essential

    activity or dealing with hard-resets and lost or stolen devices.

    It can also be used or synchronizing les and olders between

    a desktop computer and a mobile device.

    Asset and Confguration Management Conguration

    management is designed to provide administrators the ability

    to view and categorize devices by user role, device type or anyother criteria. The administrator can then selectively use the

    categorization to congure application proles, mobile device

    settings and registry entries.

    Mobile Security Management Security management is

    designed to allow the administrator to enorce power-on

    passwords andVPN settings or wipe clean all corporate

    data stored on a lost or stolen device.

    As the numbers o dierent mobile device models grows and the

    number o mobile users within a corporation reaches critical mass,

    an enterprise MDM solution becomes a necessity. One analyst reportound that managed devices have signicantly lower TCO (by 53%

    to 63%) than unmanaged devices. This applies to mobile devices

    running native applications and those using the onboard browser

    and web-based solutions. An enterprise MDM solution is designed

    to improve mobile security, reduce risk and make it easier or IT

    administrators to manage the growing number o mobile users.

    Key Considerations or Enterprise MobilityBigger, aster networks enabling more and more mobile workers to take care o their jobs on the road and away

    rom their desks seems like a great scenario. However, along with the promise o reduced operational costs and

    increased productivity, there are some signicant issues to consider, such as avoiding potential regulatory issues,

    legal liability and/or new and unexpected costs, which each enterprise will need to evaluate with consideration to

    its particular circumstances.

    2010 Research In Motion Limited. All rights reserved.

  • 7/27/2019 CIO Guide Wireless Enterprise

    10/12

    8

    This means that as many as our billion wireless subscribers around

    the globe are expected to ramp up their data usage as they start to

    browse the mobile web and download applications. This growth in

    mobility is both an opportunity and a challenge to many enterprises.

    The potential rewards or implementing business mobility are

    impressive, but conversely, i not done correctly, there is the potential

    or huge expenses and associated risk. Enterprises must be aware

    o all o the issues surrounding business mobility. Wireless security

    and device management should be planned or, implemented and

    monitored to prevent data breaches and high TCO.

    Research In Motion (RIM) oers a number o dierent resources

    to learn more about wireless solutions in general and the

    BlackBerry solution in particular. The web site www.blackberry.com

    is a good place to start. The site eatures a developers orum

    at www.blackberry.com/developers/orum which is used by

    application developers around the world. RIM also oers BlackBerry

    solution reerence documents on a variety o topics. The Technical

    Knowledge Center on the site at www.blackberry.com/support

    can help you nd answers to particular questions.

    ConclusionThe core issue is the incredible growth in popularity o wireless technology. More and more people around the

    globe are using Bluetooth appliances, Wi-Fi (private and public) and public mobile networks. Mobile devices are

    becoming more capable and high-end devices like smartphones are no longer exclusive to mobile business

    proessionals.

    The CIOs Guide to Wireless in the Enterprise Executive Overview

  • 7/27/2019 CIO Guide Wireless Enterprise

    11/12

    92010 Research In Motion Limited. All rights reserved.

  • 7/27/2019 CIO Guide Wireless Enterprise

    12/12

    This material, including all material incorporated by reerence herein or made available by hyperlink, is provided or made accessible AS ISand AS AVAILABLEand withou t condition, endorsement, guarantee, representation or warranty o any kind by

    Research In Motion Limited and its afliated companies (RIM) and RIM assumes no responsibility or any typographical, technical, or other inaccuracies, errors or omissions in this material and shall not be liable or any type o damages related to this

    material or its use, or perormance, or non-perormance o any sotware, hardware, service, or any reerences to third-party sources o inormation, hardware or sotware, products or services including components and content such as content protected

    by copyright and/or third-party web sites.

    The limitations and exclusions herein shall apply irrespective o the nature o the cause o action and in no event shall any director, employee, agent, distributor, supplier or independent contractor o RIM have any liability related to or use o the material.

    2010 Research In Motion Limited. All rights reserved. BlackBerr y, RIM, Research In Motion, S ureType, S urePress and related trademarks, names and logos are the property o Research In Motion Limited and are registered and/or use d in the U.S. and

    countries around the world. All other trademarks are the property o their respective owners. MKT-31585- 001