Advertisment

Enterprise Mobility Strategies

author-image
PCQ Bureau
New Update

There is definitely a deep digital divide when it comes to

mobility. To Indian enterprises mobility is still largely defined as notebooks

and WiFi, while to the western world enterprise it comes in two flavors-the

road warrior and the roaming user. For road warriors, the entry point into

enterprise mobility is e-mail on the Blackberry. As the Forrester report on

“Mobility enterprise: defining your strategy” states, “the core

application for road warriors is always-on push e-mail.” While for the roaming

user, notebook is the key device. To quote from the same report, “armed with a

laptop, they need to be able to boot up and securely connect from locations as

diverse as hotel rooms, airports, coffee shops, and clients' offices”.

Advertisment
Research

Methodology



Many IT practitioners have shared their experiences and expertise for this story. Wherever possible, we have acknowledged their contribution. But in some instances, they have remained unnamed for reasons of confidentiality. While researching this story, we spoke to users and CIOs across 14 large enterprises in the country to figure out the current state of enterprise mobility, and to understand their strategies for the year ahead. We had further in-depth discussions with a smaller subset. There are some very clear strategic trends that emerge from the interactions. These have been referred to in the appropriate context. The interpretations of what they told us are ours and they are in no way responsible for the same.

As a

cursory survey at any Indian airport will show, we're at the roaming user

stage and are still to explore the larger contours of enterprise mobility. But

before that, this is not a typical PCQuest story, which looks at the

technology—product—solution trio. This story looks at the strategic

landscape of mobility; the current status and the road ahead in the short to

medium term. Specific products mentioned in this story may not have been

reviewed at Cybermedia Labs and are used more as illustration of a concept than

as a recommendation.

Defining mobility



While the stage of mobility that each one of them are currently in may be

different, all people we spoke to had a very clear idea what enterprise mobility

meant and what all it could include. “Technology which does not tie you to one

place and provides you the scope to move about without compromising on

service”, is how the head of engineering of a major Government enterprise

defined mobility. This was not way too different from the CIO of a multinational

whose take on mobility was,  “Accessing data / information seamlessly and

securely whenever or wherever using any media..”

Advertisment

For the sake of consistency, in this story, when we refer

to mobility, we are talking of accessing enterprise data and applications when

on the move, using devices that do not require to be wired. These devices

include primarily the notebook, connected over WiFi  to the LAN or WAN (and

the Internet), and various cellphones and PDAs also. In addition to this, we are

also referring to the back-end infrastructure that is required to make this

mobility happen.When we talk of application access, we are talking of access

primarily by non-PC devices, like the PDA or the cellphone.

Mobility status report



Like we mentioned earlier, the Indian enterprise is still in the state of

being the roaming user. Even there, notebook penetration levels are low, with

half of the organizations that we spoke to having deployment levels under 10%.

Similarly, in the case of WiFi, almost 75% of the organizations have plans to

improve deployment levels. But mobility for the enterprise is not just about

deploying notebooks and WiFi. There is a lot more to be done.

View Point
Do employees at a leading cellular service provider need any additional mobility? How does the application-mobility strategy pan out in such a scenario? The Head of IT at one such company shares his experiences.

You are in the mobile services business, so mobility is but natural. That apart, what were the key business reasons for choosing to go mobile with your

IT?



Service issue resolution in our business is becoming more of a hygiene factor than a business differentiator. The key need was empowering the sales & support force on the move to access internal data. This enabled the creation of mobile points of support, which improved TAT(turn around time)

dramatically.

Who all have been the key drivers of mobility?A. The drivers have been the sales & service teams, who wanted connectivity to resolve customer queries and issues across the desk, wherever that desk may be. This has enormously improved our customers' trust and loyalty and our service focus.Q.How have you handled security concerns? 



At the edge, connectivity is provided by our own technical team. We have allocated a seperate subnet (private IP) and we also use VPN tunnel from the laptop to the VPN Server, which allows access only to certain applications. Even with our other WiFi service providers we insisted on separate, private IP

ranges.

What challenges are you facing in the

process?



We need sound encryption from the laptop to the edge router. We also need multiple levels of authentication and encryption of all data in the Laptop/PDA based on a domain login. Realtime password systems such as that by RSA and also possibily biometric systems are needed to ensure that despite an intruder having acquired the user name and password or even the RSA security card, he cannot access the data in the mobile

system.

What should others lookout for, when implementing mobility

solutions?




Roubust VPN encryption at the edge router where connectivity is handed over to the mobile service provider is a must. You need a security policy that provides access only on all three criterion; What should you know?, What can you have? and What are you? Another must have is local storage encryption.

Advertisment

tages in mobility 



We define six stages (as shown in the schematic on the page to follow) in

moving an enterprise from a completely wired stage to complete wire-free access. The

strategic objective for the enterprise is not to aim for level six, but to first

define which of the six stages they want to be in and to define a time period

and the path by which they are going to achieve that stage. In fact, stage six

may be utopian for most enterprises and like '100% customer satisfaction'

could at best be a pole star that you keep in mind when formulating the mobility

strategy. Which of the six stages you want to be in will obviously be dictated

to by the business imperatives and by how much of a competitive advantage you

can create by mobile-enabling which all segments of your work force. As the IT

head of a leading cellular service provider told us, “The drivers for mobility

(in our organization) have been the corporate sales and  service teams, who

wanted connectivity as an enabler to resolve customer queries and issues across

the desk, wherever that desk may be. This has enormously improved our customers

trust and loyalty and on our service focus.”

The first step in the quest for enterprise mobility is

obviously the notebooks. For one to even think of mobility happening, notebook

deployment levels in organizations need to go up significantly. Obviously there

are exclusions, like in manufacturing organizations, where employees on the shop

floor will not need notebooks. But here again, other types of mobile wireless

devices including PDAs can be used to log production data to

production-management systems.

Once notebooks come in, it is but natural that you reach

stage two, where Wi-Fi access to the LAN and subsequently to the Enterprise WAN

gets deployed. While one would expect most enterprises to be atleast at this

stage, many, particularly the smaller ones still have to take the plunge. This

stage can be divided into two sub-stages, with Internet and e-mail being the

first and WAN access to deployed enterprise applications coming subsequently.

The next stage is e-mail access on mobile devices like PDAs and cellphones. The

western standard for this seems to be push based e-mail services like the

Blackberry. But over here, adhock solutions driven by user choice rather than by

organization wide design seems to be the norm.

Advertisment

The limitation seems to be the high cost of devices and

services that can deliver enterprise e-mail to the road warrior. But high costs

need not be a limiting factor for enterprises looking to enable their employees

to get their corporate e-mail on to a mobile device. The next stage in the road

to mobility is enabling application access from mobile wireless devices. The

classical example of this is the access and ability to update sales data from a

smartphone. Most enterprise applications now ship optional mobility modules.

There are also third-party solutions that can be integrated with most

applications, whether off the shelf or custom built. We will discuss one of

these later on in this story.

That brings us to stage five, of having your website mobile

enabled. Gone are the days when you had to create a separate WAP version of your

site to enable browsing on a mobile device. Having your website displayed on a

mobile device is a no-brainer now. With the Opera Mini browser installed, any

Web page can now be rendered on a cellphone. You would, of course, want to

ensure that the rendering is useable and easily navigable. A bigger challenge is

to enable your website to accept inputs from a mobile device, much like moblogs

(blogs updated from a cellphone) or how livejournal.com accepts and displays

photographs sent as MMS messages. Once you achieve this level, full enterprise

mobility, where the complete set of enterprise apps (on your enterprise portal)

and data is accessible over mobile devices. For most enterprises, achieving

stage four (applications on mobile devices) should be the aim in the medium to

long term, with stage three (email on mobile devices) being the short term goal.



Mobile e-mail



Like we said earlier, the high costs of a suitable smartphone or a Blackberry
device is a key inhibitor in making enterprise e-mail truly mobile. One of the

alternatives available is from net4nuts (net4nuts.com), an Ahmedabad based

company. Their mobile e-mail service works with most GPRS/WAP enabled handsets

and supports standard attachments like MS Word and MS Excel files, Zip files,

PDF files, GIF, JPG and so on. This service is oriented towards enterprises

rather than individual users and comes with administrative features that let

administrators add and delete users and so on. At about Rs. 150 per month, this

seems an affordable way to keep the road warriors in organization in touch with

their e-mail, wherever they are.


Advertisment

Applications over cellphone



Applications over cellphone is the bigger challenge compared to e-mail over
cellphone, and that is why, in our roadmap, we have placed it a step above

e-mail over cellphone. Typically application access on mobile devices is enabled

by using middleware, if the application itself is not built ground up for mobile

interfaces. One such middleware is Fred from Acceltree software (acceltree.com)

of Pune. Acceltree claims that its mobile framework enables customization and

deployment in about six to ten weeks and that applications can be accessed from

any Java enabled cellphone with GPRS or CDMA. The framework itself runs on an

application server like Tomcat or iPlanet on Linux, Solaris or Windows Server.


Deployment gives satisfaction



We asked our respondents to rate their satisfaction levels with WiFi and we had responses covering the whole spectrum, all the way from least satisfied to most satisfied. But when we segregated the responses based on whether the organization had implemented WiFi or not, we came across a very clear pattern. With hindsight, it is not a surprising pattern at all. 

As can be seen from the graph, those who had deployed

WiFi, very clearly displayed higher satisfaction levels than those who worked in organizations that had not. Obviously, there are a number of concerns about WiFi (with security being the most serious of these as discussed elsewhere) in the minds of users as well as

CIOs, which get dispelled only when implementations happen in their

organizations.

It would not be out of place to guess that the comfort factor with the other stages of mobility will also reflect a similar pattern. You need to implement it first!

Securing the mobile enterprise



Almost everyone we spoke to had security as their prime concern when
implementing mobility. Today, Wi-Fi networks use several different techniques

for security. The first and most notorious of all is called WEP (Wired

Equivalent Privacy). It's notorious because it can be cracked more easily than

all other


Advertisment
Notebooks



Notebooks and WiFi are still the key mobility enablers for Indian enterprises. While deployment levels continue to be low, the encouraging part is that the coming year could see the landscape altering significantly.In most of the organizations that we spoke to, notebooks are issued on a need basis, while a few issue notebooks on the basis of a recommendation. 

Security techniques.



For an enterprise wireless setup, using this for wireless security is not at all
recommended, unless of course, you've setup a separate wireless network for

casual browsing. Many organizations do this to allow their employees and guests

free access to the Internet. This is completely separate from the main network,

so there are no chances of any kind of hacking. WEP could be used as a security

option for this.


Next is MAC address based filtering, which allows you to

restrict access to your wireless network by MAC addresses. In this, you'll

have to enter into each access point, the MAC address of every user connecting

the wireless network. This can be quite a job for a large enterprise and is,

therefore, not recommended. Moreover, MAC addresses can also be spoofed by a

determined hacker, so it's not a very secure technique.

Advertisment

Currently, the most secure technique being used in

enterprise environments is WPA (WiFi Protected Access) or WPA2. There are two

variants available in these, called WPA-Personal and WPA-Enterprise.  The

former allows you to set up a password on the access point itself, while the

latter uses a server for user authentication and verification, and uses the IEEE

802.1x/EAP standard for the job. The techniques encrypt the communication

between wireless clients and the access points using TKIP in WPA and AES

encryption algorithm in WPA2.

Besides using technology, there are other practical

considerations to wireless security. One, of course, is the placement of the

wireless access point and the positioning of its antenna. If you keep it close

to the outer wall of your building, and don't even bother to change the

antenna settings, then obviously the wireless signal would travel out. Likewise,

if you're connecting two buildings using wireless, then you have to ensure

that the antennae are not configured to be omni-directional. Airtight Networks (airtightnetworks.net),

another Pune-based company offers a suite of products under the SpectraGuard

brand that help you plan and implement a secure wireless network. The AirTight

Spectraguard Enterprise claims to provide intrusion prevention for wireless

networks and also identify, isolate and locate rogue clients and transmitters on

the wireless network.

When you move beyond WiFi into the domain of enterprise applications, the issue of security becomes even more complex.

With email, basic security measures and quality of service are more often than

not enough. But once you graduate to providing application access, not only

these two, but also the security of the data on the mobile device and, of the

device itself becomes critical issue that you need to address.

Only one organization, out of the fourteen we talked to had fully mobile enabled enterprise applications, while five of them had partial enablement. Over half had not yet reached this stage.

Quality of service



Quality of service or reliability came as the second most repeated concern about
WiFi after security. And like with security, our guess is that this one also

spans the entire gamut of mobility and is not limited to WiFi. Let us take QoS

over WiFi as an example. The strategic landscapes are roughly similar. A good

wireless deployment strategy must cover the following aspects: what applications

are you primarily going to run on your wireless network; how much bandwidth

would be required for each mobile user; how many users this network will have at

a given time; and finally which areas you want to be covered by wireless.


Start with bandwidth and coverage. The real challenge in

deploying WiFi is to strike the right balance between coverage and the bandwidth

available. WiFi is still a shared networking technology, which means that all

users share the same bandwidth per access point. So first you need to have a fix

on the number of users who will connect to the WiFi network and their location.

Next determine how these users will use the WiFi network. If they'll use it

for running bandwidth intensive applications, then the number of users per

access point should be lower. So you'll need to provision for a higher access

points density in a given area. Some bandwidth intensive applications include

transferring large files, or streaming rich media over the network. Less

bandwidth intensive applications include simple Web access, e-mail, etc.

As you move farther away from a access point, signal strength reduces, which translates to lower throughput. A typical access

point can provide coverage within a radius of 150 ft or even 300 ft with a

higher gain antenna. What's important to remember here is the access point's

placement. There are tools available for planning access point location, like

wireless valley (recently taken over by Motorola's suite of tools or

Airtight's SpectraGuard Planner that come to your aid in planning Wi-Fi

networks. When it comes to making applications over mobile devices, you would

also need to take into consideration the roaming facilities and reach of your

mobile network provider among other things.

Voice mobility



While not strictly an IT infrastructure related issue, With voice moving

over to VOIP, it is worth discussing voice mobility here. Voice mobility is

about getting a call made to your office switched to your phone, wherever you

are, inside or outside of office. Solutions for doing this exist, with the

hurdle being more legal in nature. But the way technology is forcing the big

elephants of telcom and telcom policy formulation to dance, do not be surprised

if voice mobility becomes a reality in the next one to two year time frame.

Meanwhile if you want to look up the technologies for doing this, Ascendent

Systems (ascendentsystems.com), which was recently taken over by Research in

Motion, which owns the blackberry service is a good place to start your

research.

View Point

Rajesh

S Kurup, Research Director, eTechnology Group, IMRB discusses the issues

and concerns in mobile enabling a widely dispersed field force.



You

deploy a large field force to collect data. What are your key concerns in

deployment of mobile devices and applications for field data collection?




A.The most prevalent form of data collection continues to be in person
interviews using paper pencil. Mobile devices have not found a wider

acceptance on account of the following reasons:




  • Familiarity

    of usage by interviewers



  • Research

    issues: most tools and techniques of research has evolved for paper

    and pencil form of administration of questionnaire. So, amenability of

    data collection using this form factor for the



    specific research intricacies is an issue.



  • Cost

    of deploying the survey using mobile devices.



This

includes hardware cost, content/questionnaire development (including

adaptation of paper and pencil techniques to mobile devices, exposure of

stimulus/show cards, translation into local language etc.), management of

the device (eg. Theft, Insurance), etc.



Often this form of

data collection is quit cost prohibitive.

What

is the extent of mobile apps deployment with the field force. What devices

are used? Who does the software development?







Today this is not much compared to traditional data collection

methods. For a few customized projects these have been used. The software

is usually



in-house.



Could

you briefly describe what the app does and how the deployment of

questionnaires and collation of data is managed?







In case the data collected is technical in nature and there is

availability of software for extracting the data then it is possible to

use such devices. Eg, collecting GIS data, data on viewership of TV from

the television, etc. Such application of mobile devices doesn't require

a questionnaire. However, these require software/appropriately customized

hardware and connectivity or a solution to transfer the data back to the

main data pool. Other areas where one can use mobile devices such as PDA

etc are projects that have technologically evolved respondents as the

target group or respondents that are familiar or can be familiarized with

the usage of the device. These could be studies like product testing,

usually required for usability studies for tech products.







How

do you manage/plan to manage data security and device loss or theft?




For data security, the software becomes critical. However hardware theft
or loss is not 100% preventable. If the data captured is encrypted well,

hardware theft can actually have only a limited damage, towards the cost

of the hardware and no further.




What

benefits did you derive out of deploying mobile apps with your field

force?




Currently mastering this form of data collection can help opening up newer
areas for market research to cater to. For example, undertaking GIS data

collection, obtaining health statistics from individual patients for well

budgeted health management projects or other health/ patient surveys, etc.

(Basically data that cannot be best collected using face-to-face and paper

pencil method or phone interviews.)




However,

on account of cost, familiarity of usage of such devices and its

adaptation for MR, it would take quite some time before with one can see

large scale deployment of mobile devices for data collection.



What

were the key problems/constraints you faced? How were they resolved?




A.Getting appropriate talents to use the device for data collection;
translation of the user interface into local language; amenability of the

device based approach for obtaining data that is more accurate than

traditional methods; and cost effectiveness.




These

will continue to be challenges. A good comprehension of these challenges

can help us restrict the usage to select purpose and type of researches

and plan for the challenges adequately.



A

key learning that you would like to share with others looking at deploying

mobile filed applications?




A.Consider using mobile devices for collecting data that is other wise not
possible to collect using traditional methods. Thus, examine the merits

and de-merits closely with respect to accuracy of the data.




Always

ask, "will the quality of response suffer on account of displaying

the device to the respondent?"...will the lower income household get

awed by the device and, thus, will it result in biased responses? Will

this method give me superior data quality in a more timely manner than

traditional method. What additional value will it create for my client?



Be

aware that some of the device is likely to be stolen. Have a plan to

prevent this.

Anil Chopra and Krishna Kumar

Advertisment