Six Essential Steps For Unleashing The Power Of Enterprise .

4m ago
23 Views
0 Downloads
561.44 KB
8 Pages
Transcription

A Cisco Services White PaperSix Essential Steps for Unleashing the Power ofEnterprise MobilityNot too long ago, only a subset of enterprise workerswas mobile. Today, nearly all workers are. This newmobile majority, influenced by the advanced capabilitiesof consumer devices, wants to use those devices forwork. As a result:By enabling new and more efficient ways of working,the next-generation workspace has the potential tobuild complex, talent-based competitive advantage.However, devices are merely the first step to workspacetransformation. Workers are demanding virtual workspaces for anydevice with rich, collaborative experiences.A growing number of enterprises are taking advantageof external services to promote internal alignment acrossIT and business stakeholder groups and to develop acomprehensive strategy for their mobility initiatives.As you determine whether to take on this initiative aloneor seek the assistance of an experienced partner to planyour mobility initiative, consider the six essential steps inTable 1. Business leaders want to use thebring-your-own-device (BYOD) trend to reducecosts, attract and retain top talent, promote newbusiness models, increase productivity, and improvethe customer experience. IT must maintain adequate security measuresand compliance with government and industryregulations, while delivering a next-generationworkspace that is mobile, social, virtual, and visual.Figure 1. The Workspace RedefinedThen: DeskboundNow: UntetheredPC basedHandhelds ruleIT mployee-owneddevicesLimited connectivityUbiquitous connectivityClosed networkOpen networkMobile voiceMobile videoSeparate workersCollaborative workersPersonal productivityBusiness processproductivityDevice Freedom Without IT CompromiseThe mobility experts at Cisco Services have helpedcompanies all over the world untether the workforce.1

A Cisco Services White PaperTable 1. Six Essential Steps for Unleashing the Power of Enterprise Mobility in Your Organization1Develop a comprehensive enterprise mobility strategy2Optimize for virtualization3Prepare for the proliferation of devices4Determine your application strategy5Secure your devices, data, and network6Improve worker productivity and the end-user experienceStep 1: Develop a ComprehensiveEnterprise Mobility StrategyIncreased mobility has enterprises reacting to requeststo get mobile devices, such as smartphones ortablets, on the wireless LAN (WLAN), which in itselfnot difficult. All you need are a WLAN controller anda security product. However, this is purely a tacticalapproach that addresses only one aspect of mobilityand can create system-wide issues such as poorapplication performance, security breaches, subpar userexperiences, and more. Checklist 1 lists the steps indeveloping a comprehensive enterprise mobility strategy.Checklist 1.1. Define and prioritize what you want mobility to dofor your organization2. Clearly articulate the what, how, where, which,who, and when3. Determine what you do not want to do4. Identify the business use cases that support yourobjectives5. Develop a corresponding mobility architecturethat promotes business value6. Assess network, security, data center,communications, and applications infrastructuresThe hospital also wanted to provide better security andcontrol for guest access to the network. Cisco Servicesbegan by bringing primary hospital stakeholders together.Working with network, human resources, security, ITrisk and compliance, and mobility groups, consensuswas built around mobility needs and use cases.We then delivered an assessment that identified gaps inthe medical center’s current infrastructure and providedan evolutionary roadmap to an end state architecture thatsupports the use cases while enabling the hospital tocomply with strict security and privacy regulations.Define and Prioritize What You Want Mobilityto Do for Your OrganizationWhen Cisco Services work with enterprises to helpdevelop a mobility strategy, we begin by bringing bothbusiness and technical teams to the table to defineand prioritize what business goals will be enhanced orenabled by mobility.Clearly Articulate the What, How, Where,Which, Who, and WhenAfter you’ve clearly articulated “why” you need enhancedmobility, move on to these questions: What are the challenges faced by your IT organizationand employees? How can mobility help you solve these problems? Where will the mobility solutions be used?Services SnapshotCisco Services worked with a metropolitan medicalcenter to help it develop a BYOD strategy. The hospitalwanted to provide medical staff and contractorssecure access to applications and patient data fromboth personally owned and hospital-provided devices. Which user groups need them, and whichapplications are required to keep them productive? Who will manage them? When do you want or need to deploy them?2

A Cisco Services White PaperDetermine What You Do Not Want to DoStep 2: Optimize for VirtualizationWhen you have determined what you want to do, makesure to take the time to determine what you do notwant to do, because this can strongly influence themobility architecture you ultimately deploy. Regulatory,compliance, and security groups will be strongcontributors here and throughout the process.Enterprise IT leaders surveyed in the Cisco 2012 BYODand Virtualization Study indicated that half or more of theirorganization’s employees could benefit from workspacevirtualization. Cisco Services work with many enterpriseson virtualization initiatives. Some are just embarkingon desktop virtualization. Others have deployed virtualdesktops and are not getting the hoped-for results.Identify the Business Use CasesThat Support Your ObjectivesWe’ve found that the most common use cases—acrossindustries—are: Security for IT-provided mobile devices Onboarding personal mobile devices to thecorporate network Wireless guest access Third-party (for example, contractor and partner)mobile device accessDevelop a Corresponding Mobility ArchitectureThat Promotes Business ValueThese uses cases are instrumental in developing acorresponding mobility strategy and architecture thatwill promote business value around your stated goals.This approach will prevent you from taking an IT pathwith which you are not comfortable or that the businesswill not support.Assess Network, Security, Data Center,Communications, and Applications InfrastructuresYour existing infrastructure will have a significant effecton the mobility architecture design and how it will evolveover time. Therefore it is essential to assess the followingdomains. Network infrastructure to make sure it can deliveroptimal application performance and a positiveuser experience Security infrastructure and policy management tomake sure of robust security across network, device,data, and application layers in support of enterprise,organizational, and regulatory compliance policies Data center infrastructure to make sure compute andstorage resources are virtualized and can be scaledto support users and applications effectively Communications infrastructure to determine if it cansupport high-quality voice and video Application infrastructure to make sure it can supportadvanced collaborative capabilities such as unifiedcommunications and web-based video conferencingcan be extended to any device, anywhereWhatever the case, there are several ways we helpour customers increase value from their virtualizationinvestments. One thing we tell all of our customers isthat virtualization should be about more than cuttingcosts and improving security. Today’s highly competitiveenvironments require collaboration-friendly virtualdesktops. Any virtualization initiative should helpemployees access the people and resources they needto do their jobs effectively.Checklist 2 is a step-by-step breakdown of how you canoptimize for virtualization.Checklist 2.1. Collaboration-enable your virtual desktops2. Consider user experience initially at the time ofdeployment3. Create a consistent collaboration experienceacross devices4. Explore different deployment and financingoptions to manage TCO5. Plan for a time- and resource-intensive processCollaboration-Enable Your Virtual DesktopsDo more than virtualize the desktop—virtualize theworkspace, so you can provide advanced collaborationcapabilities such as presence, IM, location, and voiceand video conferencing.Consider User Experience Initiallyat the Time of DeploymentUser experience is the single biggest competitivedifferentiator for consumer technology. If voice and videoquality is poor, no one will use their virtual workspace.We also recommend defining use cases for today andtomorrow to make sure that quality of experience can bemaintained as new use cases are added.3

A Cisco Services White PaperConsidering services for your mobility initiative?Look for: An understanding of the complexities aroundaccelerating your transition A track record of transforming IT into a businessand revenue enabler Experience aligning network and business teamsaround use cases and objectives Proven ability to reduce total cost of ownership(TCO) and create return on investment (ROI)Create a Consistent CollaborationExperience Across DevicesIt’s also important to create a consistent collaborationexperience across devices. To enable a “work fromanywhere, anytime” culture requires bringing unifiedcommunications and collaboration tools together undera single, common interface. They must be accessiblefrom any device, in any location. Make sure yourvirtual desktop applications extend into your unifiedcommunications environment.Explore Different Deployment andFinancing Options to Manage TCOMany companies today are fiscally conservative.We always advise exploring different deploymentand financing options to manage your TCO. Returnon infrastructure investment for desktop virtualizationtypically takes three or more years. There are new publiccloud-based deployment models that enable thecost-efficient, self-service delivery of virtualizeddesktops. Strategic financing can also help bridgethe gap between technology requirements andbudget availability.Plan for a Time- and Resource-Intensive ProcessPlanning, building, and managing a highly collaborativevirtualized environment are difficult tasks. They requiretraditionally siloed teams within the enterprise towork together, including client computing, desktopapplications, networking, security, and data center.Converging these environments requires timeand expertise throughout the entire lifecycle ofdesktop virtualization.A new study from Forrester1 found that “Network teamslack the time and resources to manage and optimizetheir company’s infrastructure given the growingbusiness demand.” Forrester recommends partneringwith a strategic solution provider that has: A strong services arm Deep vertical expertise Experience in using the network to improvebusiness processes Validated solutions Integrated roadmaps to promote value and protectyour investment A modular building block approach that spans theuse case spectrum—from basic guest access todesktop virtualizationStep 3: Prepare for the Proliferationof DevicesIn our recent BYOD and virtualization study, Ciscosurveyed 600 enterprise IT leaders from 18 industries.Among the top 10 insights: Mobility is pervasive: 78 percent of U.S. white collarworkers use a mobile device for work purposes, andthey want to control their work experience. The growth of mobility has affected IT profoundly: by2014, the average number of connected devices perknowledge worker will reach 3.3. BYOD delivers several benefits to the enterprise; italso brings its share of challenges.Checklist 3.1. Use a holistic, architectural approach foreverything from switches to applications2. Use a unified network infrastructure that facilitatesworkspace delivery over wired, wireless, andcellular networks3. Create a comprehensive, unified end-to-endarchitecture to support users, devices,and locationsForrester, September 2011, Bridging the Expectations Gap: Intelligent Network Services Scale and Transform Your Business.14

A Cisco Services White PaperServices SnapshotCisco Services worked with a leading automobilemanufacturer that initially wanted to allowemployee-owned tablets onto its network.Discrete functional IT groups were taking differentapproaches, creating ongoing issues. Cisco Serviceshelped the manufacturer unify the effort and identify andprioritize use cases and develop a strategy to solve themobility issues. The best practices and guidance weprovided enabled the manufacturing company to avoidsecurity risks and successfully meet the expectations ofprimary executives.In the last 18 months, Cisco itself has witnessed some13,000 iPads enter its BYOD program. And Cisco ITnow supports more than 60,000 BYOD smartphones.If you are not feeling the pressure to “get in front” ofBYOD, you soon will. How do you prevent a proliferationof employee-owned devices from burying your ITdepartment and putting corporate data at risk? The mostimportant step is to apply an architectural approachto BYOD.Holistic, Architectural Approach forEverything from Switches to ApplicationsA growing number of managers are now acknowledgingthe need for a more holistic approach—one that isscalable and addresses mobility, security, virtualization,and network policy management—in order to keepmanagement costs in line while simultaneously providingoptimal experiences where savings can be realized,according to the 2012 Cisco IBSG Horizons Study.Unified Network Infrastructure That FacilitatesWorkspace Delivery over All NetworksAn architectural approach provides an organizingprinciple—or framework—for everything from switchesand routers to video, servers, wireless access points,security, and business applications. It gives you a solidfoundation on which to build and evolve BYOD plans andpolicies. An architectural approach also: Improves quality of experience