, an enterprise mobile management and mobile device management software provider, announced its top five predictions for enterprise mobility in 2011. Based on feedback from Zenprise's more than 350 enterprise customers, industry leaders, and emerging trends, Zenprise predicts that with the phenomenal growth of enterprise mobility, a new paradigm will emerge that unites employees with technology and broader business strategies.
Zenprise's top five predictions for 2011 include:
1. Tablets Usher a Fatal Blow To Laptops:
2011 will be the year that the laptop dies. Tablet computing devices such as the iPad and RIM's PlayBook will begin replacing laptops, particularly by executives who are travelling. Virtual Desktop Infrastructure (VDI) will make it easier to do many tasks traditionally done via laptops. According to Gartner, tablet sales will reach 54.8 million in 2011 and grow to more than 208 million in 2014. The range and diversity of mobile computing devices -- from smartphones and tablets to barcode scanners and card readers -- will escalate in 2011 as will the need for enterprises to manage and secure those devices.
2. iPads Will Trump iPhones in the Enterprise
After consumers raced out in droves to purchase iPhones, they quickly brought those devices to work and requested access to network resources like mail, calendar, and contacts: 2010 was the year of the employee-liable device in the enterprise. Next year the trend will shift to enterprises purchasing and deploying iPads for their employees. Now that enterprises have, for the most part, mobilized their workforce they are looking for ways to mobilize their business. With that comes the need to manage revenue-generating mobile applications as they traverse between customers, partners, and the enterprise. With its larger screen size and greater computing power, the iPad will be the device of choice for enterprises looking to deploy mobile business applications, more so than its iPhone counterpart.
3. Business Applications Reign Supreme
Applications will reign supreme in 2011. Need proof? The wireless industry's biggest tradeshow this fall was rebranded from CTIA Wireless IT and Entertainment to CTIA Enterprise and Applications, signaling a shift from entertainment-focused content to revenue-building line-of-business applications. In the year ahead, you'll also see the creation of a new kind of mobile application, the "microapp," which will enable employees to use their mobile devices for transactions commonly conducted via a company intranet, such as requesting additional business cards, expense approvals, vacation requests, etc.
4. Anytime/Anywhere Access Becomes an HR Issue
With the influx of employee-liable mobile devices entering the enterprise, more employees will be connected 24/7 to their work email, including non-exempt (hourly) personnel. Several lawsuits have emerged where employees claimed they were required to use their mobile devices after-hours without pay resulting from the ambiguity of the U.S. Department of Labor and Fair Labor Standards Act on how to handle personal technology in the workplace. In 2011, we anticipate that more employers will implement and enforce corporate policies to create clear guidelines for after-hours work on mobile devices and ensure proper compensation for non-exempt employees.
Organizations of all sizes need a written policy clearly outlining when non-salaried employees are authorized to work overtime. Managers need to be involved in the process. When they see employees working late and not recording or getting paid for their time that knowledge meets the standard of the law and employees must be compensated.
5. Mobile Malware and Compliance Up the Ante on Security
In addition to preventing traditional security threats and vulnerabilities such as malware on devices themselves, mobile security requires defining the policies, rights, and content workers receive on their devices. In 2011, companies will require increasingly sophisticated mobile security solutions that span multiple management layers including the network, device, and application levels.
"The definition of a network endpoint is rapidly evolving -- what used to be limited to desktops and laptops is quickly evolving to encompass devices ranging from smartphones to mobile computing devices," says Jayaram Bhat, CEO of Zenprise. "As a result, mobile management and security in 2011 will require taking a broader, more holistic approach that encompasses the people, the technology, and the business process."