世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

企業内とクラウド環境でのBYOD:市場課題と機会分析 2015-2020年

BYOD in Enterprise Applications and Cloud Environment: Market Challenge and Opportunity Analysis 2015 - 2020

 

出版社 出版年月電子版価格 ページ数
Mind Commerce
マインドコマース
2015年5月US$2,995149

サマリー

この調査レポートは、企業におけるBYODの課題、ビジネスチャンス、市場の今後を調査・分析しています。企業向けソリューションの調査結果や主要企業が提供するソリューションのSWOT分析も掲載しています。また2020年までのBYOD市場予測も行っています。

Overview

Bring your own device (BYOD) has become one of the most popular topics in information technology resulting from employees bringing their personal devices into the enterprise and then wanting to use them to access company information such as email and various enterprise files.  As the trend continues, bring your own technology will eventually facilitate user's integrating many device types (smartphones, tablets, wearable technology), software, and services with those from the enterprise.  Mind Commerce estimates that there will be 2 billion BYOD devices in workplace by 2020.

This research evaluates the challenges, opportunities, and market outlook for BYOD in enterprise and cloud environments. The report assesses BYOD market trends, BYOD project implementation, emerging role in cloud environment, the impact of gamification and the convergence of Social, Mobility, Analytics, and Cloud (SMAC).  The report includes market projections, BYOD and MDM company solutions, and SWOT analysis for major provider solutions.  All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Target Audience:

  • Mobile network operators
  • Wireless device manufacturers
  • Wireless infrastructure providers
  • OTT application and service providers
  • Mobile Device Management (MDM) companies
  • Mobile personalization and entertainment companies
  • Enterprise mobility management across all industry verticals

Report Benefits:

  • BYOD forecasts through 2020
  • Identify BYOD success factors
  • Learn BYOD implementation strategies
  • Learn about MDM and COPE strategies
  • Understand BYOD security and privacy issues
  • Understand MAM, MIM, and ID management
  • Identify leading BYOD companies and solutions
  • Understand the impact of gamification and SMAC


目次

Table of Contents

1.0          EXECUTIVE SUMMARY
2.0          INTRODUCTION               
2.1          CONSUMERIZATION OF IT AND BYOD    
2.2          MDM AND EMM             
2.3          MOBILE VIRTUALIZATION           
2.4          CYOD/HYOD/COPE VS. BYOD     
2.5          MAM, MIM, AND IDENTITY MANAGEMENT       
3.0          BYOD TRENDS   
3.1          HIGH PENETRATION OF MOBILE               
3.2          MOBILITY OF WORKFORCE         
3.3          FLEXIBLE WORK ENVIRONMENT               
3.4          AVAILABILITY AND PERFORMANCE OF MOBILE DEVICE
3.5          BYOD PRODUCTIVITY    
3.6          BYOD SECURITY               
3.7          OPEX REDUCTION           
3.8          EMPLOYEE EMPOWERMENT      
3.9          MOBILE OS        
3.10        MANDATING BYOD AS APPROACH         
3.11        MOBILE DEVICE MANAGEMENT               
3.12        MODERNIZING LEGACY APPLICATION   
3.13        VIRTUAL WORKING ENVIRONMENT       
3.14        WEARABLE TECHNOLOGY            
3.15        ENTERPRISE IT  
3.16        TABLET COMPUTING     
4.0          BYOD IN ENTERPRISE     
4.1          WHY BYOD FOR ENTERPRISE MOBILITY  
4.2          BENEFITS OF BYOD         
4.3          BYOD OBSTACLES            
4.3.1      REDUCE EMPLOYEE'S PRODUCTIVITY     
4.3.2      LICENSING         
4.3.3      COST RISK          
4.4          STRATEGY TO SECURE ENTERPRISE          
4.4.1      CONTAINERIZATION      
4.4.2      MAM   
4.4.3      IDENTITY AND ACCESS MANAGEMENT
4.5          BYOD IN SMBS
4.6          OTHER CONSIDERATIONS FOR SMBS      
4.6.1      NOTIFICATION
4.6.2      BEST PRACTICES ADOPTION       
4.6.3      TRANSPARENT POLICY  
4.6.4      EMPLOYEE EDUCATION
4.6.5      DATA SEGREGATION     
4.6.6      SOCIAL FACTOR               
4.6.7      PREVENT DATA LEAKAGE            
4.6.8      IT SUPPORT       
4.7          LOCATION IMPACT AND SOLUTION        
4.7.1      LOCAID: FULL SCALE ENTERPRISE LOCATION SOLUTION
5.0          BYOD APPLICATIONS IN ENTERPRISE SECTORS   
5.1          TRAVEL AGENCY              
5.2          HEALTHCARE INDUSTRY               
5.3          GOVERNMENT AGENCY               
5.4          WORKPLACE ENVIRONMENT     
5.5          ROLE OF MNOS
6.0          BYOD IN CLOUD ENVIRONMENT              
6.1          CLOUD BYOD ADOPTION             
6.2          ENTERPRISE MIGRATION TO CLOUD       
6.3          ENTERPRISE BENEFITS OF CLOUD SERVICE           
6.4          CLOUD GROWTH DRIVERS          
6.5          DATA SECURITY IN CLOUD          
6.6          CLOUD APP SECURITY CHALLENGE          
6.7          PROTECTING CORPORATE ASSETS           
6.8          CASE STUDY      
6.8.1      DOMINO'S PIZZA            
6.8.2      LONDON AIRPORT          
7.0          ENTERPRISE MDM          
7.1          MDM OR EMM
7.1.1      DEVICE MANAGEMENT
7.1.2      APPLICATION MANAGEMENT   
7.1.3      NETWORK MANAGEMENT         
7.1.4      DATA MANAGEMENT   
7.2          RECOMMENDED FEATURES FOR MDM  
7.3          MDM PROJECTIONS AND TREND 2015 - 2020     
7.3.1      ENTERPRISE PERCEPTION ON BYOD IN WORKPLACE        
7.3.2      ENTERPRISE BELIEF OVER MOBILE WORKFORCE
7.3.3      WORKPLACE MOBILITY TREND OF PROFESSIONALS 2015 - 2020  
7.3.4      EMPLOYEE RATIO OF PERSONAL DEVICES 2015 - 2020     
7.3.5      WHAT EMPLOYEE FEELINGS ABOUT USING PERSONAL DEVICES FOR WORK         
7.3.6      COMPANIES ON MOBILE WORKFORCE ADOPTION 2015 - 2020   
7.3.7      COMPANY CONCERN OVER ALLOWING PERSONAL DEVICES IN WORKPLACE       
7.3.8      MOBILE WORKFORCE ADOPTION SCENARIO      
7.3.9      PERSONAL MOBILE DEVICES IN TODAY'S WORKPLACE   
7.3.10    MOBILE MALWARE THREAT & MOBILE WORKFORCE DILEMMA  
7.3.11    HOW COMPANIES MANAGE MOBILITY WITH SOLID STRATEGY  
7.4          VENDOR ANALYSIS         
8.0          MOBILE VIRTUALIZATION           
9.0          BYOD TREND IN SMAC CONVERGENCE  
10.0        GAMIFICATION AND BYOD         
11.0        ENTERPRISE CHALLENGES           
11.1        POLICY VS. REGULATORY             
11.1.1    DEFINE WHAT WILL BE ALLOWED AND WHAT IS NOT      
11.1.2    SET CLEAR AND WRITTEN POLICIES         
11.1.3    DETERMINE WHOSE DATA IS?   
11.1.4    WHO OWNS THE HARDWARE?  
11.2        SECURITY VS. INFRASTRUCTURE              
11.3        COST VS. REVENUE        
11.4        WORKING CULTURE CHALLENGES           
11.5        SECURITY RISK OF BYOD DEPLOYMENT  
11.6        REASONS OF SECURITY RISKS    
11.6.1    OUTDATED SOFTWARE
11.6.2    INABILITY TO PREVENT INSTALLATION OF SPECIFIC MOBILE APPS            
11.6.3    CONSUMERIZATION OF CLOUD STORAGE           
12.0        BYOD IMPLEMENTATION            
12.1        IDENTIFYING RIGHT APPROACH               
12.2        EVALUATING BYOD DEPLOYMENT FACTORS       
12.3        EVALUATING HYBRID BYOD        
12.4        MINIMIZING MOBILE SECURITY RISKS   
12.5        EVALUATING MOBILE DEVICE OWNERSHIP         
12.6        COBIT 5 FRAMEWORK   
13.0        BYOD PROJECT MANAGEMENT
13.1        PROJECT TEAM
13.2        BYOD ROADMAP             
13.3        POLICY GUIDELINE         
13.4        RIGHT INFRASTRUCTURE             
13.5        DATA OWNERSHIP         
13.6        ACCESS POLICY
13.7        ROBUST SUPPORT          
13.8        FINANCIAL ELEMENTS  
14.0        BYOD IMPLICATION FOR CIO AND IT DEPARTMENT         
14.1        BROKER OF CHOICE        
14.2        COST SAVER      
14.3        SECURITY ENABLER        
15.0        BYOD MARKET PROJECTIONS    
15.1        GLOBAL CONNECTED DEVICE PROJECTION 2015 - 2020  
15.2        M2M VS. PERSONAL HANDHELD CONNECTION 2015 - 2020         
15.3        CONNECTED DEVICE IN REGIONS 2015 - 2020    
15.4        GLOBAL MOBILE DATA TRAFFIC 2015 - 2019       
15.5        MOBILE DATA TRAFFIC BY REGION 2015 - 2019
15.6        GLOBAL BYOD DEVICES IN WORKPLACE 2015 - 2020        
15.7        BYOD DEVICES BY MOBILE OS 2015 - 2020             
15.7.1    WHY APPLE IS STILL NUMBER ONE          
15.8        WORKPLACE BYOD BY TYPES OF DEVICES 2015 - 2020     
15.9        BYOD ADOPTION IN ENTERPRISE 2015 - 2020      
15.10     GLOBAL CONNECTED DEVICES BY NETWORK 2015 - 2029              
15.11     GLOBAL CONNECTED TRAFFIC SOURCE 2015 - 2019          
15.12     GLOBAL CONNECTED CLOUD TRAFFIC 2015 - 2019            
15.13     GLOBAL CELLULAR VS. OFFLOAD TRAFFIC 2015 - 2019     
15.14     ENTERPRISE SUPPORT PLAN FOR BYOD
15.15     DURATION OF BYOD POLICY IN ENTERPRISE       
15.16     PERCENT OF MOBILE BUDGET SPENT ON BYOD BY COUNTRY      
15.17     DESKTOP VIRTUALIZATION STRATEGY IMPLEMENTATION            
16.0        BYOD BY REGION            
16.1        GROWTH MARKET VS. MATURE MARKET             
16.1.1    LACK OF BYOD MANAGEMENT
16.1.2    AVERAGE OF NUMBER OF BYOD DEVICE 2014    
16.1.3    BYOD BENEFITS 2014     
16.2        EUROPE ANALYSIS          
16.2.1    UNITED KINGDOM         
16.2.2    FRANCE               
16.2.3    GERMANY          
16.2.4    RUSSIA
16.3        APAC ANALYSIS               
16.3.1    CHINA  
16.3.2    INDIA   
16.4        LATIN AMERICA               
16.4.1    BRAZIL
16.4.2    MEXICO              
17.0        BYOD VENDOR ANALYSIS            
17.1        HP         
17.1.1    SWOT ANALYSIS              
17.2        DELL      
17.2.1    MOBILE ACCESS SOLUTION SET
17.2.2    CLOUD EXPERIENCE SOLUTION SET         
17.2.3    NETWORK OPTIMIZATION SOLUTION SET            
17.2.4    APPLICATION MODERNIZATION AND DEVELOPMENT SOLUTION SET      
17.2.5    SWOT ANALYSIS              
17.3        HUAWEI              
17.3.1    SWOT ANALYSIS              
17.4        RUCKS AND AEROHIVE
17.4.1    SWOT ANALYSIS              
17.5        ARUBA 105
17.5.1    SWOT ANALYSIS              
17.6        CISCO   
17.6.1    CISCO MERAKI
17.6.2    SWOT ANALYSIS              
17.7        CITRIX   110
17.7.1    SWOT ANALYSIS              
17.8        ENTERASYS: MOBILE IDENTITY ACCESS MANAGEMENT
17.8.1    SWOT ANALYSIS              
17.9        ARMOR5             
17.9.1    COMPANY DESCRIPTION             
17.9.2    CLOUD BASED SOLUTION            
17.9.3    ZERO TOUCH DEPLOYMENT MODEL        
17.9.4    BEST SECURITY: REDUCE ATTACK SURFACE          
17.9.5    SWOT ANALYSIS              
17.10     DOMO
17.10.1  COMPANY DESCRIPTION             
17.10.2  BUSINESS INTELLIGENCE (BI) VS. BIG DATA & ANALYTICS             
17.10.3  BI DASHBOARD AND EXECUTIVE MANAGEMENT PLATFORM      
17.10.4  SWOT ANALYSIS              
17.11     DIVIDE BY ENTERPROID
17.11.1  COMPANY DESCRIPTION             
17.11.2  DIVIDE PLATFORM         
17.11.3  VIRTUALIZATION & DEVICE MANAGEMENT        
17.11.4  WORK-LIFE BALANCE & DIVIDE PLATFORM         
17.11.5  SWOT ANALYSIS              
17.12     MOBILESPACES
17.12.1  COMPANY DESCRIPTION             
17.12.2  ENTERPRISE APP SORE, EMPLOYEE PRIVACY AND BYOD SOLUTION          
17.12.3  SWOT ANALYSIS              
17.13     MOCANA           
17.13.1  COMPANY DESCRIPTION             
17.13.2  SOLUTION APPROACH  
17.13.3  PRODUCT & SERVICE PARADIGM             
17.13.4  INDUSTRY SERVICE HORIZON    
17.13.5  SOLUTION FRAMEWORK             
17.13.6  MOBILE APP PROTECTION & BYOD          
17.13.7  APP WRAPPING SOLUTION AND MOCANA PARTNERSHIP WITH APPERIAN          
17.13.8  SWOT ANALYSIS FOR MAP          
17.14     APPERIAN          
17.14.1  COMPANY DESCRIPTION             
17.14.2  MAM PLATFORM AND EASE      
17.14.3  SWOT ANALYSIS              
17.15     ROAMBI              
17.15.1  COMPANY DESCRIPTION             
17.15.2  ROAMBI FLOW
18.0        MDM VENDOR ANALYSIS            
18.1        AIRWATCH         
18.2        APPLE PROFILE MANAGER          
18.3        BOXTONE           
18.4        CENTRIFY            
18.5        GOOD TECHNOLOGY     
18.6        IBM       
18.7        LANDESK            
18.8        MICROSOFT      
18.9        MOBILEIRON    
18.10     SAP       
18.11     SYMANTEC        
18.12     ZENPRISE/CITRIX             
18.13     FIBERLINK
18.14     MOTOROLA SOLUTIONS              
18.15     BLACKBERRY     
18.16     TREND MICRO  
18.17     SOTI      
18.18     ABSOLUTE SOFTWARE  
18.19     ANTENNA SOFTWARE   
18.20     KONY   
18.21     MCAFEE              
18.22     SMITH MICRO SOFTWARE           
18.23     SOPHOS              
18.24     TANGOE             
18.25     WAVELINK         
18.26     JUNIPER NETWORKS     
18.27     CSC       
19.0        CASE ANALYSIS
19.1        MICROSOFT AZURE ACTIVE DIRECTORY CASE     
19.1.1    BENEFITS ACHIEVED BY COMPANIES      
19.2        IBM       
19.3        DIGID   
19.4        DIMENSION DATA          
20.0        CONCLUSIONS AND RECOMMENDATIONS          
20.1        RECOMMENDED CHECKLIST TO SELECT BYOD SOLUTION PROVIDER

Figures

Figure 1: Driving Forces of Mobility Adoption of Enterprises        
Figure 2: BYOD Opportunities Allocation 2015 - 2017       
Figure 3: Activity cycle of Enterprise Mobility      
Figure 4: Deployment Difficulties of Enterprise Mobility
Figure 5: Steps for Implementing BYOD in SMBs               
Figure 6: Growth Predictions of Government Agencies Using BYOD 2015 - 2018
Figure 7: Percent of Workers not willing to Work from Home      
Figure 8: Strategic Consideration of BYOD Organization
Figure 9: Decision Making Factor for Cloud BYOD Adoption          
Figure 10: BYOD Applications Available via Cloud 2015 - 2018      
Figure 11: Enterprise Function Migration to Cloud Services          
Figure 12: Enterprise Benefits Derived from Cloud Adoption       
Figure 13: Personal Devices in Workplace as Corporate Security Risk 2015             
Figure 14: Professionals use 2 Devices vs. 3 or More Devices 2015 - 2020              
Figure 15: Employee Personal Devices vs. Ownership Status 2015 - 2020
Figure 16: Right vs. Want to Break Company Rule vs. Dislike MDM on Device 2015            
Figure 17: Company Allow Personal Devices vs. MDM 2015 - 2020             
Figure 18: Company Device Policy Breakdown 2015         
Figure 19: Companies Who Allow Personal Devices in Workplace 2015    
Figure 20: Personal Mobile Devices in Workplace 2015   
Figure 21: Companies Managing Mobility in Different Ways 2015              
Figure 22: VMware's Horizon Mobile and Horizon Mobile Manager          
Figure 23: Employees using BYOD Devices 2015
Figure 24 Obstacles for BYOD Adoption 2015      
Figure 25: Security Issues and Impact on BYOD Decision Making 2015      
Figure 26: Mobile Security Options for BYOD and HYOD
Figure 27: Connected Device by Region 2015 - 2020        
Figure 28: Global Mobile Data Traffic Exabytes per Month 2015 - 2019   
Figure 29: Mobile Data Traffic Exabytes per Month by Region 2015 - 2019            
Figure 30: Global BYOD Devices 2015 - 2020        
Figure 31: Percentage of OS Used in BYOD Environment 2015 - 2020        
Figure 32: Workplace BYOD (Smartphone vs. Tablet & Wearable) 2015 - 2020     
Figure 33: BYOD Adoption (Large vs. Medium &. Small Enterprise) 2015 - 2020    
Figure 34: Global Connected Device by Technology 2015 - 2019
Figure 35: Global Connected Traffic Source 2015 - 2019
Figure 36: Global Connected Traffic by Cloud vs. Non-Cloud 2015 - 2019
Figure 37: Global Connected Traffic by Cellular Source vs. Offload 2015 - 2019    
Figure 38: Percent of Enterprise Support Plan for BYOD Adoption             
Figure 39: Length of Time BYOD Policy in Enterprise by Percent of Enterprise      
Figure 40: Percent of Mobile Budget spent on BYOD by Country               
Figure 41: Desktop Virtualization Strategy Implementation by Region     
Figure 42: BYOD in Developed vs. Developing Markets
Figure 43: Lack of BYOD Management Issues      
Figure 44: Average Number of Connected Devices per Knowledge Worker          
Figure 45: BYOD Benefits to the Company by Country
Figure 46: IMC BYOD Solution of HP        
Figure 47: SWOT Analysis for Dell BYOD Solution               
Figure 48: Different Phase for BYOD

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る