Advertisment

Opinion: Moving Beyond The Pilot

author-image
DQI Bureau
New Update

No one denies the benefits of mobility solutions. Even text-based email and
messaging solutions can offer hours of increased productivity for each employee
every day.

Advertisment

More sophisticated mobile solutions-featuring real-time data collection and
exchange with enterprise applications-mobile sales, mobile service management,
mobile asset management, mobile procurement, inventory, and warehouse
management-can actually transform the way a company conducts business and
interacts with its customers.

End user companies are quick to acknowledge the power of mobile solutions
within their enterprises. Yet, many of these companies are not so quick to
actually roll out hardware and applications to their employees. In most cases,
it's not a resistance to the technology. When it comes to mobilizing a
workforce, pilot projects seem to be everywhere. Moving from pilot to full-scale
deployment, well, that's another issue altogether. Even the most promising
mobile pilot projects get stalled for any number of reasons, ranging from
security to scalability. Temporarily halting the deployment of a mobile solution
may be a prudent course of action. Ignoring the deployment of a mobile solution
is foolhardy. The technology and its benefits will not go away.

It's tempting to think that the safest bet is to simply not deploy a mobile
solution. Actually, the opposite is true. First, there are immeasurable
productivity benefits that a company will miss through this inaction. Second,
employees will attempt to connect to the network with unauthorized devices. And,
the false sense of security that existed, will be shattered.

Advertisment

When it comes to mobility within an enterprise, there is no sense in fighting
it. It's inevitable, so embracing and managing the technology, is the wisest
approach. Given that there are several key points to address before rolling out
a mobile solution to your workforce. Security, obviously, is the biggest
concern. But enterprises also need to consider the scalability of the solution,
types of devices, end users, and the road map for mobility within their
companies. It's all right that the deployment plan may be deliberate. It's
inexcusable, however, not to have a plan in place

Security: Bull in a China Shop

Security is the primary issue that halts a mobile deployment in its tracks.
Managing mobile devices-hundreds and thousands in some cases-that have the
ability to access enterprise data gives the IT department chills. It's tough
enough to control desktops and mobility multiplies, and complicates the issue.
Wrapping your arms around this problem starts with centrally managing security.
All of the mobile devices supported by the enterprise have to be managed by one
department or location. If a handheld is lost or stolen, for example, the IT
security folks need the ability to defuse that device as a potential threat to
the company. This device-level management allows a company to eliminate the
possibility of an intruder accessing corporate data. The handheld or laptop may
be lost forever, but it's not a security bomb waiting to explode.

Security,
obviously, is the biggest concern. But enterprises also need to consider
the scalability of the solution, types of devices, end users, and the road
map for mobility within their companies.
Advertisment

There are two basic levels of security that every company must address, when
it comes to mobile solutions. You first need to authenticate the user to the
device. Second, you have to authenticate the device to the network. There are
multiple ways to accomplish these objectives. But, this two-step authentication
is critical. Passwords, power-on passwords, and even biometric security (such as
fingerprint identification) can all be employed in the authentication process to
raise the level of security. Additionally, data stored on the hard drive of the
device can be encrypted and rendered useless if the right security measures are
taken.

Security should also be user friendly. If employees don't follow the
security measures in place or look for ways to circumvent security, it's an
obvious problem. In most cases, employees are not looking to evade security as
much as they are trying to make their mobile lives a little simpler.

Mobility: A Journey, Not a Destination

A mobility pilot project may start as a point solution, such as allowing
e-mail access for a handful of salespeople within a company. Eventually, users
will ask for more functionality. Email on the road is great, but how about
accessing the CRM system to update contact information? As long as you're at
it, you might as well let the sales people access inventory data so they can
check on customers' order status.

Advertisment

Mobility projects without a road map can spiral out of control and quickly
become unmanageable and expensive. The key is to start small, but have a plan to
expand. That plan should include input from various user types (eg executives,
salespeople) within the company, technology manufacturers, and integration
partners. Understand how technology will change over the next few years and how
that will affect the path you are charting. You also need to establish a
standard for the devices that your company will support within the framework of
your mobile strategy. The IT department should establish a security standard
that serves as a threshold for all devices. Then, it's a simple decision as to
the types of devices that will be supported. If a device meets the standard,
then it can be supported within the enterprise.

Even the
most secure, scalable mobile solution is ineffective if employees don't
embrace the technology they are demanding and you are delivering

Even with such a standard in place, IT departments should not expect to
support a never-ending stream of hardware connected to the network. Many
employees may only need text-based e-mail and messaging, so the company can
standardize on one device. Others may need handhelds to access a specific
application, which may lead to the standardization on a different device. In the
long run, it may be helpful to work backwards. In other words, start with the
types of users who will be supported. Then, try and determine the devices they
will require.

Advertisment

Front Load the Project Schedule

Security and a mobility road map both need to be addressed before a company
embarks on a mobility deployment. However, there is plenty of up-front work that
must be completed before launching a pilot, and certainly, before
implementation. Companies should lean on technology vendors and integration
partners to configure mobile hardware before devices end up at the doorstep of
the end user business. If you choose to limit access to certain aspects of the
operating system that can be handled before you deliver the products. Specific
applications may also need to be loaded. Again, the end user company should let
others handle this configuration. There's enough to do without burdening the
IT department with the prospect of configuring hundreds or thousands of mobile
devices.

The more work you can get accomplished up front, the less expensive the
overall rollout will be in the long run. The manufacturer you are working with
or an integration partner can handle the staging of those devices.

Part of that 'up-front' work should also include employee training. There
is no need to wait until products arrive on-site to begin training employees on
how they should use them. In many cases, mobile solutions will be replacing
paper-based and manual processes. They will also be upending many of the
established policies and procedures that have been in place for years. So,
training should start early to reduce or eliminate potential headaches during
the deployment. After all, even the most secure, scalable mobile solution is
ineffective if employees don't embrace the technology they are demanding and
you are delivering.

Advertisment

Ravi Subramanyam, CEO of
MobileOne P Ltd

mail@dqindia.com

Advertisment