Download as pdf
Download as pdf
You are on page 1of 7

2011 Enterprise Mobility Solutions

Research conducted across the IDG Enterprise brands: CIO, CSO, Computerworld, InfoWorld, ITworld & Network World

MOBILITY

MOBILITY

Purpose & Methodology


Purpose
The survey was designed to explore how organizations are investing in mobile technology now and in the future as well as the important challenges or barriers to implementing mobile solutions, and factors used to evaluate mobile technologies. It also looked at how IT is addressing management and support of mobile devices and platforms, and how the proliferation of mobile technologies is effecting organizations on a company-wide scale, and within the IT organization,. The survey was conducted across IDG Enterprise brand (CIO, Computerworld, CSO, InfoWorld, ITworld and Network World) via pop-ups on sites, through newsletters and email invitations, and the Computerworld Inner Circle and the Network World Technology Opinion Panels. All survey respondents are involved in the purchase of mobile products and services at their organization. Survey fielded from August 27 October 5, 2010 Total Respondents: 1,238 Margin of error: +/- 2.8 percentage points

Methodology

METHODOLOGY RESULTS CONCLUSION DEMOGRAPHICS

Source: 2011 IDG Enterprise Mobility Research, October 2010

MOBILITY

Productivity and Customer Support are Top Drivers


Gaining productivity advantages Improving customer support or services Need for real-time information Gaining a competitive/information edge Improving accuracy of data collected in the field Lowering operating costs Expanding revenue opportunities Improving supply chain management 42% 71% 70% 67% 87% 86% 84% 79%

METHODOLOGY

Q. How important are the following as business drivers of investments in mobile technology?
Source: 2011 CIO Mobility Survey, October 2010 Note: Responses based on moderate or high investment priority.

RESULTS CONCLUSION DEMOGRAPHICS

MOBILITY

Company Size Impacts Mobile Security Challenges


Data Leak Prevention Preventing Data Loss Due to Lost Mobile Devices Data Encryption Patch and Vulnerability Management Setting and Maintaining Security Policies Maintaining an Active Inventory of Active Mobile Devices Virus and Spam Detection/Prevention Intrusion Detection/Prevention Ensuring Technology Compliance Backup and Recovery Managing Access to Data None of the Above Not Sure 25% 35% 45% 45% 42% 41% 38% 35% 33% 37% 30% 26% 58% 54% 48% 50% 56% 56% 52% 64%

58% 54% <1000 Employees

2% 0% 2% 2%

1000+ Employees

METHODOLOGY

Q. What are your organizations top challenges with regards to ensuring and maintaining the security of
mobile technology?
Source: 2011 CSO Mobility Survey, October 2010

RESULTS CONCLUSION DEMOGRAPHICS

MOBILITY

Mobile Purchase Process an Average of 19.7 Weeks


Mobile Devices Mobile Applications Wireless Networks Security or Data Management Middleware

6.4 7

5 5.4

5.9 6.6

17.3 weeks 19 weeks 19.3 weeks

7
7.8 8.4

5.3
5.8 6.2
Make a Short List

7
6.9 7.6
Make a Purchase

20.5 weeks 22.2 weeks

Research Products / Opportunities

METHODOLOGY

Q. When a need for the following mobile technology types is determined, how long (in weeks) does it typically take
your organization toresearch products/opportunities, make a short list, make a purchase?
Source: 2011 InfoWorld Mobility Survey, October 2010

RESULTS CONCLUSION DEMOGRAPHICS

MOBILITY

Conclusion
Productivity, Customer Support and Need for Real-Time Information are top drivers of investments in mobile technology Security and reliability of mobile solutions are critical to organizations IT department is burdened with the spread of mobile technology
Support of personally owned devices in multiple platforms Primarily responsible for mobile purchases.

METHODOLOGY RESULTS CONCLUSION DEMOGRAPHICS

MOBILITY

Contact
To view the full study please contact Bob Melk at bmelk@idgenterprise.com

METHODOLOGY RESULTS CONCLUSION DEMOGRAPHICS

You might also like