New Synchronoss Study Charts Progress of Enterprise Mobility Adoption Among UK and US Businesses
Advanced Enterprise Mobility Delivers 29% More Profit - but 38% Miss out Languishing in Early Adoption
- Basic adopters are 29% less profitable than those who have invested in more innovative capabilities, and 15% less productive
- Just the introduction of file-sharing apps and the analysis of app usage data provides a 7% boost in productivity
- Improved mobility capability boosts internal perceptions of CIOs and IT teams
The independent study conducted by
Synchronoss Enterprise has shown that despite enterprise mobility being an accepted norm, 38% of enterprises have failed to progress beyond the Entry Level stage of its four-stage Mobility Maturity Model, and that 81% remain in the bottom half, however the incentive for enterprises to improve is clear.
“The findings of this study underline the case for companies to dedicate investment to their enterprise mobility strategy. Until now, the benefits of mobility maturity have been anecdotal or theoretical. We now know that those who invest in advanced mobility tools – balancing efficiency with security – benefit from double-figure improvements in productivity, in turn contributing to massive profitability gains,” said
The commercial impacts of advanced mobility maturity:
- The most mature enterprises are 29% more profitable and 15% more productive than those in the lowest stage
- CIOs and IT teams who have delivered the most advanced enterprise mobility are perceived 14% and 12% more favorably within their organizations than those who have only introduced the most basic of functionality
- The simple step from Entry Level to Opportunistic (first stage to second stage) delivers the greatest and quickest performance improvements. Just by introducing file-sharing tools, monitoring usage data and requiring at least native OS security measures to be in place on the device, enterprises see a 9% profitability improvement and 7% productivity boost
“Productivity doesn’t come from the availability of mobility tools alone,” continued Schuette. “Collecting contextual data from employees’ devices lets a company make informed, deliberate changes that improve its operations and processes. That same data can also be used for more robust user ID verification, boosting security. The higher the security on a device, the more capabilities an organization can confidently add to it - which in turn improves productivity. It’s the ultimate virtuous circle for enterprise technology.”
“Mobility has always held significant promise for enterprise’s digital transformation programs – for operational efficiencies, workforce productivity, customer engagement, and overall competitive differentiation,” commented
A full version of the Synchronoss Enterprise white paper “The State of Enterprise Mobility” is available to download here.
Notes to editors:
Definitions of maturity stages:
- Entry Level (38%) – simple provision of remote email and calendar and no requirement for device security
- Opportunistic (43%) – use of file-sharing tools, collection of usage data – including of individual apps – and requirement for devices’ native OS security measures to be used. Some use of passwords for individual apps
- Additive (19%) – integration of apps, analysis of usage data and more varied device data such as location and proximity, with devices secured through multi-factor authentication and data secured in transmission
- Transformational (0%) – file-sharing tools allow collaboration with third parties, analysis of device data alongside other non-mobility data to determine trends and areas of improvement and device is so secure it can be used as a “factor” to authorize access to other enterprise assets
Note: While no enterprises qualified on all the criteria necessary for the Transformational category, 9% partially qualified on the basis of implementing file-sharing systems that allow collaboration with third parties.
Full Mobility Maturity Model |
|||||||||
Categories | Stages | Productivity | Contextuality | Security | |||||
Entry level | A | Limited to remote email, calendar and other PIM tools | Zero visibility of how mobile devices are being used | No device security required | |||||
Opportunistic | B | Secure information-sharing (beyond email) within a defined group in the business | Data on usage of apps is gathered, but analysis is rare | Reliance on native OS security e.g. password / PIN / biometric on device | |||||
C | Workflow functionality such as approval requests, access management and comments | Reporting is now regular, but limited to basic analysis such as TEM.
Creation of reports is manual and limited in scope |
Native OS security plus username and passwords on selected apps / containers | ||||||
Additive | D | Integration of PIM apps with each other and with other standard apps e.g. cameras | Collection of more varied data, e.g. location, proximity of other devices etc.
Regular, semi-automated reporting and analysis leads to improvements to operations |
Multi-factor authentication on device, plus username and password on selected apps / containers
Specialized security of data when in transmission |
|||||
E | Integration of PIM apps with the enterprise's own proprietary apps | Dynamic and responsive reporting, applied to departmental KPIs and impacts measured | All data is encrypted with enterprise-defined keys when in transmission | ||||||
F | Secure information-sharing (beyond email) amongst various groups within the business | Analysis is automated and actions are either recommended or executed automatically | Geo-based encryption and decryption of information in transit | ||||||
Transformational | G | Information shared externally (beyond email) with partners, suppliers, customers etc. | Data gathered and analyzed includes other data sources e.g. sensors or LoB datasets | Device security sufficiently robust for device to be used as a "factor" for authentication to external assets or data sources | |||||
H | Gig economy workers accommodated and measured equally to full-time workers without compromising security | ||||||||
About Synchronoss Technologies, Inc.
Synchronoss (NASDAQ: SNCR) is an innovative software company that helps both Enterprises and Service Providers execute their goals for mobile transformation now. Our simple, powerful and flexible solutions serve millions of mobile subscribers and a large portion of the Fortune 500 worldwide today. For more information, visit us at: www.synchronoss.com.
View source version on businesswire.com: http://www.businesswire.com/news/home/20170226005005/en/
Source:
Synchronoss Technologies, Inc.
Investors and Media:
Daniel Ives, +1 908-524-1047
daniel.ives@synchronoss.com
or
Media:
Stacie Hiras, +1 908-674-0758
stacie.hiras@synchronoss.com