SlideShare a Scribd company logo
More devices and
things
Mobile Vision 2020
UNIFIED ENDPOINT MANAGEMENT
TOP DRIVERS OF UNIFIED ENDPOINT MANAGEMENT ADOPTION
THE ENDPOINT MANAGEMENT LANDSCAPE IS
INCREASINGLY COMPLEX
More than half of organizations will adopt this
approach by 2020.
UNIFIED ENDPOINT MANAGEMENT IS
GROWING RAPIDLY
User demand for data
anytime/anywhere
Need to lower total
cost of ownership
Source: A commissioned study conducted by Forrester Consulting on behalf
of IBM, January 2017
*Source: Forrester Data Global Business Technographics®
Telecommunications And Mobility Workforce Survey, 2016
© 2017 Forrester Research, Inc. All right reserved. Forrester is a registered trademark of Forrester Research, Inc.
Read the full study
Artificial intelligence and cognitive computing
Devices and things
Productivity Security
Actionable insights
Apps
Smartphones Tablets Laptops Wearables Internet of
things
Content Data Identity Threats Connectivity
Contextual analytics
Organizations are seeing huge increases in
endpoint data . . .
Organizations are supporting more devices than ever . . .
. . . and will move toward a device-agnostic approach
The Impact Of Mobility, IoT, And
Artificial Intelligence On The Future
Of Business Transformation
26% of organizations are using
device-agnostic management.
42% will be using device-agnostic
management by 2020.
15% are using UEM today. 54% will have UEM in place by 2020.
80% will implement AI/cognitive
computing by 2020.
96% will see an increase in
endpoint data in the next 3 years.
Base: 556 IT professionals at the director level and above in the US, the
UK,Germany, India, and Australia
Methodology: In this study, Forrester conducted an online survey of 556 IT
professionals at the director level and above in the US, the UK, Germany,
India, and Australia.
72%
of workers use a mobile
device weekly for work.*
49%
use at least three devices for
work.*
99%
use a desktop or laptop.*
88%
of organizations will be
managing IoT devices by 2020.
. . . so they are turning to AI/cognitive
computing to generate insights from this data

More Related Content

PDF
Retail Mobility, Productivity and Security
PDF
The Economics of IT Risk and Reputation
PDF
IBM Insight 2015 - Security Sessions Roadmap
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PPTX
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PDF
Actionable insights
PDF
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Retail Mobility, Productivity and Security
The Economics of IT Risk and Reputation
IBM Insight 2015 - Security Sessions Roadmap
Best practices for mobile enterprise security and the importance of endpoint ...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Actionable insights
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks

What's hot (20)

PDF
Kista watson summit final public version
PDF
Recent ECB/ EBA regulations how they will impact European banks in 2016
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PDF
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
PDF
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
PPTX
Integrated Response with v32 of IBM Resilient
PDF
Security Trends in the Retail Industry
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PPTX
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
PDF
Unified application security analyser
PDF
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PPTX
QRadar & XGS: Stopping Attacks with a Click of the Mouse
PDF
10 Security Essentials Every CxO Should Know
PPT
Cognitive security
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PPTX
How to Improve Threat Detection & Simplify Security Operations
PDF
Securing the internet of things: The conversation you need to have with your CEO
PPTX
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PDF
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Kista watson summit final public version
Recent ECB/ EBA regulations how they will impact European banks in 2016
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Integrated Response with v32 of IBM Resilient
Security Trends in the Retail Industry
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Unified application security analyser
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
QRadar & XGS: Stopping Attacks with a Click of the Mouse
10 Security Essentials Every CxO Should Know
Cognitive security
Orchestrate Your Security Defenses; Protect Against Insider Threats
How to Improve Threat Detection & Simplify Security Operations
Securing the internet of things: The conversation you need to have with your CEO
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Ad

Similar to Mobile Vision 2020 (20)

PDF
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
PPTX
Smart Data Module 6 d drive the future
PDF
Survey Report: Managing BYOD in Corporate Environments
PPTX
Unlocking the Power of Mobility - Ben Goodman
PDF
The 2018 Threat Landscape
PDF
Surviving the mobile invasion - They're spreading fast and they're vulnerable
PPTX
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...
PPTX
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
DOC
Top 20 Tech & Business Trends for 2017
DOC
Top Tech & Business Trends for 2017 article
PPTX
Mobile Security Trends in the Workplace
PDF
The Journey to Manage Endpoints Everywhere
PPTX
The Organizational Psychology of the Internet of Things: How to Use Technolog...
PDF
Driving Towards an IoT Payoff: Keep it Simple – It’s Not Just About the Techn...
PDF
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
PPTX
Thomas Vavra | New Ways of Handling Old Data
PDF
Ibm's global ai adoption index 2021 executive summary
PDF
Digital Revolution 4.0 is Here Today
PPT
Top 8 Tips For Business Technology Strategy in 2015
PDF
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
Smart Data Module 6 d drive the future
Survey Report: Managing BYOD in Corporate Environments
Unlocking the Power of Mobility - Ben Goodman
The 2018 Threat Landscape
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Top 20 Tech & Business Trends for 2017
Top Tech & Business Trends for 2017 article
Mobile Security Trends in the Workplace
The Journey to Manage Endpoints Everywhere
The Organizational Psychology of the Internet of Things: How to Use Technolog...
Driving Towards an IoT Payoff: Keep it Simple – It’s Not Just About the Techn...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Thomas Vavra | New Ways of Handling Old Data
Ibm's global ai adoption index 2021 executive summary
Digital Revolution 4.0 is Here Today
Top 8 Tips For Business Technology Strategy in 2015
Ad

More from IBM Security (20)

PPTX
Automation: Embracing the Future of SecOps
PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PDF
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
PDF
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
PDF
Accelerating SOC Transformation with IBM Resilient and Carbon Black
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
PDF
WannaCry Ransomware Attack: What to Do Now
PPTX
IBM QRadar UBA
PDF
Close the Loop on Incident Response
PPTX
See How You Measure Up With MaaS360 Mobile Metrics
PPTX
Valuing Data in the Age of Ransomware
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PDF
Top 12 Cybersecurity Predictions for 2017
PPTX
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PPTX
Top 5 Things to Look for in an IPS Solution
Automation: Embracing the Future of SecOps
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Are You Ready to Move Your IAM to the Cloud?
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
WannaCry Ransomware Attack: What to Do Now
IBM QRadar UBA
Close the Loop on Incident Response
See How You Measure Up With MaaS360 Mobile Metrics
Valuing Data in the Age of Ransomware
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Top 12 Cybersecurity Predictions for 2017
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Top 5 Things to Look for in an IPS Solution

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
 
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
Agricultural_Statistics_at_a_Glance_2022_0.pdf
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
 
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Mobile Vision 2020

  • 1. More devices and things Mobile Vision 2020 UNIFIED ENDPOINT MANAGEMENT TOP DRIVERS OF UNIFIED ENDPOINT MANAGEMENT ADOPTION THE ENDPOINT MANAGEMENT LANDSCAPE IS INCREASINGLY COMPLEX More than half of organizations will adopt this approach by 2020. UNIFIED ENDPOINT MANAGEMENT IS GROWING RAPIDLY User demand for data anytime/anywhere Need to lower total cost of ownership Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 *Source: Forrester Data Global Business Technographics® Telecommunications And Mobility Workforce Survey, 2016 © 2017 Forrester Research, Inc. All right reserved. Forrester is a registered trademark of Forrester Research, Inc. Read the full study Artificial intelligence and cognitive computing Devices and things Productivity Security Actionable insights Apps Smartphones Tablets Laptops Wearables Internet of things Content Data Identity Threats Connectivity Contextual analytics Organizations are seeing huge increases in endpoint data . . . Organizations are supporting more devices than ever . . . . . . and will move toward a device-agnostic approach The Impact Of Mobility, IoT, And Artificial Intelligence On The Future Of Business Transformation 26% of organizations are using device-agnostic management. 42% will be using device-agnostic management by 2020. 15% are using UEM today. 54% will have UEM in place by 2020. 80% will implement AI/cognitive computing by 2020. 96% will see an increase in endpoint data in the next 3 years. Base: 556 IT professionals at the director level and above in the US, the UK,Germany, India, and Australia Methodology: In this study, Forrester conducted an online survey of 556 IT professionals at the director level and above in the US, the UK, Germany, India, and Australia. 72% of workers use a mobile device weekly for work.* 49% use at least three devices for work.* 99% use a desktop or laptop.* 88% of organizations will be managing IoT devices by 2020. . . . so they are turning to AI/cognitive computing to generate insights from this data