SlideShare a Scribd company logo
ibm.com/maas360
UnifiedEndpointManagement.com
LEARNMORE
RETAILMOBILITY,
PRODUCTIVITY,
ANDSECURITY
Enhancementstothecustomerexperiencearehelpingmakemobilityasuccessintheretailindustry;however,security
challengesneedtobeaddressedtoprotectdataandprivacy.TheInternetofThings(IoT)maybethefarthest-reaching
futureITinitiativewiththemostpotential—alongwiththegreatestcomplexityandrisks.Thediversityofdevices(e.g.,
smartphones,tablets,laptops,desktops,andIoTsensors)requiresaunifiedendpointmanagement(UEM)platform.
Accesstocloudappsoncorporate,sharedandpersonal(BYO)devicesaretheessentialingredientstosuccess.
Theretailindustryismovingquicklytoembracethevalueofmobility
foritsemployeesandcustomersinthefaceofsecurityrisks.
Reducing
costs,11%
Improvingoverallin-store
customerexperience,11%
Increasingfoottrafficin
storelocations,16%
Developingstrategiestoensurewe
interactwithourin-storecustomers
ontheirmobiledevices,9%
Protectingcustomerdata
andprivacy,32%
Devicesneedtodeliverahigh-qualityexperiencetocreateintuitivemobilemomentsforemployeesandcustomers.
Businessesrequirean
economicaldevicethatiseasy
tomanageandreliable.
However,securityisnotnearthetop
oftheprioritylist—availablesecuritypoliciesand
biometricswerenotfrequentlycitedconsiderations.
Trainingandenforcingcorporatesecuritycompliance
policiesforstore-basedemployees,28%
Althoughcustomerandcorporatedatasecuritywerenottopbusinessinitiatives,theywereidentified
astwoofthetopthreechallenges.RetailITleadershipneedstobalanceproductivitywithsecurityto
effectivelyruntheirorganizations.
oforganizationssurveyedcitedEASEOFUSE(i.e.,intuitive)asthemost
importantconsiderationwhenitcomestothemobiledevices(i.e.,laptops,
smartphones,tablets,etc.)thattheyprovidetoin-storeemployees.
Price 33%
Easeof
management 30%
Batterylife 27%
Operatingsystem 25%
Availablesecurity
policies 16%
Biometrics 7%
Growingthecommercial
valueofourcustomer
relationships,8%
Securingcorporate
(i.e.,store)data,8%
Othertopconsiderationsinclude:
Top5MostImportantBusinessInitiatives
IMPORTANT!In-storeEmployeeAccesstoMobileBusinessApps
TopBusinessandOperationalChallengesManagingIn-storeTechnology
DiverseDevicesIn-storeEmployeesUsetoAssistCustomers
MostImportantConsiderationsforIn-storeEmployees
andtheirMobileDevices
BringYourOwnDevice(BYOD)-OKforIn-storeEmployees?
37%
50%
CURRENTLY
Toprovideabettercustomerexperience...
Althoughdesktopscontinuetodominate,retail
businessesshouldbeabletomanageandcontrolall
deviceswithaUEMplatform.
Mobileappsarepartoftheresearch,customerinteraction,andbuyingprocess.Asindicatedbelow,employeesrequire
accessfortraining,businessinsight,andcustomersatisfaction.
IoTInitiativesareStartingtoTakeOffatStoreLocations
IoTinitiativescreatevaluablesourcesofinformationtohelpbusinessescreatenewstrategiesand
executewithahighdegreeofaccuracy.IoTcanalsohelpcapturesensorinformationtoprovide
intelligenceaboutcustomerbehavior.
IoTpresentshugeopportunitiesforretail.ITneedstospearheadbusinesstransformationbysecurely
deployingandmanagingIoTprojectsatscale.
oftheorganizationssurveyedpermittheir
employeestobringtheirowndevicestowork.
Dedicatedcomputer
(i.e.,terminal,desktop) 61%
Smartphone 42%
Tablet 31%
Rugged,single-purpose
device(scanner) 24%
Sharedlaptop 18%
oforganizationssurveyedcurrentlyhaveoraredeveloping/launchingwithin
12-24months,IoTinitiativesinvolvingindividualstorelocations.
Appsarecriticalorimportant,
61%
arecurrentlyconsideringIoTinitiativesinvolvingindividualstorelocations.
13%
65%
Appsarecriticalorimportant,
58%
24MONTHSFROMNOW
IoT
AMajorityofStoresUseDigitalKiosks
TheBiggerTruth
ThemixoftabletsandIoTdevices(e.g.,LEDscreens)requiressecurityandmanagementwithUEM,
andthatincludesunmanagedandshareddevices.
Alldevices,includingthoserelatedtoIoTinitiatives,havebecomeanessentialpartofinteractingwith
customersandavaluablelinkinthepurchasingprocess.Retailorganizationsneedtoupholdhigh
securitystandardsfortheirdevices,businessapplications,andcustomerdata.Clickthelinksbelowto
learnmoreabouthowIBMMaaS360unifiedendpointmanagementcanhelpretailITleadersmanage
andsecuredevicesatscale.
oforganizationssurveyedhavedigitalkiosks/digitalsignagedeployed
inthemajorityoftheirstores.
24%
havedigitalkiosks/signagedeployedinselectstores.
34%

More Related Content

PDF
Mobile Vision 2020
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PDF
Pulse 2013 - How to run a successful BYOD initiative
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PDF
Are Cloud Apps the Invisible Man?
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PPTX
QRadar & XGS: Stopping Attacks with a Click of the Mouse
PDF
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Mobile Vision 2020
Best practices for mobile enterprise security and the importance of endpoint ...
Pulse 2013 - How to run a successful BYOD initiative
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
Are Cloud Apps the Invisible Man?
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
QRadar & XGS: Stopping Attacks with a Click of the Mouse
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar

What's hot (20)

PDF
Simple and secure mobile cloud access
PPTX
Tolly Report: Stopping Attacks You Can't See
PDF
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PDF
Rochester Security Event
PDF
8 Principales Raisons de Passer du MDM à l'EMM
PDF
Mobile Threat Management
PDF
Améliorer la productivité des employés et se protéger contre les menaces ...
PPTX
MaaS360 with Watson
PDF
Actionable insights
PDF
Infographic: 5 Tips for Cloud Success
PDF
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
PPTX
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
PDF
Unified application security analyser
PDF
IBM MaaS360 with watson
PDF
IBM Mobile Analyzer Saves the Day
PDF
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
PDF
MTL Australia 2016 - The 3rd Wave of Security
PDF
IBM Security - 2015 - Client References Guide
PDF
Samsung KNOX for Dummies
PDF
Malware on Smartphones and Tablets: The Inconvenient Truth
Simple and secure mobile cloud access
Tolly Report: Stopping Attacks You Can't See
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
Rochester Security Event
8 Principales Raisons de Passer du MDM à l'EMM
Mobile Threat Management
Améliorer la productivité des employés et se protéger contre les menaces ...
MaaS360 with Watson
Actionable insights
Infographic: 5 Tips for Cloud Success
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Unified application security analyser
IBM MaaS360 with watson
IBM Mobile Analyzer Saves the Day
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
MTL Australia 2016 - The 3rd Wave of Security
IBM Security - 2015 - Client References Guide
Samsung KNOX for Dummies
Malware on Smartphones and Tablets: The Inconvenient Truth
Ad

Viewers also liked (13)

PDF
Close the Loop on Incident Response
PPTX
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PDF
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
PDF
Recent ECB/ EBA regulations how they will impact European banks in 2016
PDF
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
PPTX
How Knowledge Management and Big Data Multiply the Impact of CI
PDF
6 Ways to change human resources in the millennial age
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PPTX
Day in the Life of a Developer
PPTX
Sumo Logic Search Job API
PDF
The Massive Mobile Migration
PDF
Passcode Security Infographic
Close the Loop on Incident Response
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Orchestrate Your Security Defenses; Protect Against Insider Threats
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Recent ECB/ EBA regulations how they will impact European banks in 2016
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
How Knowledge Management and Big Data Multiply the Impact of CI
6 Ways to change human resources in the millennial age
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Day in the Life of a Developer
Sumo Logic Search Job API
The Massive Mobile Migration
Passcode Security Infographic
Ad

Similar to Retail Mobility, Productivity and Security (20)

PDF
Securely Adopting Mobile Technology Innovations
PDF
Securely adopting mobile technology innovations for your enterprise using ibm...
PDF
Ten Security Essentials for CIOs
PDF
Why Are Investors Excited About Cyber Security Startups, Again?
PDF
White Paper: Mobile Security
PDF
Why Managing Mobility Matters
PDF
Information Technology and Services Flyer - Mobiloitte
PDF
Latest Cybersecurity Trends
PDF
adaptive-digital-factory-whitepaper
PDF
AGEOS Infrastructure Cyber Security White Paper
PDF
Top 3 security concerns for enterprises
PPTX
The New Moats
PDF
Mobile Device Management Service: Yamana
PDF
Information technology
PDF
Idan Tohami - Branding Portfolio (Logo, Visual Identity, Brand Styleguide)
PPT
Cognitive security
PDF
Csa summit la transformación digital y el nuevo rol del ciso
PDF
How Secure are you Around “IoT”_.pdf
PDF
Game Changing IT Solutions
PDF
BCS ITNow 201512 - Cyber Innovation
Securely Adopting Mobile Technology Innovations
Securely adopting mobile technology innovations for your enterprise using ibm...
Ten Security Essentials for CIOs
Why Are Investors Excited About Cyber Security Startups, Again?
White Paper: Mobile Security
Why Managing Mobility Matters
Information Technology and Services Flyer - Mobiloitte
Latest Cybersecurity Trends
adaptive-digital-factory-whitepaper
AGEOS Infrastructure Cyber Security White Paper
Top 3 security concerns for enterprises
The New Moats
Mobile Device Management Service: Yamana
Information technology
Idan Tohami - Branding Portfolio (Logo, Visual Identity, Brand Styleguide)
Cognitive security
Csa summit la transformación digital y el nuevo rol del ciso
How Secure are you Around “IoT”_.pdf
Game Changing IT Solutions
BCS ITNow 201512 - Cyber Innovation

More from IBM Security (20)

PPTX
Automation: Embracing the Future of SecOps
PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PPTX
Integrated Response with v32 of IBM Resilient
PDF
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
PDF
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
PDF
Accelerating SOC Transformation with IBM Resilient and Carbon Black
PDF
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
PDF
WannaCry Ransomware Attack: What to Do Now
PPTX
How to Improve Threat Detection & Simplify Security Operations
PPTX
IBM QRadar UBA
PPTX
See How You Measure Up With MaaS360 Mobile Metrics
PPTX
Valuing Data in the Age of Ransomware
PDF
Top 12 Cybersecurity Predictions for 2017
PPTX
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Automation: Embracing the Future of SecOps
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Integrated Response with v32 of IBM Resilient
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Accelerating SOC Transformation with IBM Resilient and Carbon Black
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Are You Ready to Move Your IAM to the Cloud?
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
WannaCry Ransomware Attack: What to Do Now
How to Improve Threat Detection & Simplify Security Operations
IBM QRadar UBA
See How You Measure Up With MaaS360 Mobile Metrics
Valuing Data in the Age of Ransomware
Top 12 Cybersecurity Predictions for 2017
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...

Recently uploaded (8)

PPTX
Malware Removal Livonia by Zebras Computer – Protecting Your Devices from Dig...
DOC
York毕业证学历认证,温哥华拉萨尔学院毕业证留学学历
PDF
Supermarket Floral Ad Roundup- Week 32 2025.pdf
PPTX
All-Season Storage_ The Value of 20ft Pop-Up Lockers in Nova Scotia’s Climate...
PDF
Supermarket Floral Ad Roundup- Week 31 2025.pdf
PPTX
ADVANCE DIGITALS Product update list 2023
PPT
group influence related to consumer behaviour
PDF
Custom Round Plaques at Trophy-World Malaysia | Custom Trophies & Plaques Sup...
Malware Removal Livonia by Zebras Computer – Protecting Your Devices from Dig...
York毕业证学历认证,温哥华拉萨尔学院毕业证留学学历
Supermarket Floral Ad Roundup- Week 32 2025.pdf
All-Season Storage_ The Value of 20ft Pop-Up Lockers in Nova Scotia’s Climate...
Supermarket Floral Ad Roundup- Week 31 2025.pdf
ADVANCE DIGITALS Product update list 2023
group influence related to consumer behaviour
Custom Round Plaques at Trophy-World Malaysia | Custom Trophies & Plaques Sup...

Retail Mobility, Productivity and Security