Cisco Blogs


Cisco Blog > SP360: Service Provider

The Future of Monetizing Mobility

cisco_blog_mobiledevicesBy the end of this year, the number of mobile-connected devices will exceed the number of people on earth. As mobile device exponentially grows around the globe, the Internet of Everything (IoE) is driving even more relevant connections – reaching people and processes in new and unique ways.

Service providers are seeking new ways to accommodate the surge in mobile data traffic, smart portable devices and things coming onto their networks. As mobile devices proliferate, so do the opportunities to strengthen relationships with customers by delivering a superior subscriber experience.

Based on predictions in Cisco’s latest VNI Global Mobile Data Traffic Forecast, we know that we are just scratching at the surface of what’s possible in terms of creating new mobile customer experiences and revenue. Take a look at a few key growth predictions for next five years:

  • By the end of 2013, the number of mobile-connected devices will exceed the number of people on earth, and by 2017 there will be nearly 1.4 mobile devices per capita
  • Mobile network connection speeds will increase 7-fold
  • Two-thirds of the world’s mobile data traffic will be video

Based on these predictions and the explosion of mobile data traffic traversing networks, service providers need to Read More »

Tags: , , , , , ,

Honesty is the Best BYOD Policy

Does BYOD really mean that my device will become the company’s device? Do I control my private data or does my employer? How can I make sure I maintain a work-life balance when my personal device is also my work device? Will my company support any device I choose?

Some of these questions might seem familiar as more business employees consider adding their own device to their company’s network. These questions also represent an important part of a comprehensive mobile strategy: User buy-in.

Brett Belding BYOD - without headerRecently, I read an interesting CIO article by Adam Bender that highlighted the importance of getting employees on board when implementing a BYOD policy. The article discusses that according to Frost & Sullivan analyst, Audrey William, many employees are worried that they won’t be able to control data on their device once they begin using it for work. In addition, William states that employees are also concerned about the lines blurring between work and play when both personas are merged onto one single device.

Although the concept of BYOD is not new, these concerns have important consequences in our networked world. So, what’s the answer?

An honest, safe, and secure MDM solution and effective policy communication. Read More »

Tags: , , , , , , , , , , , , , ,

Mobile Devices Will Transform Your Business IT

There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobile network, especially in the workplace?

Chris Spain - with header FINALJust recently, I read an article in Forbes, by Louis Columbus, that addresses the issue of increased mobile devices and unprepared network infrastructures. The article examines a study by IDC that predicts that 87% of sales for connected devices will be tablets and smartphones in next four years. As many employees prefer working from their own mobile devices, corporate networks, as they’re currently designed, will not be capable of successfully managing such a large volume of mobile data traffic generated by these mobile devices. With such expansive growth expected, the majority of businesses will either need to adapt an existing strategy to support this increase in mobile devices or adopt a new strategy.

Currently, there is a clear need for enterprises to better prepare and invest in their IT infrastructure. As more employees use their own devices at work for business and personal use, it’s imperative that business organizations require a secure mobile device and BYOD strategy to accommodate their business needs and employee preferences. However, the decision to adopt BYOD comes with a set of challenges for IT organizations.

Many of the benefits of BYOD, such as having the choice of device and anywhere, anytime access, are somewhat adverse to traditional IT requirements for security and support. In the past, IT pre-determined a list of approved workplace devices, typically a prescribed desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT has to approach the problem differently. Read More »

Tags: , , , , , , , , , , , ,

Beyond Today’s Productivity and Efficiency: Enterprise Mobility Enables Long-Term Growth

One of the basic tenants of enterprise mobility is its direct influence on “now”.

When organizations implement mobile policies like BYOD and virtualized desktops, day-to-day operations can immediately improve. In most cases, the rate of return on seeing change is direct. However, the impact of enterprise mobility is not short-lived.sixsteps

Recently, we counted down the “Six Essential Steps for Unleashing the Power of Enterprise Mobility.”  Throughout the series, we provided a guide for enterprises to follow to implement broader mobility. We discussed how businesses could benefit now by untethering their global workforce and increasing productivity. The series highlighted a tactical approach to mobility, yet we would be amiss not to discuss the long-term transformational impact mobility can have on businesses. How can mobility be a catalyst for organizational growth and innovation?

Last week, I read an IT Web article by Johannesburg-based Lebo Mashiloane that discussed how BYOD and mobility are fueling enterprise growth. The article brought up a concept that is always important to keep top-of-mind: How today’s technology solutions are changing the landscape of tomorrow. Read More »

Tags: , , , , , , , , , , ,

As Mobile Social Usage and Constant Connectivity Increases, Security A Top Concern

Survey results from an IDC study recently revealed that people are relying more and more on their smart mobile device as their primary tool for communication and connecting.

The study, sponsored by Facebook, highlights some compelling insights about mobility including:

  • Half of the total US population uses smartphones
  • A “sense of being connected” is the strongest sentiment for driving mobile social usage
  • The most popular activities on smartphones are email (78%), Web browsing (73%) and Facebook (70%)

alwaysconnectedEveryday we are seamlessly integrating mobility features into our daily lives. We use mobile devices for tasks such as email, mobile shopping and making social connections. According to the IDC study, nearly 80 percent of us reach for our phone within 15 minutes of waking up for the day – I am part of this statistic!

It’s clear that mobility and the increasing use of social media creates new ways for us to interact and connect, but it’s also creating new security concerns. With the influx of personal data on our social media news feeds and our purchasing habits sitting in our smartphone’s browsing history, how can we make sure our personal information is secure? In addition, as the lines between personal and work devices blur, how can enterprises make sure employee-owned social networks aren’t opening the door for the latest network threat? An essential part of our mobile future will depend on enterprises and individuals developing a comprehensive approach to protecting sensitive data and privacy. Read More »

Tags: , , , , , , , , , ,