December 30, 2012 § Leave a comment
I joined the XenDesktop team in early 2009. In those early days of desktop virtualization, XenDesktop was being bought to solve very specific problems – delivering desktops to outsourced teams in India, on-boarding staff of an acquired company, or for security and compliance purposes.
However, towards the end of 2009, we noticed a trend. Many of our customers were enquiring whether desktop virtualization could help solve the growing challenge of BYOD (Macs, iPhones, Android phones, etc). After the iPad was announced in April 2010, desktop virtualization as a solution for BYOD became an integral part of conversations with prospective XenDesktop customers. Desktop virtualization became the first wave of solutions for BYOD. A customer could virtualize their entire Windows desktop and then deliver the desktop onto any device using remoting technologies.
By mid-2011, however, many customers realized that a Windows desktop experience was not what BYOD users wanted. In addition, the complexity and cost of deploying a desktop virtualization solution, caused customers to look for an alternate solution. Companies started looking at Mobile Device Management (MDM) solutions to lock down the device – phones and tablets. MDM was the second wave of solutions for BYOD. A number of customers have acquired and deployed MDM solutions over the last two years. But increasingly many experts and customers are coming to the conclusion that MDM isn’t the right solution for BYOD either: users don’t want their personal devices locked down and managed by IT. See: What is MDM, MAM, and MIM? (And what’s the difference?)
and The Mobile Enterprise in 2013: Getting Down to Business.
We are now in the third wave of solutions for BYOD. There are a number of different alternatives available:
– Mobile Application Management (MAM), e.g., Symantec, Appsense, Mocana, etc.
– VPN solutions
– Mobile Information Management (MIM) or Document Management Solutions, e.g., egnyte, box, ionGrid, etc.
– Container, e.g., Enterproid, Good, etc.
– Single Sign-On (SSO), e.g., Okta, Ping Identity, Symplified, etc.
Its still early in the third wave, and none of these technologies fully solve the problems of applications and data.
At O1 Works , we want to simplify BYOD by building a solution from the ground-up that:
(i) Works the way your users want to work
(ii) Works the way IT wants to work, and
(iii) Helps create order out of the chaos created by personal devices and SaaS applications
We will share more about what we are building in the coming months.