Paulista - Fotolia
The first phase of enterprise mobile application deployment usually occurs in the first year or so of initiating a mobile strategy. It involves giving employees basic productivity capabilities, such as access to their corporate email accounts. Most enterprise mobility management tools have email, calendar and contacts apps, which improve communication by letting workers connect to their corporate data from anywhere.
Also in that first productivity phase, IT needs to empower the workforce to connect their devices to company data using VPN clients such as Cisco AnyConnect or Juniper Pulse. Using a remote desktop client on mobile devices lets workers access all the files they have on their desktops.
Once admins have provided users with basic mobile apps for business, IT should consider deploying more complex enterprise mobile apps for communications, file sharing and more. Those second-phase apps could include:
- Note-taking apps;
- Contact apps such as an employee directory;
- Social media and messaging apps -- Yammer, Slack;
- File sharing and storage apps such as Box, Dropbox or Sharefile; and
- Conferencing apps such as WebEx.
In terms of note-taking apps, some organizations might want to use out-of-the-box tools or create their own. IT could enable third-party apps such as Evernote, Notability or others available in public app stores.
When it comes to creating enterprise apps, don’t forget to have FUN: Focus on User Needs. Mobility experts at the M-Enterprise Conference in Boston explain.
In the third and final phase of enterprise app deployment, IT should consider deploying customer-facing apps. Those mobile apps for business can be anything that helps improve business processes, provides easier access to data or inventory information and provides an extension of the company's existing website experience.
What's the best approach to mobile app deployment?
Strategies to develop business mobile apps
The architects' guide to enterprise mobile apps
Dig Deeper on Enterprise mobile app strategy
Related Q&A from Matt Schulz
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too. Continue Reading
Users may not hesitate to connect to a mobile hotspot, but that doesn't mean IT should always allow it. Learn what threats these hotspots pose and ... Continue Reading
There are a variety of factors to evaluate when determining the true cost of mobile devices in an organization. Unpack these factors to find the TCO. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.