Gartner

Exploit Mobility to Drive Business Innovation

View All Special Reports

Stay Connected

Facebook LinkedIn Twitter

The media tablet market did not exist in early 2010. But now, millions of workers use these tablets in the enterprise every day and the tablet market is just the tip of the mobility iceberg. Just below the surface lies a torrent of innovations that include mobile apps, mobile analytics, EMM tools, security technology, cloud computing, interconnected things, mobile collaboration, and wireless technologies.

Gartner VP Paul DeBeasi discusses enterprise mobility trends for 2014.

Gartner for Technical Professionals: Mobility Research

  • Infrastructure
  • Users, Applications & Data
  • Security & Identity
  • Governance & Management
  • Mobile Architecture

Infrastructure

Blueprint for Architecting a Wireless LAN AP Infrastructure

20 June 2014

Wireless LANs using coordinated APs offer centralized control, configuration and monitoring so large numbers of APs can be managed automatically. This approach lets the WLAN system operate as a seamless service, providing automatic services such as roaming, security and policy enforcement.

Mobile Wireless Performance Issues and Solutions

12 March 2014

Wireless performance is an issue for applications and the Web. This assessment presents data on wireless LAN and mobile cellular performance, and then discusses methods to improve performance by use of WAN performance optimization and improvements to the network and applications.

How to Successfully Deliver Mobile Unified Communications Over WLANs

12 March 2014

In an effort to drive mobile productivity, enterprises are extending UC services to smartphones and tablets over WLANs. A successful strategy requires that technical professionals assess updates to the 802.11 standard that support voice and video communications and expanded Wi-Fi network capacity.

Bringing Mobility Inside: Solutions for Indoor Cellular

19 December 2012

Enterprise BYOD and guest devices often need cellular access inside an office. Carriers will help, but responsibility lies with enterprises. Enterprises needing improved service must choose smartly among in-building DAS and small-cell solutions. However, these technologies are beyond normal IT.

Decision Point for Mobile Cellular In-Building Technology

2 August 2012

It has become increasingly important for businesses to provide in-building mobile cellular connectivity to employees, partners and visitors. However, within buildings, the carrier coverage can be problematic. The solutions and technologies used to provide in-building service are selected at the discretion of the business and are outside of common IT expertise. This Decision Point provides a process and criteria to identify requirements and potential solutions in the context of a diverse and rapidly changing carrier environment.

Defining the Real Requirements Behind Your Next WLAN

22 January 2014

The rising use of laptops, tablets and smartphones serving critical business, BYOD and guest needs requires that WLANs deliver ever-expanding capabilities. Organizations embarking on new or upgraded WLANs must ensure that requirements impacting design and deployment are well-defined and understood.

What You Need to Know When Extending Videoconferencing to Mobile Devices

10 January 2014

The extension of enterprise videoconferencing services to mobile devices, especially tablets, is multifaceted, and can include company-owned, BYOD and guest devices. When implementing mobile videoconferencing, IT must contemplate a complex set of cloud, mobility, networking and UC forces.

Where, When and How to Deploy 802.11ac

10 December 2013

The 802.11ac standard enables the next-generation WLAN. Its capabilities support business demands and BYOD. Wireless designs must be properly implemented, and impacts on enterprise network infrastructures must be addressed. Embracing 802.11ac at the right time will lead to its cost-effective use.

The Technology and Application of WLAN Location Services

29 August 2013

The growth of WLANs provides a foundation for the simplified addition of real-time location services that offer significant benefits to businesses such as enhanced productivity and loss prevention. With the growth of mobility, even common smartphones can be tracked, thus enabling customer analytics.

How to Succeed With iPads in the Enterprise and Avoid the Pitfalls

17 July 2013

A successful implementation of iPads in an enterprise requires balancing infrastructure requirements, user desires (e.g., BYOD) and IT control (e.g., MDM). However, if done well, iPads complement smartphones and PCs, creating a composite solution that drives mobile productivity and collaboration.

Impact of Virtualization on Network, Network Interfaces, and Network Appliances

17 June 2013

This assessment discusses the network architectural and managerial implications of virtual servers and virtual network appliances (e.g., switches, probes, application delivery controllers, firewalls, and performance optimizers).

Field Research: Mobility in the Age of Consumerization

6 June 2013

The consumerization of IT has had its greatest impact on mobility. The introduction of the iPad triggered a revolution in the tablet marketplace. The impact of the smartphone has long been felt, but along with the effect of tablet devices in the workplace, the push is on for better mobility tools. IT still has the responsibility to protect organizational intellectual property and is struggling with bring your own device (BYOD) programs and mobile data management. In addition, IT has a responsibility to improve employee productivity through technological advances.

Solving BYOD's Impact on Communications Infrastructure

13 February 2013

BYOD places expanded demands on enterprise communications due to more devices, greater diversity and broad user expectations. Site WLANs and cellular and network infrastructures need to deliver additional services and capacity while ensuring core business network services and security.

Network Implications of Server-Hosted Virtual Desktops

16 January 2013

This assessment helps an enterprise choose among remote display protocols and associated network performance optimization techniques for server-hosted virtual desktop (SHVD) implementations by explaining and recommending detailed technical evaluation criteria.

Controlling Network Congestion Caused by Mobile BYOD and Personal Internet Use

31 December 2012

Personal use of bring your own device for nonessential media and YouTube, Facebook and other applications can reduce bandwidth available for critical enterprise functions. This assessment discusses governance policies and technologies to manage bandwidth usage for nonessential Internet traffic.

Enterprise Mobility: Enabling Mobile Access to Voice and Video Services over WLANs

10 December 2012

The proliferation of smartphones and tablets in the enterprise is accelerating. Users are demanding mobile access to enterprise voice and video communication applications. New amendments to the 802.11 standard enable enterprise Wi-Fi networks to support real-time communications and enhance mobility.

Mobile Communications Services

29 November 2012

Wireless communications, including Wi-Fi, cellular, satellite and Bluetooth, sit at the heart of the mobility revolution. Mobility requires the integrated operation of communications technologies in mobile devices and enterprise infrastructures to serve external and local data, voice and video.

Access to research documents may vary based on your subscription.

Users, Applications & Data

Blueprint for Architecting Sensor Data Management Big Data Analytics

27 June 2014

Sensors are pervasive and expected to grow exponentially, resulting from the Internet of Things. Sensor data management is challenging, but rewards can be game-changing. This Blueprint helps you successfully architect sensor data management to support your strategic big data analytics.

Decision Point for Selecting Mobile Application Development Frameworks

3 July 2012

Organizations are struggling to decide which type of mobile application to deliver to their users. The decision often involves a trade-off between delivering a native experience that is rich and interactive or favoring portability that allows them to deliver a more cost-effective solution that targets multiple platforms. But other factors also influence the decision, such as manageability, discoverability, and maintainability. In this Decision Point, Kirk Knoernschild provides a structured decision framework that guides organizations through this decision.

Assessing Mobile Conferencing Capabilities

6 June 2014

Although conferencing solutions have evolved to support mobile platforms, they haven't achieved parity with desktop clients. IT needs to understand what's possible and how features compare to user expectations.

Blueprint for Building Modern Web Apps with HTML5

5 June 2014

Single-page applications treat the Web browser as a full-blown runtime, enabling new types of multichannel user experiences. SPAs require attention to client-side architecture and design, and the use of client-side frameworks and libraries.

Evaluation Criteria Mobile Application Development Platforms

22 May 2014

Organizations evaluating mobile application development platforms require common criteria to objectively gauge competing solutions. This research outlines the required, preferred and optional technical features of a MADP.

Blueprint for Architecting Resident Mobile Apps

7 May 2014

Hybrid mobile apps are built with native and Web code. Two types of hybrid architecture exist. Web hybrid apps are pure mobile Web apps wrapped in a WebView control. Native hybrid apps blend some Web content in a WebView control with custom native code.

Build Great Mobile Apps With HTML5

14 March 2014

You don't need to sacrifice portability, deployment flexibility or the world of Web tooling for a great user experience. To build great mobile apps with HTML5, designers and developers must be familiar with mobile interface behaviors and the proper techniques to create them using Web technologies.

Popular Mobile App Architectures and the Frameworks That Love Them

3 March 2014

Organizations want to quickly deliver great mobile apps to multiple platforms. But developers struggle to create optimal mobile app architectures and choose the right tools and frameworks to build apps. This document helps development teams choose the best mobile app architectures and frameworks.

Mobile Application MetaPlatform

3 August 2012

Developing mobile applications is a new territory for most organizations. Organizations that venture to develop custom-built mobile applications are confronted with a dizzying array of choice and an incredibly diverse market of new tools, technologies, frameworks and distribution channels. This Reference Architecture template describes the different types of platform capabilities you need to build mobile applications.

Mobile Productivity Framework

7 January 2014

Mobile strategists often focus on high-volume, transactional processes, but mobile tools are strong in high-value, nonroutine work. Get more value from mobility by connecting mobile productivity tool categories (beyond email and calendaring) with the nonroutine work where they can make a difference.

Which Mobile Database Is Right for You?

22 November 2013

Mobile databases provide the data-handling infrastructure that enterprise-class mobile apps require. This assessment outlines a framework for comparing mobile databases and assesses the strengths and capabilities of the mobile databases on the market today.

Increase Mobile Productivity by Choosing the Right App, for the Right Device, for the Right User

24 October 2013

Mobile devices have extended productivity beyond the desktop to anytime and anywhere. IT must grapple with numerous devices, use cases, apps and users to optimize the enterprise's mobile investments and meet needs. This document helps IT decide how to support mobile productivity for the enterprise.

The Good, the Bad and the Right Way to Deliver Windows Apps on iPads and Androids

27 August 2013

Many organizations rushing to support tablets are struggling to take mission-critical, Windows-based apps and present them on these devices in a user-friendly way. This research presents key technologies that seek to address this problem.

Modern Web App Architecture

26 September 2013

Modern Web apps can provide rich user experiences that mimic mobile app characteristics, but not by using traditional Web app architecture. Modern Web apps require new architectural patterns that treat the modern Web browser as a full-blown application runtime.

Data Mobility and Making It Big on the Small Screen

21 June 2013

Mobile devices are spurring enterprise IT to deliver new capabilities that enterprises have rarely enjoyed before. Implementing powerful mobile solutions is a demanding challenge that will require data management professionals to stretch and expand their capabilities.

Mobile File Sychronization Evaluation Criteria

19 June 2013

iPads and other tablets have sparked interest in mobile file sync solutions. Consumer-based solutions are popular, but it's hard to find a secure, easy-to-administer enterprise-grade solution. Research VP Guy Creese offers a set of evaluation criteria to aid in finding the right solution.

A Guidance Framework for Delivering a Mobile Application to Multiple Platforms

18 June 2013

For many organizations, delivering a mobile application is a key initiative to seize upon the unique opportunities presented by mobile technology. Unfortunately, the diverse mobile platform ecosystem presents a myriad of development, delivery and management challenges. This guidance document presents a framework for delivering a custom-built mobile application to multiple platforms.

Mobile Application Frameworks

17 June 2013

Mobile application frameworks help you create mobile software applications. There are several different types of frameworks, and the capabilities of each type often vary. This Reference Architecture template examines the capabilities of mobile application frameworks.

Mobility for Enterprise 3CS: At the Tipping Point

12 June 2013

Mobility is at the tipping point: When used together in certain work scenarios, smartphones and tablets are on a functional par with desktop PCs and laptops. IT must now give the same level of attention and support to mobile devices as it has lavished on desktop PCs — learning how users want to employ mobile devices as they collaborate and ensuring that users can perform bread-and-butter tasks with their smartphones and tablets. In this overview, Gartner looks at the impact mobile devices are having on the communication, collaboration, content and social (3CS) space and offers a framework for assessing how and when to use mobile devices.

Confidential Email Delivery: Ready for the Mobile Age?

7 June 2013

The email industry has failed to converge on a universal standard for message encryption and signing. Instead, vendors have implemented a wide range of secure email approaches. Solutions tend to solve the key management and usability challenges inherent in traditional email encryption protocols by narrowing the encryption use case or by relying on proprietary protocols and software. In this report, analyst Mario de Boer assesses solutions for confidential email delivery and determines how fit the solutions are in environments adopting mobile devices.

Cross-Platform Mobile Development Frameworks

5 June 2013

Organizations want to avoid the cost and complexity of using native software development kits to develop resident mobile applications. But this desire should not come at the expense of the user experience (UX). To develop portable resident mobile applications, organizations are exploring cross-platform mobile application development frameworks. These frameworks offer portability, but development teams must be careful to select a framework that matches their application requirements, supports their target platforms, and delivers a compelling UX.

Mobile UC: Extending Collaboration to Smartphones and Tablets

8 April 2013

Mobile unified communications (UC) clients enable users to connect to enterprise communications via mobile devices, including BYOD smartphones and tablets. However, enterprises will be challenged by users' high expectations in terms of device support, wireless technology and end-to-end experience.

Mobile Application Testing

26 March 2013

Delivering quality mobile applications requires that organizations have access to a wide array of devices and perform many types of tests. To fulfill these needs, organizations must use several testing solutions.

Solution Path: How to Develop Mobile Applications

25 January 2013

Customers, business users and executives are demanding mobile applications. Unfortunately, the myriad of tools, platforms and frameworks can paralyze organizations. This Solution Path helps software development teams navigate through the process of developing and delivering mobile applications.

Field Research Summary: Mobile Application Development

24 January 2013

In 2012, Gartner conducted a field research project examining mobile application development initiatives within 15 organizations. In this field research summary, we present key findings and provide practical advice to IT organizations about mobile application development.

Enterprise Mobility: Enabling Mobile Access To Voice and Video Services over WLANs

10 December 2012

The proliferation of smartphones and tablets in the enterprise is accelerating. Users are demanding mobile access to enterprise voice and video communication applications. New amendments to the 802.11 standard enable enterprise Wi-Fi networks to support real-time communications and enhance mobility.

Mobile Web Applications

7 September 2011

Organizations are challenged to deliver portable mobile solutions that target today's market-leading mobile smartphone and tablet platforms. The mobile Web offers an attractive alternative to native platform tools and technologies, and mobile web applications (MWAs) can offer a user interface (UI) that closely rivals that of native applications. However, MWAs are limited in their ability to access native device capabilities and APIs, and browser fragmentation hinders development. In this assessment, Research Director Kirk Knoernschild examines the mobile Web and explores whether mobile Web technologies and frameworks are ready for the enterprise.

Access to research documents may vary based on your subscription.

Security & Identity

Are Mobile Biometrics Ready for the Enterprise?

9 April 2014

Options for using mobile biometric technologies for user authentication are increasingly available. But availability doesn't necessarily mean viability for enterprise use. This report examines the state of mobile biometrics and their suitability for solving enterprise problems.

Insights Into Mobile Security From Field Research

11 February 2014

Mobility fundamentally changes how people work, and enterprises are taking advantage of mobile technology. Security is but one of several considerations when developing mobility strategy, but if security makes mobility unattractive, business units will move forward with it anyway.

PKI's New Lease on Life in Mobility and the Internet of Things

18 March 2014

PKI has played a quiet security role for two decades, but it never fully realized its potential. Mobility, the Internet of Things and new architecture trends have caused a resurgence of interest in PKI.

Comparing Endpoint Encryption Technologies

28 March 2013

Organizations are faced with the challenge of protecting sensitive information stored on endpoints. This assessment provides an overview of the various technologies available for endpoint encryption and their strengths and weaknesses to enable security architects to revalidate their architecture.

Enterprise Strategies for Managing the Risks of Tablets

10 September 2013

Most enterprises are coping with the influx of tablets and the rapid expansion in their use. This document considers strategies for managing the risks posed by tablets that are used for both personal and work-related activities. The most common configurations and risk scenarios are re-examined.

Using Managed Information Containers to Protect Information on Mobile Devices

14 November 2012

Managed information containers are an option for protecting sensitive information on mobile devices, but their security benefits are limited. More importantly, mobile technology is moving fast, which threatens the long-term viability of specific vendors or of add-on container solutions in general.

Are Mobile Devices Too Revealing? Balancing Privacy and Information Protection in COPE and BYOD Mobility Programs

29 October 2013

A chasm exists between perception and reality when it comes to privacy and information protection on mobile devices. Technical and programmatic controls can balance enterprise information protection needs with privacy concerns.

How to Achieve Single Sign-On With Mobile Devices

26 March 2013

Users demand a good experience from their mobile devices, and SSO is the authentication holy grail. But unifying authentication among cloud, enterprise and native applications requires comparing an alphabet soup of approaches: OAuth, OpenID Connect, PKI, VPN, WAM and many others.

Geolocation, Access Control and Privacy

28 August 2012

Location data is the fugu fish of personal information: a tempting and valued consumable that can be highly toxic if not properly handled. As geolocation technology becomes more prevalent and more diverse, organizations must develop their understanding of all its modalities and hone their ability to manage the resulting data.

Field Research Actions to Take: Getting Started With Mobile Application Security

6 August 2012

In the first half of 2012, Gartner interviewed organizations about their mobile application development. Although many applications were unique to a specific audience and use case, the participants faced similar challenges in their mobile application strategy and practices. This document amalgamates the findings on, and related to, mobile application security in order to create a set of recommendations for developing a practical approach to mobile application security — particularly for custom-developed applications. Most importantly, security teams must act now to ensure mobile application security is neither a widening gap nor a growing obstacle to the business and IT.

Security Control Requirements for Mobile Devices: A Comparison of Platforms

26 March 2013

Mobile devices frequently contain sensitive information and must be protected. Some mobile platforms are more secure in a default configuration than others. This assessment aids security professionals by comparing and analyzing the security controls of the most popular mobile device platforms.

Deploying OAuth and OpenID Connect for Enterprise Use Cases

3 September 2013

To meet the challenges that mobile apps and cloud services pose to the enterprise, newer identity protocols such as OAuth and OpenID Connect have evolved and are increasingly being deployed.

Field Research Summary: Mobility and Security

6 June 2013

Organizations are looking for tools and policies to protect their intellectual property and other sensitive information while still making the necessary information available to employees who wish to use the latest and greatest devices to work from locations both inside and outside the organization's facilities. Organizations are trying to understand issues of device ownership, the separation of personal and enterprise applications and data, the risk the new devices bring to the organization, and the costs associated with mobility. This document discusses the results of Gartner's mobility field research project that investigated how enterprises are dealing with mobile devices.

The Evolving Intersection of Mobile Computing and Authentication

22 December 2011

Behind the hype of IT consumerization lies a tectonic shift in enterprise computing. Corporate IT organizations must address authentication from mobile devices. Authentication methods and technologies surveyed include X.509 certificate, OAuth 2.0, Near Field Communication (NFC), and software one-time password (OTP) devices.

Enterprise Strategies for Managing the Risk of Tablet Computing Services

15 March 2012

Most enterprises are facing an influx of tablet computing devices and evolving their strategies for enabling limited access to enterprise information and systems. This assessment considers strategies for managing the risk posed by tablet computing devices that are used for both personal and work-related activities. It also examines the most common configurations and risk scenarios.

Access to research documents may vary based on your subscription.

Governance & Management

Best Practices for Developing a Successful Mobile Strategy

7 March 2014

Mobility is not just a mashup of technologies, but also the next step in defining how we work and live and how organizations reach their customers. We interviewed 13 companies to learn how they successfully approached mobility. This report examines key insights and mobile strategy best practices.

Mobile Productivity Framework

7 January 2014

Mobile strategists often focus on high-volume, transactional processes, but mobile tools are strong in high-value, nonroutine work. Get more value from mobility by connecting mobile productivity tool categories (beyond email and calendaring) with the nonroutine work where they can make a difference.

Best Practices for Remote and Mobile Work

3 January 2014

How does mobility change the way we work and manage? What are the implications of these new work practices? What specifically must you do to be more effective in an age of anytime/anywhere work?

Apple iOS 7 Architecture, Security and Management Capabilities

27 November 2013

This assessment examines the hardware and software architecture of Apple iOS version 7 and its security and management ecosystem.

Are Mobile Devices Too Revealing? Balancing Privacy and Information Protection in COPE and BYOD Mobility Programs

29 October 2013

A chasm exists between perception and reality when it comes to privacy and information protection on mobile devices. Technical and programmatic controls can balance enterprise information protection needs with privacy concerns.

How to Support the Mobility Revolution

20 August 2013

IT is in a unique position either to vault a company into a dynamic era of mobility where technology and business requirements change fast or to hold back its progress. However, IT must abandon old methods, procedures and organization structures and adopt new, agile ways to deliver mobile services.

How to Create a Bring-Your-Own-Device Policy

7 January 2014

IT consumerization's greatest impact has been on mobility. The iPad shifted the tablet marketplace and sparked a consumer-driven revolution. End users keep pushing to use their devices on enterprise networks. This document outlines how to establish a BYOD policy and analyzes accompanying issues.

How to Implement and Execute a BYOD Program

13 January 2014

Once a BYOD policy is defined, the sensitivity of the data on the endpoint is determined, and the level of risk that the enterprise is willing to take on has been stated, it is time to implement the program. This guidance document lays out a plan for implementing a BYOD program.

Evaluating a BYOD Implementation

22 April 2013

Developing and implementing a BYOD program requires the talents of many people in the organization. Enterprises must know if the investments in bring your own device are reflected by the results of the implementation, and IT must look to new methods for data gathering and feedback.

BlackBerry in the Enterprise: The Whys and Hows to Stay or Go

6 February 2013

BlackBerry has fallen behind Apple iOS and Google Android. BlackBerry has suffered financial setbacks and experienced network outages that have damaged its reputation. As a result, some enterprises are considering moving away from BlackBerry. This document provides guidance for such a move.

Evaluation Criteria Enterprise Mobility Management Suites

29 May 2014

Enterprise mobility management suites provide multiplatform mobile device management resulting in lower risk and lower cost of ownership. EMM products are evolving to support app, security, policy, device and service management. This report will help organizations evaluate EMM suites.

Guidance Framework for Creating a Defensible Business Case

1 August 2012

Every technical professional faces justifying a project or strategic IT effort. Engaging the business is key to this, and defining, creating and maintaining a defensible business case is the result. This document will provide guidance to creating a business case and its key component parts — such as a cost-benefit analysis.

Mobile Device Management Architectures

12 June 2013

Mobile device management (MDM) has become a critical service for IT departments needing to manage the increasing number of smartphones and tablet devices entering the enterprise. MDM systems facilitate policy setting, enforcement and support of mobile devices. Architectures of these solutions include agent-based and zero agent. Differences exist in how MDM systems integrate with the enterprise infrastructure (e.g., directory, system and network management, and public-key infrastructure [PKI]). This assessment examines the underlying architectures of MDM systems and how enterprises can make use of them.

Decision Point for Choosing the Right Mobility Management Option

13 August 2012

Selecting the right option for managing mobile devices involves examining the enterprise's security posture, making appropriate application development choices and assessing the impact on the user experience. This Decision Point will guide enterprises in choosing the kind of management to be used for smartphones and tablets.

Evaluating Mobile Device Management Platforms: Lessons Learned

5 March 2013

Mobile device management vendors are developing complex functionality, and enterprises need to test those platforms and the target devices to ensure they will operate properly. This document outlines a possible testing regimen and some observations from testing five major platforms.

Android 4 Architecture, Security and Management Capabilities

17 July 2013

This assessment examines the hardware and software architecture of Android version 4 and its security and management ecosystem.

Access to research documents may vary based on your subscription.

Mobile Architecture

Blueprint for Architecting a Wireless LAN AP Infrastructure

20 June 2014

Wireless LANs using coordinated APs offer centralized control, configuration and monitoring so large numbers of APs can be managed automatically. This approach lets the WLAN system operate as a seamless service, providing automatic services such as roaming, security and policy enforcement.

Popular Mobile App Architectures and the Frameworks That Love Them

3 March 2014

Organizations want to quickly deliver great mobile apps to multiple platforms. But developers struggle to create optimal mobile app architectures and choose the right tools and frameworks to build apps. This document helps development teams choose the best mobile app architectures and frameworks.

Exploit Cloud, Mobile, Data and Social Convergence for Disruptive Innovation

19 February 2014

Nexus projects expand the definition of user experience; exponentially increase user responsiveness and change organizations into data companies. This report explains the key insights, analyzes how the nexus facilitates disruptive innovation and describes the lessons learned from field research.

A Methodology to Achieve Mobile Endpoint Independence

21 August 2012

The dual trends of consumerization and democratization are pressuring enterprises to consider how they should evolve their network, security, and application architectures to support mobile endpoint independence, or if they should at all. Unfortunately, thoughtful and defensible creation of endpoint independence policies is complex because many interdependent considerations exist. This guidance document provides a repeatable methodology that will guide enterprises through the process of considering the various interdependencies and creating endpoint independence policies.

Focus on the Customer or Employee to Innovate With Cloud, Mobile, Social and Big Data

19 February 2014

Innovators who successfully leverage nexus forces strive to provide experiences that support the needs of their end users (customers or employees) rather than streamlining existing processes. Focus on the individual to capitalize on Nexus of Forces opportunities.

Big Data Analytics Will Drive the Visible Impact of the Nexus of Forces

28 February 2014

Innovators successfully take advantage of converging forces — information, mobile, social and cloud. Information will be the most visible force to end users. Big data analytics maturity built on the Nexus of Forces foundation will be key to enabling transformative business model disruption.

Key Elements of A Mobile Architecture

19 September 2013

A mobility architecture begins with foundational elements. This template describes the foundation for a mobile architecture and serves as a link to other related templates and documents.

Designing the Right Mobile Data Architecture

12 September 2013

A successful mobile data architecture is one that fulfills the unique requirements and constraints of mobile computing. Data architects can use this guidance framework to accommodate the requirements and constraints of mobile data architecture in an organized fashion.

Solution Path: How to Create a Mobile Architecture

1 August 2012

This Solution Path helps Gartner clients navigate through the process of making choices to create a mobile architecture that satisfies business requirements and user needs.

Mobile Application Architecture

13 August 2012

This Reference Architecture template describes the four dimensions of mobile application architecture, the options for each dimension and the implications of each option.

Decision Point for Mobile Cellular In-Building Technology

2 August 2012

It has become increasingly important for businesses to provide in-building mobile cellular connectivity to employees, partners and visitors. However, within buildings, the carrier coverage can be problematic. The solutions and technologies used to provide in-building service are selected at the discretion of the business and are outside of common IT expertise. This Decision Point provides a process and criteria to identify requirements and potential solutions in the context of a diverse and rapidly changing carrier environment.

Decision Point for Choosing the Right Mobility Management Option

13 August 2012

Selecting the right option for managing mobile devices involves examining the enterprise's security posture, making appropriate application development choices and assessing the impact on the user experience. This Decision Point will guide enterprises in choosing the kind of management to be used for smartphones and tablets.

Decision Point for Selecting a Mobile Application Architecture

13 August 2012

Application developers must make a number of architectural decisions when designing a mobile application. This Decision Point explores the four dimensions of application architecture in the context of several requirements and constraints and presents a structured decision-making framework that will help you make your mobile application architecture decisions.

Decision Point for WLAN Technology

21 June 2013

The explosion of smartphones and tablets, the increased mobility of employees, and the entry of Generation Y into the workforce have increased the demand for ubiquitous wireless LAN (WLAN) coverage. Applications such as voice, video and server-hosted virtual desktops have increased the quality-of-service demands and require an improvement in WLAN management and troubleshooting capabilities. This has forced a shift from networks of convenience to networks that are mission-critical. Simultaneously, network designs are evolving from coverage-based to those focused on reliability, deterministic behavior and performance. This Decision Point assists enterprises in selecting technologies and configuration options to support these requirements.

Decision Point for Identity and Access Management in Mobility Projects

3 August 2012

Identity and access management (IAM) provides services woven deeply into every project. Mobility projects present a special set of concerns that IAM teams must address. This Decision Point examines the architectural decisions for identity and access management in a mobility context and shows the relationship between information protection, identity assurance and authorization requirements.

Decision Point for Mobile Endpoint Security

10 July 2012

Securing mobile endpoints (including notebooks, tablets and smartphones) is a requirement for most organizations. The controls needed on the mobile endpoint depend on the information to be stored on the device (if any is to be stored at all), the ownership of the mobile endpoint device and the mobile application architecture. This Decision Point examines the architectural decisions for mobile endpoint controls and shows the relationship between security controls, the mobile application architecture, network connectivity and mobile device management.

Data Mobility and Making It Big on the Small Screen

21 June 2013

Mobile devices are spurring enterprise IT to deliver new capabilities that enterprises have rarely enjoyed before. Implementing powerful mobile solutions is a demanding challenge that will require data management professionals to stretch and expand their capabilities.

Access to research documents may vary based on your subscription.