Gartner

Exploit Mobility to Drive Business Innovation

View All Special Reports

Stay Connected

Facebook LinkedIn Twitter

The media tablet market did not exist in early 2010. But now, millions of workers use these tablets in the enterprise every day and the tablet market is just the tip of the mobility iceberg. Just below the surface lies a torrent of innovations that include mobile apps, mobile analytics, EMM tools, security technology, cloud computing, interconnected things, mobile collaboration, and wireless technologies.

Gartner VP Paul DeBeasi discusses enterprise mobility trends for 2014.

Gartner for Technical Professionals: Mobility Research

  • Infrastructure
  • Users, Applications & Data
  • Security & Identity
  • Governance & Management
  • Mobile Architecture

Infrastructure

Connecting People and IoT Devices to the Wireless Network in the BYOD Era

29 July 2014

Organizations often oversimplify their wireless access control when they should align access mechanisms to the multiple personas of users, the variety of devices they carry, use of BYOD and an expanding IoT. One size does not fit all, and demands for protection must balance against user needs.

Blueprint for Architecting a Wireless LAN AP Infrastructure

20 June 2014

Wireless LANs using coordinated APs offer centralized control, configuration and monitoring so large numbers of APs can be managed automatically. This approach lets the WLAN system operate as a seamless service, providing automatic services such as roaming, security and policy enforcement.

Mobile Wireless Performance Issues and Solutions

12 March 2014

Wireless performance is an issue for applications and the Web. This assessment presents data on wireless LAN and mobile cellular performance, and then discusses methods to improve performance by use of WAN performance optimization and improvements to the network and applications.

How to Successfully Deliver Mobile Unified Communications Over WLANs

12 March 2014

In an effort to drive mobile productivity, enterprises are extending UC services to smartphones and tablets over WLANs. A successful strategy requires that technical professionals assess updates to the 802.11 standard that support voice and video communications and expanded Wi-Fi network capacity.

Defining the Real Requirements Behind Your Next WLAN

22 January 2014

The rising use of laptops, tablets and smartphones serving critical business, BYOD and guest needs requires that WLANs deliver ever-expanding capabilities. Organizations embarking on new or upgraded WLANs must ensure that requirements impacting design and deployment are well-defined and understood.

What You Need to Know When Extending Videoconferencing to Mobile Devices

10 January 2014

The extension of enterprise videoconferencing services to mobile devices, especially tablets, is multifaceted, and can include company-owned, BYOD and guest devices. When implementing mobile videoconferencing, IT must contemplate a complex set of cloud, mobility, networking and UC forces.

Where, When and How to Deploy 802.11ac

10 December 2013

The 802.11ac standard enables the next-generation WLAN. Its capabilities support business demands and BYOD. Wireless designs must be properly implemented, and impacts on enterprise network infrastructures must be addressed. Embracing 802.11ac at the right time will lead to its cost-effective use.

The Technology and Application of WLAN Location Services

29 August 2013

The growth of WLANs provides a foundation for the simplified addition of real-time location services that offer significant benefits to businesses such as enhanced productivity and loss prevention. With the growth of mobility, even common smartphones can be tracked, thus enabling customer analytics.

How to Succeed With iPads in the Enterprise and Avoid the Pitfalls

17 July 2013

A successful implementation of iPads in an enterprise requires balancing infrastructure requirements, user desires (e.g., BYOD) and IT control (e.g., MDM). However, if done well, iPads complement smartphones and PCs, creating a composite solution that drives mobile productivity and collaboration.

Impact of Virtualization on Network, Network Interfaces, and Network Appliances

17 June 2013

This assessment discusses the network architectural and managerial implications of virtual servers and virtual network appliances (e.g., switches, probes, application delivery controllers, firewalls, and performance optimizers).

Access to research documents may vary based on your subscription.

Users, Applications & Data

Blueprint for Architecting Sensor Data Management Big Data Analytics

27 June 2014

Sensors are pervasive and expected to grow exponentially, resulting from the Internet of Things. Sensor data management is challenging, but rewards can be game-changing. This Blueprint helps you successfully architect sensor data management to support your strategic big data analytics.

Modern Web App Architecture

26 September 2013

Modern Web apps can provide rich user experiences that mimic mobile app characteristics, but not by using traditional Web app architecture. Modern Web apps require new architectural patterns that treat the modern Web browser as a full-blown application runtime.

Build Great Mobile Apps With HTML5

14 March 2014

You don't need to sacrifice portability, deployment flexibility or the world of Web tooling for a great user experience. To build great mobile apps with HTML5, designers and developers must be familiar with mobile interface behaviors and the proper techniques to create them using Web technologies.

Popular Mobile App Architectures and the Frameworks That Love Them

3 March 2014

Organizations want to quickly deliver great mobile apps to multiple platforms. But developers struggle to create optimal mobile app architectures and choose the right tools and frameworks to build apps. This document helps development teams choose the best mobile app architectures and frameworks.

Evaluation Criteria Mobile Application Development Platforms

22 May 2014

Organizations evaluating mobile application development platforms require common criteria to objectively gauge competing solutions. This research outlines the required, preferred and optional technical features of a MADP.

Solution Path: How to Develop Mobile Applications

25 January 2013

Customers, business users and executives are demanding mobile applications. Unfortunately, the myriad of tools, platforms and frameworks can paralyze organizations. This Solution Path helps software development teams navigate through the process of developing and delivering mobile applications.

Mobile Application Testing

26 March 2013

Delivering quality mobile applications requires that organizations have access to a wide array of devices and perform many types of tests. To fulfill these needs, organizations must use several testing solutions.

Blueprint for Building Modern Web Apps with HTML5

5 June 2014

Single-page applications treat the Web browser as a full-blown runtime, enabling new types of multichannel user experiences. SPAs require attention to client-side architecture and design, and the use of client-side frameworks and libraries.

Blueprint for Architecting Resident Mobile Apps

7 May 2014

Hybrid mobile apps are built with native and Web code. Two types of hybrid architecture exist. Web hybrid apps are pure mobile Web apps wrapped in a WebView control. Native hybrid apps blend some Web content in a WebView control with custom native code.

Choosing a JavaScript Framework

13 May 2014

Building modern Web applications is a complex undertaking, making the choice of a JavaScript framework particularly critical. Industry adoption, developer experience and feature richness must be the primary considerations in choosing a framework.

Evaluation Criteria for Enterprise File Synchronization and Sharing

30 May 2014

Organizations evaluating enterprise file synchronization and sharing solutions require common criteria to objectively gauge competing solutions. This research outlines the required, preferred and optional evaluation criteria that organizations should consider when evaluating EFSS solutions.

Mobile Productivity Framework

7 January 2014

Mobile strategists often focus on high-volume, transactional processes, but mobile tools are strong in high-value, nonroutine work. Get more value from mobility by connecting mobile productivity tool categories (beyond email and calendaring) with the nonroutine work where they can make a difference.

Which Mobile Database Is Right for You?

22 November 2013

Mobile databases provide the data-handling infrastructure that enterprise-class mobile apps require. This assessment outlines a framework for comparing mobile databases and assesses the strengths and capabilities of the mobile databases on the market today.

Increase Mobile Productivity by Choosing the Right App, for the Right Device, for the Right User

24 October 2013

Mobile devices have extended productivity beyond the desktop to anytime and anywhere. IT must grapple with numerous devices, use cases, apps and users to optimize the enterprise's mobile investments and meet needs. This document helps IT decide how to support mobile productivity for the enterprise.

The Good, the Bad and the Right Way to Deliver Windows Apps on iPads and Androids

27 August 2013

Many organizations rushing to support tablets are struggling to take mission-critical, Windows-based apps and present them on these devices in a user-friendly way. This research presents key technologies that seek to address this problem.

Assessing Mobile Conferencing Capabilities

6 June 2014

Although conferencing solutions have evolved to support mobile platforms, they haven't achieved parity with desktop clients. IT needs to understand what's possible and how features compare to user expectations.

Access to research documents may vary based on your subscription.

Security & Identity

Are Mobile Biometrics Ready for the Enterprise?

9 April 2014

Options for using mobile biometric technologies for user authentication are increasingly available. But availability doesn't necessarily mean viability for enterprise use. This report examines the state of mobile biometrics and their suitability for solving enterprise problems.

PKI's New Lease on Life in Mobility and the Internet of Things

18 March 2014

PKI has played a quiet security role for two decades, but it never fully realized its potential. Mobility, the Internet of Things and new architecture trends have caused a resurgence of interest in PKI.

Comparing Endpoint Encryption Technologies

28 March 2013

Organizations are faced with the challenge of protecting sensitive information stored on endpoints. This assessment provides an overview of the various technologies available for endpoint encryption and their strengths and weaknesses to enable security architects to revalidate their architecture.

How to Achieve Single Sign-On With Mobile Devices

26 March 2013

Users demand a good experience from their mobile devices, and SSO is the authentication holy grail. But unifying authentication among cloud, enterprise and native applications requires comparing an alphabet soup of approaches: OAuth, OpenID Connect, PKI, VPN, WAM and many others.

Security Control Requirements for Mobile Devices: A Comparison of Platforms

26 March 2013

Mobile devices frequently contain sensitive information and must be protected. Some mobile platforms are more secure in a default configuration than others. This assessment aids security professionals by comparing and analyzing the security controls of the most popular mobile device platforms.

Deploying OAuth and OpenID Connect for Enterprise Use Cases

3 September 2013

To meet the challenges that mobile apps and cloud services pose to the enterprise, newer identity protocols such as OAuth and OpenID Connect have evolved and are increasingly being deployed.

Are Mobile Devices Too Revealing? Balancing Privacy and Information Protection in COPE and BYOD Mobility Programs

29 October 2013

A chasm exists between perception and reality when it comes to privacy and information protection on mobile devices. Technical and programmatic controls can balance enterprise information protection needs with privacy concerns.

Enterprise Strategies for Managing the Risks of Tablets

10 September 2013

Most enterprises are coping with the influx of tablets and the rapid expansion in their use. This document considers strategies for managing the risks posed by tablets that are used for both personal and work-related activities. The most common configurations and risk scenarios are re-examined.

Insights Into Mobile Security From Field Research

11 February 2014

Mobility fundamentally changes how people work, and enterprises are taking advantage of mobile technology. Security is but one of several considerations when developing mobility strategy, but if security makes mobility unattractive, business units will move forward with it anyway.

Access to research documents may vary based on your subscription.

Governance & Management

How to Build a High-Performance Mobile Center of Excellence

3 June 2013

Enterprises are scrambling to create mobile strategies. Many are hamstrung by unrealistic expectations, vague requirements and organizational inertia. This step-by-step methodology will help enterprises overcome these challenges in order to build a high-performance mobile center of excellence.

Best Practices for Developing a Successful Mobile Strategy

7 March 2014

Mobility is not just a mashup of technologies, but also the next step in defining how we work and live and how organizations reach their customers. We interviewed 13 companies to learn how they successfully approached mobility. This report examines key insights and mobile strategy best practices.

How to Create a Bring-Your-Own-Device Policy

7 January 2014

IT consumerization's greatest impact has been on mobility. The iPad shifted the tablet marketplace and sparked a consumer-driven revolution. End users keep pushing to use their devices on enterprise networks. This document outlines how to establish a BYOD policy and analyzes accompanying issues.

How to Implement and Execute a BYOD Program

13 January 2014

Once a BYOD policy is defined, the sensitivity of the data on the endpoint is determined, and the level of risk that the enterprise is willing to take on has been stated, it is time to implement the program. This guidance document lays out a plan for implementing a BYOD program.

Evaluating a BYOD Implementation

22 April 2013

Developing and implementing a BYOD program requires the talents of many people in the organization. Enterprises must know if the investments in bring your own device are reflected by the results of the implementation, and IT must look to new methods for data gathering and feedback.

Evaluation Criteria Enterprise Mobility Management Suites

29 May 2014

Enterprise mobility management suites provide multiplatform mobile device management resulting in lower risk and lower cost of ownership. EMM products are evolving to support app, security, policy, device and service management. This report will help organizations evaluate EMM suites.

Apple iOS 7 Architecture, Security and Management Capabilities

27 November 2013

This assessment examines the hardware and software architecture of Apple iOS version 7 and its security and management ecosystem.

Android 4 Architecture, Security and Management Capabilities

17 July 2013

This assessment examines the hardware and software architecture of Android version 4 and its security and management ecosystem.

Best Practices for Remote and Mobile Work

3 January 2014

How does mobility change the way we work and manage? What are the implications of these new work practices? What specifically must you do to be more effective in an age of anytime/anywhere work?

How to Support the Mobility Revolution

20 August 2013

IT is in a unique position either to vault a company into a dynamic era of mobility where technology and business requirements change fast or to hold back its progress. However, IT must abandon old methods, procedures and organization structures and adopt new, agile ways to deliver mobile services.

Access to research documents may vary based on your subscription.

Mobile Architecture

2015 Planning Guide for Mobility: Innovation for the Digital Business

2 October 2014

Mobility inspires and delights consumers, but employees are not so enthralled. IT organizations struggle to deliver mobile innovation due to immature and fragmented management, collaboration, security and app development products. Business must deliver great UX for consumers and employees.

Solution Path: How to Create a Mobile Architecture

1 August 2012

This Solution Path helps Gartner clients navigate through the process of making choices to create a mobile architecture that satisfies business requirements and user needs.

Key Elements of A Mobile Architecture

19 September 2013

A mobility architecture begins with foundational elements. This template describes the foundation for a mobile architecture and serves as a link to other related templates and documents.

Mobile Application Architecture

13 August 2012

This Reference Architecture template describes the four dimensions of mobile application architecture, the options for each dimension and the implications of each option.

Popular Mobile App Architectures and the Frameworks That Love Them

3 March 2014

Organizations want to quickly deliver great mobile apps to multiple platforms. But developers struggle to create optimal mobile app architectures and choose the right tools and frameworks to build apps. This document helps development teams choose the best mobile app architectures and frameworks.

Decision Point for WLAN Technology

21 June 2013

The explosion of smartphones and tablets, the increased mobility of employees, and the entry of Generation Y into the workforce have increased the demand for ubiquitous wireless LAN (WLAN) coverage. Applications such as voice, video and server-hosted virtual desktops have increased the quality-of-service demands and require an improvement in WLAN management and troubleshooting capabilities. This has forced a shift from networks of convenience to networks that are mission-critical. Simultaneously, network designs are evolving from coverage-based to those focused on reliability, deterministic behavior and performance. This Decision Point assists enterprises in selecting technologies and configuration options to support these requirements.

Blueprint for Architecting a Wireless LAN AP Infrastructure

20 June 2014

Wireless LANs using coordinated APs offer centralized control, configuration and monitoring so large numbers of APs can be managed automatically. This approach lets the WLAN system operate as a seamless service, providing automatic services such as roaming, security and policy enforcement.

Designing the Right Mobile Data Architecture

12 September 2013

A successful mobile data architecture is one that fulfills the unique requirements and constraints of mobile computing. Data architects can use this guidance framework to accommodate the requirements and constraints of mobile data architecture in an organized fashion.

Access to research documents may vary based on your subscription.