A Methodology to Achieve Mobile Endpoint Independence

Archived Published: 04 May 2011 ID: G00211761

Analyst(s): |

Not a Gartner Client?

Want more research like this?
Learn the benefits of becoming a Gartner client.

contact us online


The dual trends of consumerization and democratization are pressuring enterprises to consider how they should evolve their network, security, and application architectures to support mobile endpoint independence, or if they should at all. Unfortunately, thoughtful and defensible creation of endpoint independence policies is complex because many interdependent considerations exist. This guidance document provides a repeatable methodology that will guide enterprises through the process of considering the various interdependencies and creating endpoint independence policies.

Table of Contents

  • Summary of Findings
  • Guidance Context
    • Problem Statement
    • Guidance Applicability
    • Related Guidance
  • Gartner Definitions
  • The Gartner Approach
  • The Guidance Framework
    • Pre-Work
    • Step 1: Define Use Case Characteristics
    • Step 2: Select Best Match Use Case in Table
    • Step 3: Analyze Model Impact on Network, Security, Management, and Support
      • Web-Enabled Application
      • Local Application with Remote Data
      • Server-Based Computing
      • Server-Hosted Virtual Desktop
      • Application Virtualization
      • Client-Hosted Virtual Desktop
      • Local Applications with Local Storage
    • Step 4: Consider Additional Factors
      • Impact on the Internal Network
      • Communications Security
      • Regulatory Restrictions
      • Service Desk and Support Impact
  • Risks and Pitfalls
  • Conclusion
  • Use Case Details
    • Traveling Worker Use Case
    • Mobile Office Worker Use Case
    • Office Worker Use Case
    • Teleworker Use Case
    • Traveling Worker Without Access to Sensitive Information Use Case
    • Mobile Office Worker Without Access to Sensitive Information Use Case
    • Office Worker Without Access to Sensitive Information Use Case
    • Teleworker Without Access to Sensitive Information Use Case
  • Recommended Reading
  • Revision History
© 2011 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Free Research

Discover what 12,000 CIOs and Senior IT leaders already know.

Free Access

Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more

Call +1 800 213 4848 or contact us

to become a Gartner client.