Maturing mobile business applications could speed adoption of enterprise mobility in manufacturing in the coming year, but lining up the right software tools and devices
Improving mobile data management
The latest and greatest mobile devices and mobile business applications send critical business information to decision makers at near-real-time speeds, but manufacturers can derive value only if the information is accurate and reliable. To quote an old news industry maxim: It’s better to be right than first.
Accuracy is important because as employees gain access to applications from mobile devices, they’ll act on the data more quickly, noted Kimberly Knickle, practice director for IDC Manufacturing Insights, a research company based in Framingham, Mass.
If the data is inaccurate, the resulting action could cause a ripple effect throughout the supply chain -- affecting inventory counts, supplier information or even product recalls, she added.
“The good news is that mobile workers are entering data on the spot, so hopefully that means it’s more accurate than if they are trying to read their notes and enter the information later -- or when information is never entered in the first place,” Knickle said.
Balancing anywhere, anytime delivery with accuracy requirements makes it more important than ever for manufacturers to find the data management Holy Grail -- a single version of truth. “Manufacturers are getting close [to achieving this goal], but I think we are talking about something that’s always going to be in process,” Knickle said.
To keep the process moving forward, industry experts recommend that manufacturers redouble the data management efforts that should be in place across the enterprise. This means conducting data quality profiles to spot anomalies, such as redundant or conflicting information, and launching a master data management (MDM) system that can help assure that information housed in a data warehouse remains reliable.
Mobile ERP, BI pose security concerns
The latest hacker exploits may grab headlines, but this nefarious group isn’t always the biggest threat to companies, experts say. Insiders have long been responsible for the most damaging security breaches, even when breaches are unintentional. For example, 33% of security professionals say insider attacks are more costly than those organized by outsiders -- a rise of 7%, according to the 2011 CyberSecurity Watch Survey, conducted by CSO magazine and sponsored by the Deloitte consultancy.
Plugging those holes -- which will become even more essential as mobile ERP and BI become commonplace -- requires a combination of mobile security policies and appropriate technologies, according to industry analysts.
To craft a solid security policy, Knickle advises organizations to first decide which employees or roles require mobile access to enterprise applications and data. Security managers then need to decide if mobile hardware should include employee-owned devices that serve double duty as workplace tools or if company-owned and provisioned devices are a safer option. The former may provide some initial capital cost savings, but the savings may diminish as the IT department is forced to support multiple operating systems and sort out software licensing issues, she said. For example, manufacturers will need to determine if corporate licenses for mobile ERP programs allow employees to legally load the software on their personal smartphones and tablets.
The decisions IT managers make today about personal and company-provisioned devices may not hold fast for the future, according to Knickle “I believe there are more individual-liable [that is, personal] devices used through 2015. Then there is going to be a shift where companies say, ‘No, I want you to use our device,’ ” she predicted.
Either way, organizations should consider installing technology that can remotely wipe the devices clean of company data if the hardware is lost or stolen, Knickle said.
Other security safeguards include data loss protection (aka data leak protection), or DLP, technology that acts as the flip side to traditional firewalls. DLP solutions stem the outward flow of information and can block people from attaching customer financial information, for example, to an e-mail message. The downside, according to analysts: IT managers must fine-tune DLP systems to assure network performance doesn’t suffer from all the added security monitoring.
Cloud-based applications and desktop virtualization offer additional levels of security for mobile applications. Although experts stress that each approach is slightly different, Software as a Service ERP solutions, on-premises private-cloud implementations and desktop virtualization all share a model based on storing applications and data in a central data center, where IT administrators can closely manage the resources according to company security policies.