It’s a brave new world for today’s knowledge workers who now have a myriad of choices on how to access business applications, with mobile being the new, preferred way to access applications. And they use a lot more applications than just a few short years ago. These increasing number of applications can be accessed via the Cloud or software-as-a-service (SaaS), as well as on-premise, and span across CRM (customer relationship management), ERP (enterprise resource planning), HCM (human capital management), SFA (sales force automation) and many, many others.
We seem to be in a deconstruction period of the business application where you used to buy big suites of integrated components, capabilities, and modules to run your enterprise. Now it seems as though every module and feature and even button has become it’s own SaaS application from a different ISV (independent software vendor) that users are adopting either at the departmental-, IT-, or even the individual user-level.
Increasingly, the use of mobile devices has become the preferred way to access many of these applications. Except for content creation many knowledge workers use their mobile tablets, iPhones, and Android devices to more frequently access their applications than they do their laptops. The laptop is there for content creation, but most people are so busy, on the move, and/or working from home that the mobile device is their preferred way to access these applications.
And all of these applications, users and devices are increasingly no longer behind the firewall. We’re seeing the traditional approaches to managing application access and device management security break down because of this de-perimeterization of the organization.
And so this introduces some very interesting challenges, including the rise of too many passwords for end-users, increasing numbers of mobile devices accessing applications, and IT management loss of control and visibility, that I’ll write about in my next blog post.
Until then, what do you think?