Apple And Google At Work: The Enterprise Challenge - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
IT Leadership // Enterprise Agility
Commentary
12/4/2014
09:06 AM
100%
0%

Apple And Google At Work: The Enterprise Challenge

With Apple and Google pushing products into the enterprise, businesses need to rethink how they invest in new technology.

Tech companies that made their fortunes in the consumer market have shifted their focus to what was once considered an archaic target -- the enterprise.

This shift means that CIOs must be aware of the potential tradeoffs that come with the various services offered by different enterprise providers. For example, enterprise CIOs could unknowingly pursue a less expensive technology option while increasing their data security risk. They must take specific steps to make sure their security needs are met.

[Apple and IBM's alliance has huge potential, starting with slick business apps. Read Apple, IBM Deal: When Siri Meets Watson.]

Recently, developments in the enterprise tech space among consumer market leaders Apple and Google have brought these issues to the forefront.

Apple-IBM partnership and "Google for Work"
Three of the largest technology providers moved offensively this year to buffer flattening consumer revenues by diversifying their strengths in areas where they have traditionally lagged. Apple and IBM announced a new "Mobile First" partnership last July that will put Apple's consumer devices like the iPad and iPhone in the hands of the legendary IBM sales force. Two months later, Google rebranded its enterprise offerings as "Google for Work," which allows the company to leverage Google brands that are already strong in the consumer market.

Hampered by increased competition and consumer market saturation, Apple aims to put its devices in the hands of more enterprise users. While widely adopted by consumers, Apple products are not well accepted in the C-suite. With the partnership, IBM gained a "trendier" suite of products to sell to its enterprise customers, while equipping Apple devices with its data analytics capabilities. The arrangement gives IBM more opportunities to penetrate its customers' senior executive levels.

Meanwhile, Google's new offering, Google for Work, is an attempt to compete with Microsoft in the enterprise space. Microsoft recently positioned itself as the "productivity and platforms" company for the future. Google for Work takes its well-known tools, such as Gmail, Google Maps, and the Google Cloud Platform, and applies them to enterprise customers to "create a new way of doing work." And Google emphasizes the "security, transparency, compliance and consumer support" as part of Google for Work.

How do the business models stack up?
While all three companies are targeting enterprises, their business models couldn't be more different.

Apple and IBM command higher prices while offering more sophisticated features and data protection. Conversely, Google is able to sell products at a much lower price point by leveraging its users' data for commercial purposes. However, in both cases, this can create potential problems for enterprises. Specifically, can enterprises be assured that their data does not leak into the consumer space? And how is this data kept separate?

As these tech companies vie to capture share in the market, enterprises are presented with a wider range of options, technology, and prices. But before investing in new enterprise technology, IT decision makers should take these actions to ensure privacy and security.

1. They must create a risk profile for both company- and employee-related data. It is particularly important that organizations determine which data sets require the highest levels of protection, where the greatest vulnerabilities are, and how to address them. These risk profiles break down risks into an objective set of measures that can be prioritized for investment. The National Institutes for Standard and Technology (NIST) announced a new cyber security framework in early 2014 that outlines a risk-based approach for improving cyber security programs for all companies on a voluntary basis.

2. They should match their organization's risk profile to the data protection offered by the different technology options. Knowing how the options stack up against the organization's biggest priorities will help identify the best fit. The NIST framework also offers guidance about how to take this vital step and generate a ranked list of items for funding associated with new technologies.

3. The total cost of ownership for each option should be calculated. This should include a monetary value assigned to cyber security vulnerabilities -- such as data loss or theft, placement of malware, and unintended uses of data -- that could lead to economic loss. Taking a full cost versus risk analysis into account is much more reliable than comparing the initial price tag alone.

Increased competition with the addition of Apple and Google in the enterprise could mean more opportunities for businesses to improve efficiency. But those improvements could come at a greater, intangible cost if all factors -- including data protection risk and total cost -- are not well understood.

Apply now for the 2015 InformationWeek Elite 100, which recognizes the most innovative users of technology to advance a company's business goals. Winners will be recognized at the InformationWeek Conference, April 27-28, 2015, at the Mandalay Bay in Las Vegas. Application period ends Jan. 16, 2015.

Julie M. Anderson is expert at organizational transformation, including strategy development and execution; operational excellence; financial management; human capital development; and marketing and communications. She served as Acting Assistant Secretary for Policy and ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
yalanand
50%
50%
yalanand,
User Rank: Ninja
12/31/2014 | 2:42:14 PM
Re: If only...
Well it was only a matter of time until someone found out what Sony had been upto, how insecurely and without a proper order were their employee details and other data stored. It would have been a better thing if Sony had taken cyer security seriously.
SunitaT0
50%
50%
SunitaT0,
User Rank: Ninja
12/30/2014 | 5:54:57 AM
If only...
" They must create a risk profile for both company- and employee-related data. It is particularly important that organizations determine which data sets require the highest levels of protection, where the greatest vulnerabilities are, and how to address them. "

If only SONY functioned like this, then the greatest hack of 21st century wouldn't have been successful in doing the damage.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll