Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analysis: Mobility Apps: Page 10 of 12

The final decisions for a mobile application deployment include device management, security and whether to employ some sort of mobile middleware. Yes, mobile middleware adds cost, but payoffs include increased security; mobility across networks, such as between Wi-Fi and 3G; support for additional handheld platforms; wireless network optimization; mobile computing policy enforcement; and access to a wider variety of enterprise data. Our advice: See how far you can get with your primary application vendor, then augment as needed.

Take device management. Key features include over-the-air (OTA) provisioning, downloads/updates, policy control, document distribution and mobile inventory control. Many vendors provide mobile device management, including Altiris (which Symantec is in the process of acquiring), BMC, CA, HP, IBM/Tivoli, Nokia Intellisync, iPass, Avocent LANDesk, ManageSoft, Microsoft, Novell, Pervacio, Sybase, Symantec and Wavelink. Our reader poll was split between those who think it's vital for the application vendor to provide device management functions, and those saying this was unimportant. In our RFI response, all the application vendors provided some degree of device management. Whether to use a third-party tool depends on how many devices and applications you're supporting. The greater the number, the more likely you'll need a separate management system. In "Management On the Move", we review mobile device management systems from Avocent LANDesk, Nokia Intellisync, Novell and Sybase iAnywhere as well as RIM's BlackBerry Enterprise Server and hosted device-management products from Perlego and iPass.

As for security, similarly, if you're supporting a large number of devices and apps, you may need a separate system. The app vendors we surveyed have good security offerings, so you may be able to get started with their capabilities before invoking third parties. For instance, nearly all the products authenticated users, encrypted data communications, encrypted data on the device and had provisions to neutralize lost/stolen devices.

Finally, even though many application vendors now support mobile devices, this does not mean the demise of mobile middleware, especially if the number of companies providing it is any indication. Consider middleware when you need greater automatic mobility across different types of networks, say, Wi-Fi to 3G; more efficient network utilization; and support for a variety of mobile devices. Some of the vendors here include BEA, IBM, Motorola Good, NetMotion Wireless, Nokia Intellisync, Oracle, RIM, SAP, Seven Networks, Sun, Sybase, TCS Mobile, Visto and Wavelink.

There's no question that mobile computing will become pervasive, with today's wireless e-mail a precursor for developments to come. Devices will grow ever more powerful, user interfaces will evolve through developments such as improved voice recognition, and enterprise applications will become much more agile in the range of mobile user devices they support. Plot a strategy now, or be left at a disadvantage.

Tactical Or Strategic: What's Your Plan?