• TRUSTED RESEARCH

    TRUSTED RESEARCH | STRATEGIC INSIGHT

    SMB. CORE MIDMARKET. UPPER MIDMARKET. ECOSYSTEM
    LEARN MORE
  • BUYER JOURNEY

    BUYER JOURNEY

    SMB & Midmarket Buyers Journey Research
    LEARN MORE
  • BUYER PERSONAS

    BUYER PERSONAS

    SMB & Midmarket Technology Buyer Persona Research
    LEARN MORE
  • ARTIFICIAL INTELLIGENCE

    ARTIFICIAL INTELLIGENCE

    SMB & Midmarket Analytics & Artificial Intelligence Adoption
    LEARN MORE
  • DATACENTER SOLUTIONS

    DATACENTER SOLUTIONS

    SMB & Midmarket Datacenter Solution Adoption Trends
    LEARN MORE
  • INTERWORK 2.0: THE AGENTIC FUTURE OF CONNECTED BUSINESS

    INTERWORK 2.0: THE AGENTIC FUTURE OF CONNECTED BUSINESS

  • 2026 TOP 10 SMB BUSINESS ISSUES, IT PRIORITIES, IT CHALLENGES

    2026 TOP 10 SMB BUSINESS ISSUES, IT PRIORITIES, IT CHALLENGES

  • 2026 TOP 10 SMB PREDICTIONS

    2026 TOP 10 SMB PREDICTIONS

    SMB & Midmarket: Autonomous Business
    READ
  • 2026 TOP 10 PARTNER PREDICTIONS

    2026 TOP 10 PARTNER PREDICTIONS

    Partner & Ecosystem: Next Horizon
    READ
  • IT SECURITY TRENDS

    IT SECURITY TRENDS

    SMB & Midmarket Security Adoption Trends
    LATEST RESEARCH
  • PARTNER ECOSYSTEM

    PARTNER ECOSYSTEM

    Global Channel Partner Trends
    LATEST RESEARCH

Techaisle Analyst Insights

Trusted research and strategic insight decoding SMBs, the Midmarket, and the Partner Ecosystem.
Anurag Agrawal

Codeproof: Cloud-based MDM for SMBs

A common SMB usage scenario

An IT administrator of a small business gets a call from an employee saying that he lost his iPad with customer billing info, specs of recent architecture drawing; corporate emails and he did not even have a lock in the iPad. What can the IT Administrator do? This is where Codeproof comes into picture. With Codeproof, the IT Administrator could have remotely located the iPad, locked it and even remotely erased the iPad thereby preventing any data-theft.

A common barrier to Mobility Adoption within SMBs

The need for device and data security for mobile devices is an important deterrent in mobility adoption, especially as consumer and business apps converge onto the same devices. Nevertheless mobility is here to stay but going down the route of mobility is also fraught with unexpected surprises – most important being accidental loss of device with company data, employee walking off with device or malware creating havoc with the device.  Many surveys conducted by Techaisle reveal that SMBs worry about these issues a lot but fail to protect themselves adequately. For example, 69 percent of SMB IT Decision makers in the US are concerned about accidental loss of devices containing sensitive data. And nearly 1/3rd of these decision makers are also concerned about inability to manage device configurations so that they comply with company policies. To top it all, there is the issue of managing employee devices that businesses did not buy.

Techaisle survey of 9,500 SMBs across different geographies show that accidental loss of device followed by imminent danger of mobile viruses are the top concerns of SMBs while using mobile applications. This also clearly demonstrates the need for remote mobile device management, authentication, and remote erasure of data.

 SMB Apprehensions in using Tablets and Smartphones


 

The above data clearly demonstrates the need for remote management, authentication, and remote erasure of data on mobile devices. Data no longer resides on tethered devices such as desktops but is spread across multiple devices that “move”. SMBs need to plan for it to make mobility an enjoyable and productive experience.

Codeproof is a simple to use, Cloud-based, SaaS, Freemium model MDM

In four easy steps Codeproof MDM is up and running on iOS and Android devices. A Seattle-based company, Codeproof offers an integrated BYOD security and mobile device management platform specially targeted at small and medium businesses. Some of its main mobile security features are App-white listing, Malware protection and Mobile policy management. It is built on Amazon EC2 elastic cloud for scalability, anytime, anywhere access.

 Codeproof mobile policy screenshots


An admin can enroll all mobile devices to Codeproof by installing and enrolling Codeproof App on the device. As the devices get enrolled via the mobile Copdeproof app, the devices automatically appear in Codeproof Cloud console tree. The admin can now remotely manage all devices from Cloud console. When an employee leaves the company, the admin just deletes the corresponding employee MDM profiles (WiFi profiles, Email Profiles, etc.) thus disabling the devices from accessing any type of corporate data.

Codeproof is free for 2 devices and is priced at only 29.99$ per device per year. It is worth a try.

Anurag Agrawal

Techaisle survey data shows BYOD is a major force in the US SMB Market

techaisle-smb-byod-trend-end-point-device-adoption

To set the context for a BYOD discussion Techaisle’s survey on end-point technology status of SMBs provide an intriguing set of statistics through which we can assess recent endpoint trends. BYOD is clearly a major force in the US SMB market. BYOD purchases accounted for 13% of all new laptops, 17% of all new tablets, and 22% of all new smartphones purchased by US SMBs in 2013. This creates challenges for both IT management, which needs to establish methods of managing these devices, and for suppliers, who need to work with SMBIT to secure their position in the main endpoint categories, and also appeal to business managers and individual buyers to ensure that they are not left out of a major portion of the market. Techaisle’s SMB End-point survey data shows that approaches to BYOD –brand selection, reimbursement, application download and support – vary with employee size, with small SMBs leaving most of the decision, cost and support to individual users, and larger SMBs tending to involve business and/or IT management in these activities.

The survey data also shows that overall frequency of device purchases, which speaks to the erosion of the notebook market as emphasis shifts to alternative screens; in 2013, a higher percentage of US SMB employees were using tablets and smartphones than notebooks purchased within the year.

Suppliers need to recognize the distinctions that are apparent across employee size categories, and structure their offerings accordingly. IT vendors courting the very small business (1-19 employee) segment should recognize that employees are most likely paying for and supporting these devise themselves; as a result, IT vendors will need to offer financing and vendor/carrier-supplied, business-grade support options. In larger SMBs, specifically, mid-market businesses, funding and support is more likely to come from business and IT management; in these segments, OEMs are advised to establish programs that make it easy to onboard, secure and support new devices and users. In both cases, there are gaps in policies; suppliers who help businesses to establish and implement effective BYOD practices may be able to position their products favorably as a result.

SMB employees driving much of the activity is also creating sales and marketing challenge for suppliers: opportunities to sell brands and configurations that are outside corporate specifications, and challenges in aligning channel strategies to a market that includes both IT and individual employees (business management) as important buying groups.

Within the SMB context, BYOD itself comes in several ‘flavors.’ Techaisle survey data shows that on hand an SMB employee both selects and pays for a new device, delighting the CFO, but causing problems for IT. On the other, the SMB employee pays for the device, but selects it based on guidelines or an approved list – an approach (referred to in some cases as CYOD) that appeals to both the CFO and IT, but might not be completely satisfactory for the employee. BYOD can take any one of these paths and add some level of reimbursement for the purchase from the company and/or technical support for the devices, which has both upside (because the employee selects technology that he/she is comfortable with) and downside (the cost burden rests, at least to some extent, with the company rather than the employee) for the SMB business owner. And regardless of the approach chosen, some SMBs are instituting formal contracts that provide them with authorization to secure and (if necessary) ‘wipe’ employee-owned devices.

Who selects the BYOD brand?


The most critical BYOD question for IT manufacturers revolves around brand selection: is it done by the employee or the employer? Survey data shows that the answer depends largely on the size of the SMB business.

Who pays the BYOD bill?


One of the contentious issues in BYOD is the matter of responsibility for funding the device purchase. Many employees view BYOD as an attempt by their SMB employers to shift costs from the business to its staff. Many SMBs, on the other hand, see BYOD as a means of ensuring that employees have access to the technology that they like best. Some employers view paying for the devices as a means of building goodwill with staff (and/or as a means of building a basis for exerting management control over the devices), while others believe that simply allowing the devices to be connected to corporate assets represents contribution enough.

Who is responsible for BYOD support?


In our survey, we asked respondents to identify the ways in which their organizations support BYOD devices. The findings provide a fascinating insight into the ways in which BYOD devices are integrated into the corporate endpoint portfolio from no support at all to commitment to full integration of BYOD devices.

What is the policy with respect to app downloads on BYOD devices?


One of the key employee benefits associated with BYOD devices is that employees have a platform on which to run personal applications. What, though, is the implication for business applications? Are employees free to select any app that they choose, or should the business play a role in directing or determining the selection of business apps? Results from the survey suggest that the degree of formalization associated with app selection and installation varies from no formal policy to a very structured approach.

Is there a contract in place to govern BYOD use?


The final BYOD issue investigated by our survey related to the creation of contracts between employers and employees. Techaisle considers these contracts to be important to the success of BYOD strategies, as they provide explicit employee agreement to IT activities necessary to safeguarding corporate apps and data and we expect that this will become standard HR practice in BYOD-friendly SMBs over time.

About the Report

Coverage:

  • Current and Planned purchase Intentions of client devices

  • Tablet OS & Application software adoption – Behind the Screen

  • BYOD: Employers vs. Employees, or Micros vs. Larger SMBs?

  • Across the OS generations: XP, Windows 8 refresh intentions

  • The Android Opportunity: Google in the PC Market

  • Converged Mobility PCs: 2-in-1 PCs

  • PC Purchase Channel and Sources of Information


More details about the report can be found here.

Related Research Articles

Seven Key Trends and their Meaning: SMB Endpoint Device Market in 2014

SMB Purchase Intentions for Android PCs

Key Attributes of Successful SMB Mobility Solutions
Anurag Agrawal

Is Apple about to lose the Tablet Market?

Today Huawei announced an Android based tablet with impressive specs. A little thicker but lighter than the iPad, the newly announced tablet beats the current iPad2 in sheer hardware specs. While Apple stubbornly continues it’s policy of controlling every aspect of device development and marketing, Google is allowing ODMs to accelerate the pace of device development and developing the software to keep pace with these developments. We have seen this before – with the PC market. While Apple kept pushing the envelope on PCs, they failed to take advantage of the growing demand for PCs. That void was ultimately filled by Microsoft who took on the role of a fast follower and successfully created the eco-system around DOS, Windows and Intel based PCs. As the tablet market grows globally, is Apple doomed to repeat the mistakes of the past?

To be fair the two situations while similar are not exactly the same. When the PC market took off, Apple did not have a dominant share like they do with the tablet market today. In other words, it wasn’t Apple’s market to lose like it is now. That said, the growth rate of the tablet market is far greater than the growth rate of the PC market so the risk of not
being able to satisfy that demand is very real. As market demand expands companies such as Samsung, LG, HTC and traditional PC makers will attempt to satisfy that demand with a flurry of products. As market demand expands, the one size fit all strategy currently followed by Apple will not be effective. While nobody expects Apple to sit still, Apple will need to accelerate product development and manufacturing but it is unlikely that any one company will be able to satisfy that demand. This opens the door for alternatives and especially for Microsoft who is well poised to take advantage of this growth starting with
the release of Windows 8 in 2012. This begs the question – will Apple be relegated to a minority status as the market grows around it?

Another difference between the PC market and the tablet market is the dominance Apple has in the apps space. But is that dominance overstated as the world moves to Cloud/web based applications? Sure there will be a lock-in effects for some types of applications – those that use specific hardware features but we expect the vast majority of applications to be platform neutral at least in terms of their consumption. The popular game Angry birds is a good case in point which started out as an iPad application but is now available to
users of the Chrome browser as a web app. If the vast majority of applications are in fact web apps then how will Apple (or for that matter Microsoft and Google) continue to gain leverage so that new consumers for tablets will choose the iPad over other alternatives. That leverage could come from new, better hardware and from expanding the product portfolio. Both of those things are happening outside the Apple universe right now.

Abhijeet Rane
Techaisle
Anurag Agrawal

Tablet PCs and Relative Views on PC Cannibalization

Recently we conducted a survey of small businesses to understand the adoption and cannibalization of traditional PC market by iPads and thereby Tablet PCs. Keeping aside the survey results for another time, a different blog and a report – our analysts came up with a lively discussion and two opposing views.

The debate started with the topic of Versatility: Multi role of PCs VS single role of Tablet PCs. However, Tablets are gaining docking stations and full keyboards and other aspects such as cameras will find their way in as a result of natural evolution of tablets.

For PC Cannibalization View

What will drive Tablets is the following:

  • Longer battery life

  • Shift to web based apps (no client download requirements)

  • Cost in terms of power consumption

  • Windows for Tablets

  • Decreasing cost of flash storage


What will hold Tablets back:

  • Manageability, tracking

  • Corporate level security


Cannibalization should be discussed and thought of within the context of time. It will be significant in about 3-5 years. What it won’t cannibalize is the smart phone market. The problem this is going to cause is what do we call a notebook and what do we call a tablet. Apple has already announced that their notebooks going forward will resemble the new Macbook Air which will have access to the newly announced Mac AppStore and have access to the same apps that are available for iOS. Windows on ARM also means that previously Tablet specific apps will be available on traditional notebook form factors.

What we are seeing now is true convergence with the devices providing different user experiences depending upon whether they are used in a mobile context or not. One area where I do not see tablets replacing PCs is in software development.

Counter View

If Tablet PCs are given a keyboard, they then start to function like a notebook. If we look ahead, Cisco Cius, Apple iPad, Samsung Galaxy Tab, Avaya are not your traditional PC vendors. But more and more vendors are entering the fray and there is no stopping here. The degree of PC cannibalization will be driven by the strengths and interests of the following:

  1. Suppliers: some processor manufacturer will be interested to have the Tablet market grow

  2. New Entrants: data networking, phone companies, operators for 3/4G traffic utilization

  3. Substitute: apps, cloud, input VS consumption

  4. Customers: consumers appeal, businesses security


Cannibalization to some degree will take place and perhaps the functional substitution area is one we need to look at to determine probable size – i.e. what current functions done by PCs can be substituted by tablet PCs?

Tavishi Agrawal
Techaisle

Trusted Research | Strategic Insight

Techaisle - TA