Systems software firm CA Technologies today announced a cloud-based mobile management service, promising a "mobility fabric" its rivals in the space "cannot provide".
Revealed today by CA's general manager for new business innovation, Ram Varadarajan, the cloud service is pitched to customers across three aspects: a "comprehensive suit of modular products" to manage BYOD for device, applications, content and email, representing the mobile management core, but with a devops feature "containarized" across a device to "preserve the quality of the mobile user experience".
CA also says the service is fully ready for machine-to-machine management in the internet of things.
In a crowded space, Varadarajan explained how the company is "leveraging what's available in CA's arsenal".
"No amount of investment can help any company build everthing fast enough. It takes a long time to get to market in security, testing and performance management," said Varadarajan.
"But here's something else special that's going on: if you look at enterprise mobility management - the most common way people are approaching solutions is to create walled gardens. So the common defense is to put all corporate stuff on the phone in separate conditions, and all personal stuff separately, too. The problem with that is it runs afoul of user experience."
"Containerisation," he explained, will preserve user experience by protecting the device per-app.
Varadarajan also spoke of the service's "unique value proposition", which is that various existing customers may want to pick and choose aspects of the product which suit their interest and investment in existing parts of CA's existing offerings.
"For example, they might be interested only in the content management part," he said.
"The ease of use and the dev ops is what sets us apart from the competition; the competition does not have the dev ops strategy that we have, so they cannot provide the mobility fabric that we can provide in the enterprise."
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)