Innovecture Innsight

Adoption of Mobile Apps in an Enterprise IT

Mobile Apps
With the mobile device processing and storage capabilities increasing at a rapid pace, many Enterprises today are considering mobile apps as a viable platform for interacting with its customer base. Still in pre-natal stage (Adoption of mobile apps in the Enterprise IT) this topic is being discussed in many forums and meetings. The Enterprise IT has grown around developing applications which store and transmit sensitive data, has confidential business logic/rules and needs to authenticate/authorize the access. This requires the application to store and transmit data securely, audit the user activity and analyze the customer information to improve business and technology capabilities.

On the other hand the new generation of users does not have the patience to go through multi factor security, wait for the server to respond and be restrained by the fixed UI/workflow. The conflict between the robustness, security aspects of the Enterprise IT and the need for having the control with the user is at the crux of this debate. The explosion in the social commerce, collaboration and the handheld devices is pushing the architects to think about the traditional ways of building an Enterprise IT. The critical barriers which need to be overcome by the Enterprise architect today to provide an effective foundation to the business for exposing the Enterprise IT to the mobile app worlds are:
  • Data: How can we provide the sensitive data in a rapid time to the mobile app? The thinking should go beyond exposing secure web services. Can the customer master data be provided to the customer so that it can be stored securely on the mobile device?
  • Business logic: Can the business logic be embedded in the mobile app? The answer is yes if the business logic is static. If the business logic is dynamic (rules, workflow based) then can the business logic be consumed via services?
  • Security: Can the same level (same as in Enterprise IT) of security be built in a mobile app? The control should be given to the user on the degree of security to be applied on the app. The same way the user can control the security today in a browser the user should be able to drive the security of an app. The transmission level security is where the vulnerability lies today and adopting message level security can overcome that barrier.
The points mentioned above are just some of the key considerations and there are a number of other factors we need to deal with while defining a strategy towards adopting mobile app as an asset in the Enterprise IT world. More to follow in the next insight on this topic.