First, we develop a thorough understanding of your organization’s goals with mobile and review any previous or existing mobile-related initiatives. We document mobile use cases from key stakeholders before focusing our analysis on the relevant actors, data and mobility requirements, high-level functionality and security standards.
2. Assessment, Risk Analysis, and Standards
This step assesses your current IT maturity and identifies areas needing improvement. We conduct a comprehensive risk analysis of all proposed mobile use cases and review existing policies and procedures in support of the mobile infrastructure.
Maturity Assessment: Leveraging the Mobile Maturity Framework (Mobile Ranking and Mobile Report Card), this assessment provides a maturity ranking and identifies those areas requiring special attention.
Risk Analysis: For each use case brought forward by the business, we develop an understanding for the associated corporate data assets and the potential impact of a security compromise. Then we categorize the potential risks relevant to each use-case on a security scale ranging from “Untrusted” to “Restricted.” Based on this profile, we devise custom strategies to mitigate risk moving forward.
Mobile Standards: Mobile adoption policies, procedures, vendors and standards vary for each organization. Knowing the pros and cons of each approach can be overwhelming. To help you along, we lay out your best options every step of the way.
3. Roadmap and Next Steps
This phase begins to address specifics of the re-envisioned UI/UX through interaction diagrams and high-level screen flows. As user scenarios and personas emerge and the functionality for use-cases becomes clear, our storyboard producers assemble wireframes and design mockup screens.