SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
{{softshake}}
October 2013

Enterprise
Mobility

Frédéric Mauger - CTO - Head of R&D
Géraud de Laval - Senior UX Developer
ENTERPRISE	
  MOBILITY	
  BENEFITS	
  
Why?
ENTERPRISE	
  MOBILITY	
  STRATEGIES	
  
How?

COPE

Not	
  allowed

BYOD
Enterprise	
  
device
ENTERPRISE	
  MOBILITY	
  STRATEGIES	
  
Todays	
  organiza2on’s	
  policy

BYOD & Mobile Security survey 2013 http://www.slideshare.net/informationsecurity/byod-and-mobile-security-report-2013-19033467
ENTERPRISE	
  MOBILITY	
  CHALLENGES	
  
Issues?

Employee	

privacy
User	

Experience
Control
Security
Distribution
Technologies
MOBILE	
  TECHNOLOGIES:	
  FRAMEWORK

Employee
privacy
User experience

E
U
R
T M
A H
R IT
LT R
U O
G
L
A

Technologies no solutions
Multi-platform
No price!

Control

Security

Distribution

Status of summer 2013
VPN	
  +	
  IPSEC

- Secure communications
- Already available in enterprise
- Transparent for the user with
all apps

Employee
privacy
User experience

- Device based
- Only communication

Control
Security
Distribution
REMOTE	
  DESKTOP
- Application based
- Highly secure
only encrypted communication
no storage on “disk”

Employee
privacy
User experience

- Really poor UX
latency
IO differs from desktop
no offline mode

Control
Security
Distribution
VIRTUALIZATION

- Full work environment
- Security at OS level

Employee
privacy
User experience
Control

- Performance issue due to 2
running OS
Security
- Only Android and BlackBerry
Distribution
- Enterprise has to provide devices
MOBILE	
  APPLICATION	
  MANAGEMENT:	
  MAM

- App-based
- Everything around app lifecycle:
download, update, ...

Employee
privacy
User experience

- No security, only remote
app blocking

Control
Security
Distribution
MOBILE	
  DEVICE	
  MANAGEMENT:	
  MDM

- All management needs:
wifi passwords, passcode, ...

Employee
privacy
User experience

- Device based
- Intrusive: remote wipe

Control
Security
Distribution
WRAPPING

- App based
- Add security on “all apps”
- Data segregation

- Limited features
- Doesn’t work with the OS
factory’s apps
(you need the binary)

Employee
privacy
User experience
Control
Security
Distribution
SANDBOX

- New apps for Business needs
- Security at application level
- Data segregation

Employee
privacy
User experience

- Only a limited set of apps
- Multi-platform support

Control
Security
Distribution
SANDBOX	
  +	
  SDK

- New apps for Business needs
- Security at application level
Employee
- Data segregation
privacy
+ third party apps
User experience
+ specific app security
- Only a limited set of apps
- Multi-platform support

Control
Security
Distribution
INSIDE	
  SENSE

{
Sandbox

SDK

MAM
HOW	
  IT	
  WORKS	
  
Architecture	
  overview

SENSE	
  
MOBILE
SysmosoR	
  	
  
Apps
Company	
  
Apps
Third	
  Party	
  
Apps

IdenMty	
  Server

SENSE	
  

Email	
  Server

Messaging

GATEWAY
Documents
Web	
  resources

Specific	
  Server
Company	
  Network
THANK YOU
FOR YOUR
ATTENTION

Weitere ähnliche Inhalte

Andere mochten auch

Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...
Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...
Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...Dinalog Amsterdam
 
De uitdagingen van nieuwe arbeidsrelaties
De uitdagingen van nieuwe arbeidsrelatiesDe uitdagingen van nieuwe arbeidsrelaties
De uitdagingen van nieuwe arbeidsrelatiesoverhetnieuwewerken
 
Het succes van de Heemsteedse Manier van Werken
Het succes van de Heemsteedse Manier van WerkenHet succes van de Heemsteedse Manier van Werken
Het succes van de Heemsteedse Manier van Werkenoverhetnieuwewerken
 
Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014
Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014
Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014Anna Dahlström
 
Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014
Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014
Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014Anna Dahlström
 
Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016
Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016
Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016Anna Dahlström
 
Penn potomac independent audit - karen lin
Penn potomac independent audit - karen linPenn potomac independent audit - karen lin
Penn potomac independent audit - karen linKaren T. Lin
 
Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016
Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016
Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016Anna Dahlström
 
Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015
Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015
Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015Anna Dahlström
 
Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016
Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016
Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016Anna Dahlström
 
Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014
Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014
Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014Anna Dahlström
 
The Exciting History Of Type
The Exciting History Of TypeThe Exciting History Of Type
The Exciting History Of TypeNiko Nyman
 
Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016
Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016
Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016Anna Dahlström
 
Designing Big Data Interactions Using the Language of Discovery
Designing Big Data Interactions Using the Language of DiscoveryDesigning Big Data Interactions Using the Language of Discovery
Designing Big Data Interactions Using the Language of DiscoveryJoe Lamantia
 
Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...
Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...
Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...Mad*Pow
 
Search and Filter Interface Round Up - Userability Marathon 2009 - Amy Cueva
Search and Filter Interface Round Up - Userability Marathon 2009 - Amy CuevaSearch and Filter Interface Round Up - Userability Marathon 2009 - Amy Cueva
Search and Filter Interface Round Up - Userability Marathon 2009 - Amy CuevaMad*Pow
 

Andere mochten auch (20)

Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...
Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...
Presentatie Platform Bedrijventerreinen en Kantoren Metropoolregio Amsterdam ...
 
De uitdagingen van nieuwe arbeidsrelaties
De uitdagingen van nieuwe arbeidsrelatiesDe uitdagingen van nieuwe arbeidsrelaties
De uitdagingen van nieuwe arbeidsrelaties
 
HNW en medezeggenschap
HNW en medezeggenschapHNW en medezeggenschap
HNW en medezeggenschap
 
Het succes van de Heemsteedse Manier van Werken
Het succes van de Heemsteedse Manier van WerkenHet succes van de Heemsteedse Manier van Werken
Het succes van de Heemsteedse Manier van Werken
 
Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014
Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014
Responsivt - Inte bara för mobilen + Webbdagarna Växjö, 04 Dec 2014
 
Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014
Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014
Beyond the hamburger menu - Digital Doughnut, London 25 Nov 2014
 
Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016
Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016
Storytelling In Design - Conversion Hotel, Texel NL, 20 Nov 2016
 
Penn potomac independent audit - karen lin
Penn potomac independent audit - karen linPenn potomac independent audit - karen lin
Penn potomac independent audit - karen lin
 
Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016
Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016
Storytelling For Multi-device Design - Bulgaria Web Summit, 20 Feb 2016
 
Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015
Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015
Storytelling In A Multi Device Landscape - Amuse, Budapest 30 Oct 2015
 
Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016
Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016
Storytelling In Design - Funkas Tillgänglighetsdagar, 12 Apr 2016
 
From Idea to product
From Idea to productFrom Idea to product
From Idea to product
 
Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014
Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014
Designing Better UX Deliverables - Cambridge Usability Group, 12 May 2014
 
Feiten over Het Nieuwe Werken
Feiten over Het Nieuwe WerkenFeiten over Het Nieuwe Werken
Feiten over Het Nieuwe Werken
 
The Exciting History Of Type
The Exciting History Of TypeThe Exciting History Of Type
The Exciting History Of Type
 
Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016
Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016
Bulding Device Agnostic UX Systems - Generate London, 23 Sep 2016
 
User Experience/User Interaction
User Experience/User InteractionUser Experience/User Interaction
User Experience/User Interaction
 
Designing Big Data Interactions Using the Language of Discovery
Designing Big Data Interactions Using the Language of DiscoveryDesigning Big Data Interactions Using the Language of Discovery
Designing Big Data Interactions Using the Language of Discovery
 
Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...
Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...
Using Games and Narative in Behavior Change Design - HXR 2016 - Samantha Demp...
 
Search and Filter Interface Round Up - Userability Marathon 2009 - Amy Cueva
Search and Filter Interface Round Up - Userability Marathon 2009 - Amy CuevaSearch and Filter Interface Round Up - Userability Marathon 2009 - Amy Cueva
Search and Filter Interface Round Up - Userability Marathon 2009 - Amy Cueva
 

Ähnlich wie Enterprise mobility

Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
Orange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Services
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleMicrosoft
 
_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptxSeclore
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
Mobility solutions with shore tel v1
Mobility solutions with shore tel v1Mobility solutions with shore tel v1
Mobility solutions with shore tel v1Wiecher Akkerman
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.Appear
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessisitnewsafrica
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityBitglass
 

Ähnlich wie Enterprise mobility (20)

Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
Orange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Live 2013 Security Breakout
Orange Business Live 2013 Security Breakout
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alle
 
_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Mobility solutions with shore tel v1
Mobility solutions with shore tel v1Mobility solutions with shore tel v1
Mobility solutions with shore tel v1
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
Mobile (in)security ?
Mobile (in)security ?Mobile (in)security ?
Mobile (in)security ?
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Enterprise mobility

  • 1. {{softshake}} October 2013 Enterprise Mobility Frédéric Mauger - CTO - Head of R&D Géraud de Laval - Senior UX Developer
  • 3. ENTERPRISE  MOBILITY  STRATEGIES   How? COPE Not  allowed BYOD Enterprise   device
  • 4. ENTERPRISE  MOBILITY  STRATEGIES   Todays  organiza2on’s  policy BYOD & Mobile Security survey 2013 http://www.slideshare.net/informationsecurity/byod-and-mobile-security-report-2013-19033467
  • 5. ENTERPRISE  MOBILITY  CHALLENGES   Issues? Employee privacy User Experience Control Security Distribution
  • 7. MOBILE  TECHNOLOGIES:  FRAMEWORK Employee privacy User experience E U R T M A H R IT LT R U O G L A Technologies no solutions Multi-platform No price! Control Security Distribution Status of summer 2013
  • 8. VPN  +  IPSEC - Secure communications - Already available in enterprise - Transparent for the user with all apps Employee privacy User experience - Device based - Only communication Control Security Distribution
  • 9. REMOTE  DESKTOP - Application based - Highly secure only encrypted communication no storage on “disk” Employee privacy User experience - Really poor UX latency IO differs from desktop no offline mode Control Security Distribution
  • 10. VIRTUALIZATION - Full work environment - Security at OS level Employee privacy User experience Control - Performance issue due to 2 running OS Security - Only Android and BlackBerry Distribution - Enterprise has to provide devices
  • 11. MOBILE  APPLICATION  MANAGEMENT:  MAM - App-based - Everything around app lifecycle: download, update, ... Employee privacy User experience - No security, only remote app blocking Control Security Distribution
  • 12. MOBILE  DEVICE  MANAGEMENT:  MDM - All management needs: wifi passwords, passcode, ... Employee privacy User experience - Device based - Intrusive: remote wipe Control Security Distribution
  • 13. WRAPPING - App based - Add security on “all apps” - Data segregation - Limited features - Doesn’t work with the OS factory’s apps (you need the binary) Employee privacy User experience Control Security Distribution
  • 14. SANDBOX - New apps for Business needs - Security at application level - Data segregation Employee privacy User experience - Only a limited set of apps - Multi-platform support Control Security Distribution
  • 15. SANDBOX  +  SDK - New apps for Business needs - Security at application level Employee - Data segregation privacy + third party apps User experience + specific app security - Only a limited set of apps - Multi-platform support Control Security Distribution
  • 16.
  • 17.
  • 19. HOW  IT  WORKS   Architecture  overview SENSE   MOBILE SysmosoR     Apps Company   Apps Third  Party   Apps IdenMty  Server SENSE   Email  Server Messaging GATEWAY Documents Web  resources Specific  Server Company  Network