SlideShare a Scribd company logo
1 of 21
 Tablets are hitting the enterprise in force
iPad: 35M in 2011 → 55M+ in 2012
Android: 20M in 2011 → 45M+ in 2012
Source: DroidMatters & Digitimes
 People bring them to work because they are…
Productivity-enhancing
Portable
Trendy
 Consumerization of IT
Unstoppable influx of personal
and unmanaged devices
IT must act…
The BYOD Revolution
BYOD Moves to the Forefront
Corporate Issued
• PCs
• Laptops
• Mobile phones
Personal
• Tablets (iPad, Android, etc.)
• Smart Phones (iPhone, Android, etc.)
• Laptops (Mac, etc.)
• Home PCs
What Do We Want From BYOD?
 Enable employees to use personal devices
to conduct business
 Enable IT to address mobility in a manner
that is secure and cost-effective
BYOD Challenges
Security
• Every user is a potential hole in the corporate network
• Each device can and will accumulate corporate data
• Increased risk of data leakage is inherent to BYOD
App Support
• Enabling mobile access for email is relatively easy
• Mobilizing select applications is feasible
• Supporting all applications remains a challenge
Device Support
• Each employee has a preferred platform and OS
• BYOD means tablets, smart phones, laptops and PCs
• Corporate use must not interfere with personal use
Time & Cost
• BYOD must scale to support all users and applications
• Common BYOD approaches are resource-intensive
Common Approaches to BYOD
 Native enterprise apps…
- or -
published apps and desktops?
BYOD
Native Enterprise Apps
 Apps purpose-built for mobile
devices and download by users
from an enterprise app store
 Devices and apps are managed
and secured using VPN, MDM and
other solutions
Published Apps & Desktops
 Traditional enterprise apps run in
a centralized and/or virtual
computing enviroment
 Apps and data remain safe in the
data center and are accessed over
the network from mobile devices
Native Enterprise Applications
Developing or purchasing native
apps is just the tip of the iceberg…
User Training
Productivity
Vs.
Security
App Servers
VPNs
Enterprise App
Stores
Mobile Device
Management
Security
Limitations of Native Enterprise Apps
Security
• Allows devices on the network and data on devices
• VPN just a secure pipe, MDM just a management tool
• Unable to secure data at the application level
App Support
• Requires the purchase or development of native apps
• Most enterprises run hundreds or thousands of apps
• Native apps enterprise-wide is an impractical approach
Device Support
• Not all apps available on all platforms
• Not all users choose the same platform
• Supporting permutations is resource intensive
Time & Cost
• Purchase or development of apps enterprise-wide
• Scaling server infrastructure, VPNs and MDM
• Deployment, management and support costs
Published Apps & Desktops
 Citrix supports personal mobile
devices including tablets, smart
phones, laptops and PCs
 Citrix supports most all apps
and prevents data leakage
However…
 Citrix is rarely supported
for every user and every
application…
And there’s a reason.
Limitations of Citrix Approach
Security
• Fundamentally sound approach
• Apps reside in the data center and accessed remotely
• Data does not leave the corporate network
App Support
• Delivers any application running in virtual environment
• Cost of scaling and virtualizing all apps is prohibitive
• Not ideal for applications running on physical desktops
Device Support
• Fundamentally sound approach
• Receiver supports mobile devices, laptops and PCs
Time & Cost
• Citrix/published apps rarely deployed enterprise-wide
• Centralized computing and virtualization is expensive
• Managing Citrix/published apps is more expensive
A Smarter, More Scalable Approach to BYOD
Virtual Desktops &
Terminal
Services
Physical
Desktops
Office
Securely
connect
to office
desktops
from any
device,
anywhere.
Desktop DeliveryRemote
Tablets
Smart Phones
PCs
Laptops
 Enterprise-class, appliance-based remote desktop for BYOD that’s
simple, scalable and secure
Office Desktop
Windows Desktop
Remote
Any Platform
(iPad, iPhone, Android, Windows, Mac)
DesktopDirect Demonstration
The DesktopDirect Advantage
Security
• Not a VPN – personal devices kept “off the network”
• Data never leaves the corporate network
• Extends security already established on office PCs
App Support
• All apps on office PCs available on personal devices
• Employees can work from anywhere as if in the office
• Eliminates need for duplicate app environments
Device Support
• Supports any mobile platform without IT intervention
• Does not interfere with function of personal devices
• Supports PCs and laptops in addition to mobile devices
Time & Cost
• Leverages existing infrastructure
• Less expensive than native apps VPN, MDM or Citrix
• Rapid ROI solution deployed in weeks and not months
BYOD Case Study: Needham Bank
 Customer-owned community bank
5 locations
Over $1B in assets
 48X increase in mobile devices since 2007
Needed to quickly and cost-effectively provide access to
range of bank applications from tablets without the
risk of data leakage
Selected DesktopDirect with advanced client package
 DesktopDirect impact on iPad access
11X unique users
120X total hours spent
10X time per user
No security issues, no additional IT staff required
BYOD Case Study: Buckingham Research Group
 Institutional research and brokerage firm
Founded in 1982, based in New York
 Why the need for BYOD?
Employees bringing personal iPads to the office and
wanted access to corporate applications
Field employees wanted to use iPads instead
of laptops
 DesktopDirect impact on BYOD strategy
No user learning curve, no new passwords
$30K HW install vs. $300K SW upgrade
3 week installation vs. 8 month project
One HA pair and one DR unit, that’s it!
BYOD Case Study: Central Ohio Primary Care
 Ohio’s largest physician-owned cooperative
Over 50 physician offices and
over 200 physicians
 Healthcare mobility requirements
BYOD strategy that provides physicians with
flexibility while also addressing IT requirements
for security, manageability and cost
 Benefits for physicians and IT
Renew prescriptions anytime, anywhere
and move seamlessly between exam
rooms using iPads
Reduces cost and complexity
while improving productivity
and compliance
Appliance-Based Remote Desktop Access
Scalable Appliance Options
SPX1800
Up to 100 Concurrent Users
SPX2800
Up to 1,200 Concurrent Users
SPX4800
Up to 6,000 Concurrent Users
SPX5800
Up to 12,000 Concurrent Users
 Security
128-bit/256-bit key exchange and 1024/2048-bit encryption
Integration with AD, LDAP and RADIUS and two-factor authentication including RSA
SecurID, Vasco, Swivel and SSL certificates
Redirection control, enable-disable clipboard and printing
Device-based identification, register and enable-disable devices per user
 Array Registration Technology (ART)
Physical or virtual desktops may be registered by the administrator manually or via a
database or by end-users for scalability and simplified deployment
 Power Management
Wake-on-LAN (WoL) technology allows users to remotely power up desktops
 Mobile-Device Gesture Suite
Comprehensive suite of iOS and Android gesture controls for manipulating Windows
applications within mobile environments
Advanced BYOD Feature Set
DesktopDirect BYOD Summary
Security
• Personal devices kept “off the network”
• Data never leaves the corporate network
• Extends security already established on office PCs
App Support
• All apps on office PCs available on personal devices
• Employees can work from anywhere as if in the office
• Eliminates need for duplicate app environments
Device Support
• Supports any mobile platform without IT intervention
• Does not interfere with function of personal devices
• Supports PCs and laptops in addition to mobile devices
Time & Cost
• Leverages existing infrastructure
• Less expensive than native apps VPN, MDM or Citrix
• Rapid ROI solution deployed in weeks and not months
 Bring Your Own Device - DesktopDirect by Array Networks

More Related Content

What's hot

Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Dell World
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Wp byod
Wp byodWp byod
Wp byodJ
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 

What's hot (20)

Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Wp byod
Wp byodWp byod
Wp byod
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User Computing
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 

Viewers also liked

PID test - Quality Assurance to PV Modules
PID test - Quality Assurance to PV ModulesPID test - Quality Assurance to PV Modules
PID test - Quality Assurance to PV ModulesHugo Silva
 
Clustering in continuïteit en contrast
Clustering in continuïteit en contrastClustering in continuïteit en contrast
Clustering in continuïteit en contrastStevens Van Dijck
 
Channalging Cases in AHF Hypoperfusion
Channalging Cases in AHF HypoperfusionChannalging Cases in AHF Hypoperfusion
Channalging Cases in AHF Hypoperfusiondrucsamal
 
Introduction to management
Introduction to managementIntroduction to management
Introduction to managementBahar Hussain
 
Company Profile Finint
Company Profile FinintCompany Profile Finint
Company Profile FinintEleonora Riva
 
Ruimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
Ruimte bieden voor beweging - aardbevingsveilig bouwen in GroningenRuimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
Ruimte bieden voor beweging - aardbevingsveilig bouwen in GroningenStevens Van Dijck
 
Props, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography PlansProps, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography Plansbrookepatrick
 
Pulmonary congestion
Pulmonary congestionPulmonary congestion
Pulmonary congestiondrucsamal
 

Viewers also liked (9)

PID test - Quality Assurance to PV Modules
PID test - Quality Assurance to PV ModulesPID test - Quality Assurance to PV Modules
PID test - Quality Assurance to PV Modules
 
Clustering in continuïteit en contrast
Clustering in continuïteit en contrastClustering in continuïteit en contrast
Clustering in continuïteit en contrast
 
Channalging Cases in AHF Hypoperfusion
Channalging Cases in AHF HypoperfusionChannalging Cases in AHF Hypoperfusion
Channalging Cases in AHF Hypoperfusion
 
أحاديث قدسية
أحاديث قدسيةأحاديث قدسية
أحاديث قدسية
 
Introduction to management
Introduction to managementIntroduction to management
Introduction to management
 
Company Profile Finint
Company Profile FinintCompany Profile Finint
Company Profile Finint
 
Ruimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
Ruimte bieden voor beweging - aardbevingsveilig bouwen in GroningenRuimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
Ruimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
 
Props, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography PlansProps, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography Plans
 
Pulmonary congestion
Pulmonary congestionPulmonary congestion
Pulmonary congestion
 

Similar to Bring Your Own Device - DesktopDirect by Array Networks

Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentationsolarisyourep
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsPete Valentine
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftUni Systems S.M.S.A.
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Uni Systems S.M.S.A.
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Parallels Inc
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeJonathan Wade
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforceDell World
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Dell World
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagMicrosoft
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business caseTripleValue
 

Similar to Bring Your Own Device - DesktopDirect by Array Networks (20)

Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddag
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
 

Recently uploaded

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Recently uploaded (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Bring Your Own Device - DesktopDirect by Array Networks

  • 1.
  • 2.  Tablets are hitting the enterprise in force iPad: 35M in 2011 → 55M+ in 2012 Android: 20M in 2011 → 45M+ in 2012 Source: DroidMatters & Digitimes  People bring them to work because they are… Productivity-enhancing Portable Trendy  Consumerization of IT Unstoppable influx of personal and unmanaged devices IT must act… The BYOD Revolution
  • 3. BYOD Moves to the Forefront Corporate Issued • PCs • Laptops • Mobile phones Personal • Tablets (iPad, Android, etc.) • Smart Phones (iPhone, Android, etc.) • Laptops (Mac, etc.) • Home PCs
  • 4. What Do We Want From BYOD?  Enable employees to use personal devices to conduct business  Enable IT to address mobility in a manner that is secure and cost-effective
  • 5. BYOD Challenges Security • Every user is a potential hole in the corporate network • Each device can and will accumulate corporate data • Increased risk of data leakage is inherent to BYOD App Support • Enabling mobile access for email is relatively easy • Mobilizing select applications is feasible • Supporting all applications remains a challenge Device Support • Each employee has a preferred platform and OS • BYOD means tablets, smart phones, laptops and PCs • Corporate use must not interfere with personal use Time & Cost • BYOD must scale to support all users and applications • Common BYOD approaches are resource-intensive
  • 6. Common Approaches to BYOD  Native enterprise apps… - or - published apps and desktops? BYOD Native Enterprise Apps  Apps purpose-built for mobile devices and download by users from an enterprise app store  Devices and apps are managed and secured using VPN, MDM and other solutions Published Apps & Desktops  Traditional enterprise apps run in a centralized and/or virtual computing enviroment  Apps and data remain safe in the data center and are accessed over the network from mobile devices
  • 7. Native Enterprise Applications Developing or purchasing native apps is just the tip of the iceberg… User Training Productivity Vs. Security App Servers VPNs Enterprise App Stores Mobile Device Management Security
  • 8. Limitations of Native Enterprise Apps Security • Allows devices on the network and data on devices • VPN just a secure pipe, MDM just a management tool • Unable to secure data at the application level App Support • Requires the purchase or development of native apps • Most enterprises run hundreds or thousands of apps • Native apps enterprise-wide is an impractical approach Device Support • Not all apps available on all platforms • Not all users choose the same platform • Supporting permutations is resource intensive Time & Cost • Purchase or development of apps enterprise-wide • Scaling server infrastructure, VPNs and MDM • Deployment, management and support costs
  • 9. Published Apps & Desktops  Citrix supports personal mobile devices including tablets, smart phones, laptops and PCs  Citrix supports most all apps and prevents data leakage However…  Citrix is rarely supported for every user and every application… And there’s a reason.
  • 10. Limitations of Citrix Approach Security • Fundamentally sound approach • Apps reside in the data center and accessed remotely • Data does not leave the corporate network App Support • Delivers any application running in virtual environment • Cost of scaling and virtualizing all apps is prohibitive • Not ideal for applications running on physical desktops Device Support • Fundamentally sound approach • Receiver supports mobile devices, laptops and PCs Time & Cost • Citrix/published apps rarely deployed enterprise-wide • Centralized computing and virtualization is expensive • Managing Citrix/published apps is more expensive
  • 11. A Smarter, More Scalable Approach to BYOD Virtual Desktops & Terminal Services Physical Desktops Office Securely connect to office desktops from any device, anywhere. Desktop DeliveryRemote Tablets Smart Phones PCs Laptops
  • 12.  Enterprise-class, appliance-based remote desktop for BYOD that’s simple, scalable and secure Office Desktop Windows Desktop Remote Any Platform (iPad, iPhone, Android, Windows, Mac) DesktopDirect Demonstration
  • 13. The DesktopDirect Advantage Security • Not a VPN – personal devices kept “off the network” • Data never leaves the corporate network • Extends security already established on office PCs App Support • All apps on office PCs available on personal devices • Employees can work from anywhere as if in the office • Eliminates need for duplicate app environments Device Support • Supports any mobile platform without IT intervention • Does not interfere with function of personal devices • Supports PCs and laptops in addition to mobile devices Time & Cost • Leverages existing infrastructure • Less expensive than native apps VPN, MDM or Citrix • Rapid ROI solution deployed in weeks and not months
  • 14. BYOD Case Study: Needham Bank  Customer-owned community bank 5 locations Over $1B in assets  48X increase in mobile devices since 2007 Needed to quickly and cost-effectively provide access to range of bank applications from tablets without the risk of data leakage Selected DesktopDirect with advanced client package  DesktopDirect impact on iPad access 11X unique users 120X total hours spent 10X time per user No security issues, no additional IT staff required
  • 15. BYOD Case Study: Buckingham Research Group  Institutional research and brokerage firm Founded in 1982, based in New York  Why the need for BYOD? Employees bringing personal iPads to the office and wanted access to corporate applications Field employees wanted to use iPads instead of laptops  DesktopDirect impact on BYOD strategy No user learning curve, no new passwords $30K HW install vs. $300K SW upgrade 3 week installation vs. 8 month project One HA pair and one DR unit, that’s it!
  • 16. BYOD Case Study: Central Ohio Primary Care  Ohio’s largest physician-owned cooperative Over 50 physician offices and over 200 physicians  Healthcare mobility requirements BYOD strategy that provides physicians with flexibility while also addressing IT requirements for security, manageability and cost  Benefits for physicians and IT Renew prescriptions anytime, anywhere and move seamlessly between exam rooms using iPads Reduces cost and complexity while improving productivity and compliance
  • 18. Scalable Appliance Options SPX1800 Up to 100 Concurrent Users SPX2800 Up to 1,200 Concurrent Users SPX4800 Up to 6,000 Concurrent Users SPX5800 Up to 12,000 Concurrent Users
  • 19.  Security 128-bit/256-bit key exchange and 1024/2048-bit encryption Integration with AD, LDAP and RADIUS and two-factor authentication including RSA SecurID, Vasco, Swivel and SSL certificates Redirection control, enable-disable clipboard and printing Device-based identification, register and enable-disable devices per user  Array Registration Technology (ART) Physical or virtual desktops may be registered by the administrator manually or via a database or by end-users for scalability and simplified deployment  Power Management Wake-on-LAN (WoL) technology allows users to remotely power up desktops  Mobile-Device Gesture Suite Comprehensive suite of iOS and Android gesture controls for manipulating Windows applications within mobile environments Advanced BYOD Feature Set
  • 20. DesktopDirect BYOD Summary Security • Personal devices kept “off the network” • Data never leaves the corporate network • Extends security already established on office PCs App Support • All apps on office PCs available on personal devices • Employees can work from anywhere as if in the office • Eliminates need for duplicate app environments Device Support • Supports any mobile platform without IT intervention • Does not interfere with function of personal devices • Supports PCs and laptops in addition to mobile devices Time & Cost • Leverages existing infrastructure • Less expensive than native apps VPN, MDM or Citrix • Rapid ROI solution deployed in weeks and not months