SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Mobile Devices in the Enterprise:
   What IT Needs to Know




            Ashish Jain
            Director, Product Management, VMware
            @itickr
About VMware
 Company Overview
   –   $3.77 billion in 2011 revenues
   –   >$4.5 billion in cash and equivalents
   –   ~12,000 employees worldwide
   –   5th largest infrastructure software
       company in the world
 Proven in the Trenches
   –   300,000+ VMware customers
   –   100% of Fortune 100
   –   100% of Fortune Global 100
   –   99% of Fortune 1000
   –   97% of Fortune Global 500
 Partner Network
   – 2,200+ Technology & Consulting Partners
   – 25,000 Channel Partners
   – 59,000 VMware Certified Professionals
The Shifting Landscape
                                             Work Style




                              Applications




                    Devices



Delivery Methods
The Shifting Landscape


Devices                 Applications
Smart Phone Stats
Smart Phone Stats
Transition to the Post-PC Era Has Already Begun

        Installed base of enterprise applications

                                        2011




                                                    Source: Gartner, 2011
Demo

-   Access PPT via Windows PC
-   Access native app/cloud storage via iPad
-   Access a Virtual desktop via iPad
-   Access via streaming over HTML 5
Today’s Work Device
Challenges
 Joint ownership: Who owns the device? Liability ?
 Privacy: Does IT gets to monitor all activity?
 Lost Device: What happens if lose the device? Or I
  sell?
 Job change: What happens when I leave the
  company? Can IT wipe everything?
 Data Leakage: I copy data locally? USB drive?
  Malicious apps?
 Cost: Does it cost more to support BYOD?
 …
IT Response
“If you access business resources from a device,
you give us the right to manage, lock and even
wipe that device, even if you end up losing
personal data and apps as a result”
< Waiting for slide from Mark Diodati >
Solutions

 Data Loss Prevention (DLP)

 Mobile Device Management (MDM)

 Mobile App Management (MAM)
Data Loss Prevention (DLP)

Text analysis, Metatagging, monitoring, blocking
via Gateway server, or native mobile app or
baking content management into apps
Mobile Device Management

On-device encryption, PIN enforcement, Remote
lock, Remote wipe, Support VPN, Restrict
Wireless, Disable Camera, Stop Email
forwarding, Prevent iCloud backup, Cert Auth …
Smart Phones Market Share
iOS




    src - http://blog.amadeusconsulting.com/wp-content/uploads/2012/05/audiobooksiosdistribution.png


Version       Release        %
              Date
iOS 3.x       June, 2009     1%

iOS 4.x       June 2010      15%

iOS 5.x       June 2011      83%
Android’s Fragmentation Issue

Version    Name          Release    %
                         Date

2.2        Froyo         May 2010   17.3%

2.3.x      Gingerbread   Dec 2010   64%

3.X        Honeycomb     Feb 2011   2.4%

4.X        Ice Cream     Oct 2011   10.9%
           Sandwitch
Mobile App Management (MAM)

Enterprise app store, distribution, app policies, app
blacklists, Wrapping , Secure Container, SDK, Licensing,
Billing, Internal app storage, Bulk purchase…
Security and Identity
SSO Flow (Browser only)

         IdP                      RP
     3



AD

               SAML
                      4   2
                              1
SSO Flow (with mobile app)

          IdP                      RP
     4



AD                                      AS, RS

                SAML
                       5   3       6
                                        OAuth
                                   2




                                   Mobile
                               1
                                    App
SSO Flow (challenges)

                                                                      RP
                   IdP                                           RP
        4



  AD                                                                       AS, RS

                                    SAML
                                                5   3            6
                                                                           OAuth
                                                                 2


 Authentication per Mobile App. No Authn State on Device
 No invalidation of access token during AD deprovisioning
 No clean up of offline/cached data on device                   Mobile
                                                             1
                                                                  App
SSO Flow (challenges)

            IdP                           RP
     4



AD                                             AS, RS

                       SAML
                              5   3       6

            ?                             2
                                               OAuth



         Native IdP
                                          Mobile
            AS                        1
                                           App
Thanks

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...CA API Management
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An AttackNordic APIs
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIkirgy
 
Using the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceUsing the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceHitesh Sahu
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android AapplicationsRoshan Thomas
 
Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019Anne Smith
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseCA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Nordic APIs
 
Android Cloud To Device Messaging
Android Cloud To Device MessagingAndroid Cloud To Device Messaging
Android Cloud To Device MessagingFernando Cejas
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptxAnkit Giri
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)Nordic APIs
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...CA API Management
 
Android app installation-dropbox
Android app installation-dropboxAndroid app installation-dropbox
Android app installation-dropboxMaxpromotion
 

Was ist angesagt? (20)

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
 
Using the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceUsing the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & Finance
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android Aapplications
 
Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019
 
MCSDataSheet
MCSDataSheetMCSDataSheet
MCSDataSheet
 
Mobile_app_security
Mobile_app_securityMobile_app_security
Mobile_app_security
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Android Cloud To Device Messaging
Android Cloud To Device MessagingAndroid Cloud To Device Messaging
Android Cloud To Device Messaging
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
 
Android app installation-dropbox
Android app installation-dropboxAndroid app installation-dropbox
Android app installation-dropbox
 

Ähnlich wie Mobile Devices in the Enterprise: What IT needs to know

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it finalHeinrich Seeger
 
Re Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and AppsRe Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and AppsWSO2
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...owaspindia
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
The Enterprise Goes Mobile
The Enterprise Goes MobileThe Enterprise Goes Mobile
The Enterprise Goes MobileConnected-Blog
 
Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCA API Management
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT ForumDeirdre Curran
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台Mike Chang
 
Ipad Application Development Casestudy
Ipad Application Development CasestudyIpad Application Development Casestudy
Ipad Application Development Casestudydheerajkureel
 
Mobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to releaseMobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to releaseintunity
 
Workshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsWorkshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsRABS
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Triangle Node Meetup : APIs in Minutes with Node.js
Triangle Node Meetup :  APIs in Minutes with Node.jsTriangle Node Meetup :  APIs in Minutes with Node.js
Triangle Node Meetup : APIs in Minutes with Node.jsShubhra Kar
 
SunSmart Global Profile
SunSmart Global ProfileSunSmart Global Profile
SunSmart Global ProfileSundar Rajan
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012nerb13
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 

Ähnlich wie Mobile Devices in the Enterprise: What IT needs to know (20)

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
 
Re Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and AppsRe Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and Apps
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
The Enterprise Goes Mobile
The Enterprise Goes MobileThe Enterprise Goes Mobile
The Enterprise Goes Mobile
 
Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San Francisco
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
 
Ipad Application Development Casestudy
Ipad Application Development CasestudyIpad Application Development Casestudy
Ipad Application Development Casestudy
 
Mobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to releaseMobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to release
 
Workshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsWorkshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile Applications
 
SAP Runs SAP Mobile
SAP Runs SAP MobileSAP Runs SAP Mobile
SAP Runs SAP Mobile
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
StefanoFiorini
StefanoFioriniStefanoFiorini
StefanoFiorini
 
Triangle Node Meetup : APIs in Minutes with Node.js
Triangle Node Meetup :  APIs in Minutes with Node.jsTriangle Node Meetup :  APIs in Minutes with Node.js
Triangle Node Meetup : APIs in Minutes with Node.js
 
SunSmart Global Profile
SunSmart Global ProfileSunSmart Global Profile
SunSmart Global Profile
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 

Mehr von Ashish Jain

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User ExperienceAshish Jain
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalAshish Jain
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Ashish Jain
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPalAshish Jain
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalAshish Jain
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityAshish Jain
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010Ashish Jain
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled waterAshish Jain
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security IssuesAshish Jain
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web ServicesAshish Jain
 

Mehr von Ashish Jain (13)

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User Experience
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPal
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPal
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPal
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal Identity
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010
 
Open Id Summit
Open Id SummitOpen Id Summit
Open Id Summit
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled water
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security Issues
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Concordia
ConcordiaConcordia
Concordia
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Mobile Devices in the Enterprise: What IT needs to know

  • 1. Mobile Devices in the Enterprise: What IT Needs to Know Ashish Jain Director, Product Management, VMware @itickr
  • 2. About VMware  Company Overview – $3.77 billion in 2011 revenues – >$4.5 billion in cash and equivalents – ~12,000 employees worldwide – 5th largest infrastructure software company in the world  Proven in the Trenches – 300,000+ VMware customers – 100% of Fortune 100 – 100% of Fortune Global 100 – 99% of Fortune 1000 – 97% of Fortune Global 500  Partner Network – 2,200+ Technology & Consulting Partners – 25,000 Channel Partners – 59,000 VMware Certified Professionals
  • 3. The Shifting Landscape Work Style Applications Devices Delivery Methods
  • 7. Transition to the Post-PC Era Has Already Begun Installed base of enterprise applications 2011 Source: Gartner, 2011
  • 8. Demo - Access PPT via Windows PC - Access native app/cloud storage via iPad - Access a Virtual desktop via iPad - Access via streaming over HTML 5
  • 10. Challenges  Joint ownership: Who owns the device? Liability ?  Privacy: Does IT gets to monitor all activity?  Lost Device: What happens if lose the device? Or I sell?  Job change: What happens when I leave the company? Can IT wipe everything?  Data Leakage: I copy data locally? USB drive? Malicious apps?  Cost: Does it cost more to support BYOD?  …
  • 11. IT Response “If you access business resources from a device, you give us the right to manage, lock and even wipe that device, even if you end up losing personal data and apps as a result”
  • 12. < Waiting for slide from Mark Diodati >
  • 13. Solutions  Data Loss Prevention (DLP)  Mobile Device Management (MDM)  Mobile App Management (MAM)
  • 14. Data Loss Prevention (DLP) Text analysis, Metatagging, monitoring, blocking via Gateway server, or native mobile app or baking content management into apps
  • 15. Mobile Device Management On-device encryption, PIN enforcement, Remote lock, Remote wipe, Support VPN, Restrict Wireless, Disable Camera, Stop Email forwarding, Prevent iCloud backup, Cert Auth …
  • 17. iOS src - http://blog.amadeusconsulting.com/wp-content/uploads/2012/05/audiobooksiosdistribution.png Version Release % Date iOS 3.x June, 2009 1% iOS 4.x June 2010 15% iOS 5.x June 2011 83%
  • 18. Android’s Fragmentation Issue Version Name Release % Date 2.2 Froyo May 2010 17.3% 2.3.x Gingerbread Dec 2010 64% 3.X Honeycomb Feb 2011 2.4% 4.X Ice Cream Oct 2011 10.9% Sandwitch
  • 19. Mobile App Management (MAM) Enterprise app store, distribution, app policies, app blacklists, Wrapping , Secure Container, SDK, Licensing, Billing, Internal app storage, Bulk purchase…
  • 21. SSO Flow (Browser only) IdP RP 3 AD SAML 4 2 1
  • 22. SSO Flow (with mobile app) IdP RP 4 AD AS, RS SAML 5 3 6 OAuth 2 Mobile 1 App
  • 23. SSO Flow (challenges) RP IdP RP 4 AD AS, RS SAML 5 3 6 OAuth 2  Authentication per Mobile App. No Authn State on Device  No invalidation of access token during AD deprovisioning  No clean up of offline/cached data on device Mobile 1 App
  • 24. SSO Flow (challenges) IdP RP 4 AD AS, RS SAML 5 3 6 ? 2 OAuth Native IdP Mobile AS 1 App

Hinweis der Redaktion

  1. We are uniquely qualified to support customers’ journey to the new era of IT, given our clear leadership in virtualization – the foundation for cloud computing architectures. Through innovation, and by challenging the status quo, VMware has become central to the IT transformation wave taking place in small to large global enterprises, fueling continual growth and investment in further product development.
  2. We are facing considerable change in this new era:New virtual and cloud sourced infrastructure modelsNew device form factors to support mobility, with enhanced user experiences born from consumer technologyLeading to a new class of mobile and SaaS applicationsSupporting more real-time, collaborative work styles
  3. We are facing considerable change in this new era:New virtual and cloud sourced infrastructure modelsNew device form factors to support mobility, with enhanced user experiences born from consumer technologyLeading to a new class of mobile and SaaS applicationsSupporting more real-time, collaborative work styles