SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Enterprise Mobile Apps: Beauty & The Beast
BYOD, Enterprise Integration, and Beautiful Mobile Apps
Chris O’Connor, CEO & Co-founder, Taptera
Matt McLarty, VP Client Solutions, Layer 7 Technologies
Housekeeping

 Questions
 - Chat any questions you have and we’ll answer them at the end of this call


                                                                   facebook.com/layer7
 Twitter
 - Today’s event hashtag:
   - #L7webinar                                                    layer7.com/linkedin

                                                                   layer7.com/blogs
 - Follow us on Twitter:
   - @Layer7
   - @Taptera
   - @MattMcLartyBC
   - @NowHearChris
“Beauty”…


Visually appealing
Highly functional
Uncluttered
Intuitive
Smooth
Personal
Beauty – The Mobile Enterprise
 Worldwide mobile trends ...
  - “By 2015, more U.S. Internet users will access the Internet through mobile devices than
    through PCs or other wireline devices.”
  - “By 2015, the world's mobile worker population will reach 1.3 billion, representing
    37.2% of the total workforce.”

 Trends driving the growth of Mobile in Enterprise IT ...
                                                                        Source: IDC (September 2011, January 2012)




  - Consumerization, BYOD
  - Verticalization
  - New devices & device categories
  - Cloud-based mobile applications
  - Emerging M2M technologies
               “Mobility is poised to become the next major IT paradigm.
    This gravitational shift will bring an array of opportunities and challenges to the
                     chief information officers in most enterprises.”
                                                                                      Source: McKinsey (June 2012)
Why “Beautiful” Apps Matter


 - Mobile devices have become personal extensions
 Better Productivity

 - BYOD enables work on one’s favourite “toy”
 - An appealing, usable, functional app further incents usage




     Personal mobile devices—tablets, smartphones—are ubiquitous
 Greater Accessibility

     New form factor brings new capabilities—geo-location, presence, photo
 -

     Truly “always-on”
 -

     Speed and consumability compel usage
 -
 -
“The Beast”…
“The Beast” – The Challenges of Mobile


   - Identity management
 Security


   - Application and data lifecycle (access → transport → storage → removal)

 Deployment complexity
   - New mobile apps
   - Integration with existing applications and systems



   - Platform fragmentation
 Technology


   - Pace of change



   - Privacy issues
 Governance
The Shedding of Tiers
                Web Application

     Presentation

     Business Logic

      Data Access

                    Relational
                    Database
The Shedding of Tiers
                Mobile Devices

     Presentation

     Business Logic

      Data Access

                    Big Data
The Shedding of Tiers
                Mobile Devices

     Presentation

     Business Logic
      Data Access

                    Big Data
The Shedding of Tiers
                 Mobile Devices

      Presentation


Business and Data Services
       Data Access

                     Big Data
The Shedding of Tiers
          Presentation
                         Mobile Devices




Business and Data Services


                           Big Data
APIs: The New Perimeter
 BYOD       Presentation
                           Mobile Devices



             API

  Business and Data Services


                             Big Data
APIs: The New Perimeter
 BYOD       Presentation
                           Mobile Devices



             API

  Business and Data Services


                             Big Data
Beauty…
Beautiful Apps Are




                     INTUITIVE
Beautiful Apps Are




                     focused
Taptera Collateral Demo
Taptera Rooms Demo
Resulting In
Taming the Beast
Layer 7 Mobile Access Gateway
 A lightweight, low-latency mobile gateway for solving critical mobile challenges in the
  following areas:
Identity: Extending Enterprise Identity to Mobile
 Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens
 Create granular access policies at user, app and device levels
 Build composite access policies combining geolocation, message content and other
  network attributes
 Simplify PKI-based certificate delivery and provisioning




                                         +
Identity: Extending Enterprise Identity to Mobile
 Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens
 Create granular access policies at user, app and device levels
 Build composite access policies combining geolocation, message content and other
  network attributes
 Simplify PKI-based certificate delivery and provisioning


                              Firewall
                                                           Mobile Devices & Apps




                                                 +
       Protected
       Resource
                                         Authorization &
                                         Resource Server
            Identity Access
             Management
Security: Mobile Application Firewalling
 Protect REST, SOAP and OData APIs against DoS and API attacks
 Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging
 Enforce FIPS 140-2 grade data privacy and integrity
 Validate data exchanges, including all JSON, XML, header and parameter content
Security: Mobile Application Firewalling
 Protect REST, SOAP and OData APIs against DoS and API attacks
 Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging
 Enforce FIPS 140-2 grade data privacy and integrity
 Validate data exchanges, including all JSON, XML, header and parameter content



                           Firewall                 Mobile Devices & Apps




                                                                            Hacker


                                                         Protect against
                                                        attacks: DOS, SQL
                                                        Injection, XSS, …
            Enterprise
            Resources
Adaptation: Translate & Orchestrate Data & APIs
 Surface any legacy application or database as RESTful APIs
 Quickly map between data formats such as XML and JSON
 Recompose & virtualize APIs to specific mobile identities, apps and devices
 Orchestrate API mashups with configurable workflow
Adaptation: Translate & Orchestrate Data & APIs
 Surface any legacy application or database as RESTful APIs
 Quickly map between data formats such as XML and JSON
 Recompose & virtualize APIs to specific mobile identities, apps and devices
 Orchestrate API mashups with configurable workflow

                                   Firewall


                                                         Mobile Devices & Apps




           Legacy Enterprise
        Applications & Databases
Optimization: Handle Scale
 Cache calls to backend applications
 Recompose small backend calls into efficiently aggregated mobile requests
 Compress traffic to minimize bandwidth costs and improve user experience
 Pre-fetch content for hypermedia-based API calls
Optimization: Handle Scale
 Cache calls to backend applications
 Recompose small backend calls into efficiently aggregated mobile requests
 Compress traffic to minimize bandwidth costs and improve user experience
 Pre-fetch content for hypermedia-based API calls

                                 Firewall


                                                         Mobile Devices & Apps




              Enterprise
             Applications
Integration: Centralize Cloud Connectivity
 Proxy and manage app interactions with social networks
 Broker call-outs to cloud services like Salesforce.com
 Bridge connectivity to iPhone, Windows and Android notification services
 Integrate with legacy applications using ESB capabilities
Integration: Centralize Cloud Connectivity
 Proxy and manage app interactions with social networks
 Broker call-outs to cloud services like Salesforce.com
 Bridge connectivity to iPhone, Windows and Android notification services
 Integrate with legacy applications using ESB capabilities

                                   Firewall
                                                                Cloud Services
                                                               & Social Networks




              On-Premise
         Enterprise Applications               End User
Summary
 BYOD and Mobility are sweeping Enterprise IT
 Beautiful Apps will lead to greater productivity
 Taptera’s enterprise apps are fast, beautiful and secure

 Simplifying mobile access to the enterprise helps to keep apps beautiful
 The Layer 7 Mobile Access Gateway solves key needs:
 - Identity
 - Security
 - Adaptation
 - Optimization
 - Integration
Q&A




      Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Offline Data Access in Enterprise Mobility
Offline Data Access in Enterprise MobilityOffline Data Access in Enterprise Mobility
Offline Data Access in Enterprise MobilityFolio3 Software
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions LLC
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Optimizing mobile apps and websites
Optimizing mobile apps and websitesOptimizing mobile apps and websites
Optimizing mobile apps and websitesVik Chaudhary
 
Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOWSO2
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedNuno Alves
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...CA API Management
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMike Brannon
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsCA API Management
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
IBM Worklight - Introduction
IBM Worklight - IntroductionIBM Worklight - Introduction
IBM Worklight - IntroductionMaarga Systems
 
Enterprise Application Distribution Technical White Paper[1]
Enterprise Application Distribution   Technical White Paper[1]Enterprise Application Distribution   Technical White Paper[1]
Enterprise Application Distribution Technical White Paper[1]genasun
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application ArchitectureUC San Diego
 

Was ist angesagt? (20)

Offline Data Access in Enterprise Mobility
Offline Data Access in Enterprise MobilityOffline Data Access in Enterprise Mobility
Offline Data Access in Enterprise Mobility
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Optimizing mobile apps and websites
Optimizing mobile apps and websitesOptimizing mobile apps and websites
Optimizing mobile apps and websites
 
Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSO
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not Repressive
 
When Mobile (Android) met Cloud
When Mobile (Android) met CloudWhen Mobile (Android) met Cloud
When Mobile (Android) met Cloud
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
IBM Worklight - Introduction
IBM Worklight - IntroductionIBM Worklight - Introduction
IBM Worklight - Introduction
 
Enterprise Application Distribution Technical White Paper[1]
Enterprise Application Distribution   Technical White Paper[1]Enterprise Application Distribution   Technical White Paper[1]
Enterprise Application Distribution Technical White Paper[1]
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 

Andere mochten auch

Seth Edwards on MongoDB
Seth Edwards on MongoDBSeth Edwards on MongoDB
Seth Edwards on MongoDBSkills Matter
 
Famous spanish people in sports by mario garcia
Famous spanish people in sports by mario garciaFamous spanish people in sports by mario garcia
Famous spanish people in sports by mario garciaM.Amparo
 
1993 Doubles Features Film Can Set
1993 Doubles Features   Film Can Set1993 Doubles Features   Film Can Set
1993 Doubles Features Film Can SetElvis Presley Blues
 
5 things cucumber is bad at by Richard Lawrence
5 things cucumber is bad at by Richard Lawrence5 things cucumber is bad at by Richard Lawrence
5 things cucumber is bad at by Richard LawrenceSkills Matter
 

Andere mochten auch (7)

Seth Edwards on MongoDB
Seth Edwards on MongoDBSeth Edwards on MongoDB
Seth Edwards on MongoDB
 
Famous spanish people in sports by mario garcia
Famous spanish people in sports by mario garciaFamous spanish people in sports by mario garcia
Famous spanish people in sports by mario garcia
 
1993 Doubles Features Film Can Set
1993 Doubles Features   Film Can Set1993 Doubles Features   Film Can Set
1993 Doubles Features Film Can Set
 
Office Of Substance Abuse Prevention2
Office Of Substance Abuse Prevention2Office Of Substance Abuse Prevention2
Office Of Substance Abuse Prevention2
 
Noboxing plugin
Noboxing pluginNoboxing plugin
Noboxing plugin
 
Gartenkunst china (2)
Gartenkunst china (2)Gartenkunst china (2)
Gartenkunst china (2)
 
5 things cucumber is bad at by Richard Lawrence
5 things cucumber is bad at by Richard Lawrence5 things cucumber is bad at by Richard Lawrence
5 things cucumber is bad at by Richard Lawrence
 

Ähnlich wie BYOD Enterprise Mobility: Beauty & the Beast

Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
Why WSO2 for Digital Transformation
Why WSO2 for Digital TransformationWhy WSO2 for Digital Transformation
Why WSO2 for Digital TransformationWSO2
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentAnyPresence
 
Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08niklaus
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningTmobile Girl
 
Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?CITYTECH, Inc.
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcDamian Hamilton
 
HTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level DesignHTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level DesignThanh Nguyen
 
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014Allen Bonde
 
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...Amazon Web Services
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
 
Red Hat Mobile
Red Hat MobileRed Hat Mobile
Red Hat MobileRed Hat
 
Informix SQL & NoSQL -- for Chat with the labs on 4/22
Informix SQL & NoSQL -- for Chat with the labs on 4/22Informix SQL & NoSQL -- for Chat with the labs on 4/22
Informix SQL & NoSQL -- for Chat with the labs on 4/22Keshav Murthy
 
Software panel
Software panelSoftware panel
Software panelMassTLC
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end reviewLeigh Williamson
 

Ähnlich wie BYOD Enterprise Mobility: Beauty & the Beast (20)

Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Why WSO2 for Digital Transformation
Why WSO2 for Digital TransformationWhy WSO2 for Digital Transformation
Why WSO2 for Digital Transformation
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
 
Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online Learning
 
Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdc
 
HTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level DesignHTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level Design
 
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
 
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
Red Hat Mobile
Red Hat MobileRed Hat Mobile
Red Hat Mobile
 
Informix SQL & NoSQL -- for Chat with the labs on 4/22
Informix SQL & NoSQL -- for Chat with the labs on 4/22Informix SQL & NoSQL -- for Chat with the labs on 4/22
Informix SQL & NoSQL -- for Chat with the labs on 4/22
 
Software panel
Software panelSoftware panel
Software panel
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Web 2.0 e RIAs
Web 2.0 e RIAsWeb 2.0 e RIAs
Web 2.0 e RIAs
 
Hematian seminar grid
Hematian seminar gridHematian seminar grid
Hematian seminar grid
 
Visible Market FinTech Demo 07182012
Visible Market FinTech Demo 07182012Visible Market FinTech Demo 07182012
Visible Market FinTech Demo 07182012
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 

Mehr von CA API Management

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 

Mehr von CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

BYOD Enterprise Mobility: Beauty & the Beast

  • 1. Enterprise Mobile Apps: Beauty & The Beast BYOD, Enterprise Integration, and Beautiful Mobile Apps Chris O’Connor, CEO & Co-founder, Taptera Matt McLarty, VP Client Solutions, Layer 7 Technologies
  • 2. Housekeeping  Questions - Chat any questions you have and we’ll answer them at the end of this call facebook.com/layer7  Twitter - Today’s event hashtag: - #L7webinar layer7.com/linkedin layer7.com/blogs - Follow us on Twitter: - @Layer7 - @Taptera - @MattMcLartyBC - @NowHearChris
  • 4. Beauty – The Mobile Enterprise  Worldwide mobile trends ... - “By 2015, more U.S. Internet users will access the Internet through mobile devices than through PCs or other wireline devices.” - “By 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the total workforce.”  Trends driving the growth of Mobile in Enterprise IT ... Source: IDC (September 2011, January 2012) - Consumerization, BYOD - Verticalization - New devices & device categories - Cloud-based mobile applications - Emerging M2M technologies “Mobility is poised to become the next major IT paradigm. This gravitational shift will bring an array of opportunities and challenges to the chief information officers in most enterprises.” Source: McKinsey (June 2012)
  • 5. Why “Beautiful” Apps Matter - Mobile devices have become personal extensions  Better Productivity - BYOD enables work on one’s favourite “toy” - An appealing, usable, functional app further incents usage Personal mobile devices—tablets, smartphones—are ubiquitous  Greater Accessibility New form factor brings new capabilities—geo-location, presence, photo - Truly “always-on” - Speed and consumability compel usage - -
  • 7. “The Beast” – The Challenges of Mobile - Identity management Security - Application and data lifecycle (access → transport → storage → removal) Deployment complexity - New mobile apps - Integration with existing applications and systems - Platform fragmentation Technology - Pace of change - Privacy issues Governance
  • 8. The Shedding of Tiers Web Application Presentation Business Logic Data Access Relational Database
  • 9. The Shedding of Tiers Mobile Devices Presentation Business Logic Data Access Big Data
  • 10. The Shedding of Tiers Mobile Devices Presentation Business Logic Data Access Big Data
  • 11. The Shedding of Tiers Mobile Devices Presentation Business and Data Services Data Access Big Data
  • 12. The Shedding of Tiers Presentation Mobile Devices Business and Data Services Big Data
  • 13. APIs: The New Perimeter BYOD Presentation Mobile Devices API Business and Data Services Big Data
  • 14. APIs: The New Perimeter BYOD Presentation Mobile Devices API Business and Data Services Big Data
  • 16. Beautiful Apps Are INTUITIVE
  • 22. Layer 7 Mobile Access Gateway  A lightweight, low-latency mobile gateway for solving critical mobile challenges in the following areas:
  • 23. Identity: Extending Enterprise Identity to Mobile  Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens  Create granular access policies at user, app and device levels  Build composite access policies combining geolocation, message content and other network attributes  Simplify PKI-based certificate delivery and provisioning +
  • 24. Identity: Extending Enterprise Identity to Mobile  Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens  Create granular access policies at user, app and device levels  Build composite access policies combining geolocation, message content and other network attributes  Simplify PKI-based certificate delivery and provisioning Firewall Mobile Devices & Apps + Protected Resource Authorization & Resource Server Identity Access Management
  • 25. Security: Mobile Application Firewalling  Protect REST, SOAP and OData APIs against DoS and API attacks  Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging  Enforce FIPS 140-2 grade data privacy and integrity  Validate data exchanges, including all JSON, XML, header and parameter content
  • 26. Security: Mobile Application Firewalling  Protect REST, SOAP and OData APIs against DoS and API attacks  Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging  Enforce FIPS 140-2 grade data privacy and integrity  Validate data exchanges, including all JSON, XML, header and parameter content Firewall Mobile Devices & Apps Hacker Protect against attacks: DOS, SQL Injection, XSS, … Enterprise Resources
  • 27. Adaptation: Translate & Orchestrate Data & APIs  Surface any legacy application or database as RESTful APIs  Quickly map between data formats such as XML and JSON  Recompose & virtualize APIs to specific mobile identities, apps and devices  Orchestrate API mashups with configurable workflow
  • 28. Adaptation: Translate & Orchestrate Data & APIs  Surface any legacy application or database as RESTful APIs  Quickly map between data formats such as XML and JSON  Recompose & virtualize APIs to specific mobile identities, apps and devices  Orchestrate API mashups with configurable workflow Firewall Mobile Devices & Apps Legacy Enterprise Applications & Databases
  • 29. Optimization: Handle Scale  Cache calls to backend applications  Recompose small backend calls into efficiently aggregated mobile requests  Compress traffic to minimize bandwidth costs and improve user experience  Pre-fetch content for hypermedia-based API calls
  • 30. Optimization: Handle Scale  Cache calls to backend applications  Recompose small backend calls into efficiently aggregated mobile requests  Compress traffic to minimize bandwidth costs and improve user experience  Pre-fetch content for hypermedia-based API calls Firewall Mobile Devices & Apps Enterprise Applications
  • 31. Integration: Centralize Cloud Connectivity  Proxy and manage app interactions with social networks  Broker call-outs to cloud services like Salesforce.com  Bridge connectivity to iPhone, Windows and Android notification services  Integrate with legacy applications using ESB capabilities
  • 32. Integration: Centralize Cloud Connectivity  Proxy and manage app interactions with social networks  Broker call-outs to cloud services like Salesforce.com  Bridge connectivity to iPhone, Windows and Android notification services  Integrate with legacy applications using ESB capabilities Firewall Cloud Services & Social Networks On-Premise Enterprise Applications End User
  • 33. Summary  BYOD and Mobility are sweeping Enterprise IT  Beautiful Apps will lead to greater productivity  Taptera’s enterprise apps are fast, beautiful and secure  Simplifying mobile access to the enterprise helps to keep apps beautiful  The Layer 7 Mobile Access Gateway solves key needs: - Identity - Security - Adaptation - Optimization - Integration
  • 34. Q&A Questions?