SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Copyright Sencha Inc. 2014
Sencha Space
MIRAE WEB Inc. Developer Conference

May 16 2014
SENCHA | Contents
• Technology Trends
• Challenges with Enterprise Mobility
• Sencha Space
• Introduction to Space
• Benefits and Capabilities
• Packaging
• Space in the Enterprise Mobility Management Landscape
• Q & A
SENCHA |
Consumerisation of IT
• Personal devices becoming pervasive in the enterprise
• Organisations must address challenges around BYOD
• Opportunity for productivity gains and cost savings
Rapid Adoption of Mobile
• Mobile device sales surpass PC sales
• Mobility comes with heightened security risks
• Driving a shift to mobile-first development
Enterprise Cloud Goes
Mainstream
• Cloud services gain acceptance for use in production
• Cloud providers adapt offerings for the enterprise
• Cloud IT investment poised for explosive growth
Accelerating workforce
virtualisation
• Collaboration with non-employees is the new normal
• Managing access and data security is a major challenge
• Organisational boundaries increasingly dynamic
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
• Personal devices becoming pervasive
in the enterprise
• Organisations must address
challenges around BYOD
• Opportunity for productivity gains
and cost savings
Consumerisation of IT
Source: IDC Survey: US Mobile Security Survey, April, 2013
2013: Enterprises move towards BYOD
IT Controlled

(no BYOD)
BYOD Allowed
0% 18% 35% 53% 70%
Enterprise Mobility Policy
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
• Mobile device sales surpass 

PC sales
• Driving a shift to mobile-first application
development
• Mobility comes with heightened security
risks
• Mobile app development incurs new costs
related to multi-platform development
and testing, app store distribution
Rapid Adoption of Mobile
• Source: http://www.gartner.com/newsroom/id/2610015, October, 2013
• http://www.smartplanet.com/blog/bulletin/outsourcing-to-surge-in-2013-study/
Forecast: PC vs. Mobile Sales
DeviceShipments(ThousandsofUnits)
0
750,000
1,500,000
2,250,000
3,000,000
2012 2013 2014
2,168,259
1,994,7351,866,380
321,464321,698351,060
PC
Smart Mobile Devices
CAGR:+7.7%
CAGR:-4.3%
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
• Cloud services gain acceptance for
use in production
• Cloud providers adapt offerings for
the enterprise
• Cloud IT investment poised for
explosive growth
Enterprise Cloud Goes
Mainstream
35% increase in production
VMs between 2012-20131
69% of organisations expect
growth in cloud spending
from 2013 to 20142
• Source: Verizon, State of the Enterprise Cloud, 2013
• Source: 451Research, “Enterprise Cloud Computing Poised for Explosive
Growth During Next Two Years,” September 2013
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
Telework grew by 79.7%
between 2005 and 2012,
expected to grow another
21% by 20161
80-85% of enterprises in a
recent survey plan to
increase workforce
outsourcing2
• Collaboration with remote colleagues
and non-employees is the new
normal
• Managing access and data security is
a major challenge
• Organisational boundaries
increasingly dynamic
Accelerating workforce virtualisation
1. http://www.globalworkplaceanalytics.com/telecommuting-statistics, September, 2013
2. Source: “2013 State of Outsourcing”, HfS Research Ltd. and KPMG Shared Services and
Outsourcing Advisory, p. 5
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
Mobility can make it more difficult to…
Enforce business policies consistently
Secure data moving across untrusted 

networks and devices
Manage user, data, application life cycles
Challenges

Mobility and BYOD increase risk
SENCHA |
The cost of mobility can erode its ROI
Write Code Test Publish to app
market
Deploy Update
$ $ $ $ $Each part of the app
development process incurs
expenses…
Write Code Test
Publish to
AppStore
Deploy Update
$ $ $ $ $
Write Code Test Publish to app
market
Deploy Update
$ $ $ $ $…which multiply with each
new supported mobile OS/
device platform
Management SecurityAnd these processes and apps need to
be managed and secure to limit risk
Challenges

Enterprise mobility can be expensive
SENCHA |
The security landscape has raised the stakes
✓ Targeted attacks
✓ Spear phishing and social engineering
✓ Mobile malware
✓ Advanced Persistent Threats
✓ Rising cost of data breaches
How do you manage the tradeoffs between
✓ Operational flexibility
✓ Security
✓ Cost and complexity
$
Challenges

Security is increasingly challenging
SENCHA |
1. Management Console
2. Mobile Client Application
What is Space?
1 2
Sencha Space

Introduction to Space
SENCHA |
• Provides centralised management of the user, data,
and application life cycles
• Allows administrators to enforce policy consistently
• Set minimum PIN length
• Specify group membership
• Provision apps to groups
• Configure advanced user authentication
• Enable SSL VPN connectivity
• Facilitates reporting and auditing with detailed usage
analytics
Management Console
Sencha Space

Management Console Overview
Space Management
Centralised Admin Console
Policy Engine
Identity and
Access
App Delivery
Data Security Network Security
SENCHA |
• Supports iOS and Android (Win Phone 8 and Blackberry
in beta)
• Segregates business and personal data
• Secures business data with strong encryption and
digital signatures
• Enforces policies downloaded from the console
• Facilitates secure, managed use of HTML5 apps
• Provides developer API to OS/Device features for rich,
modern, mobile user experience
Mobile Client Application
Sencha Space

Mobile Client Application
SENCHA |
Component Capabilities Benefits
Security
• Secure data in-motion and at-rest
• Manage user access entitlements
• Manage risk
• Facilitate compliance
Policy Engine
• Set and enforce consistent usage and
security policies
• Deploy applications instantly
• Block users/devices instantly
• Improve operational
efficiency
• Manage mobility risk
Analytics
• Monitor activity at the user and device
level
• Track application activity
• Facilitate audit and
reporting
• Enhance operational
visibility
Developer API
• Provide consistent API access to native
device/OS capabilities
• Provide developer access to Space
platform capabilities
• Help reduce the cost of
cross-platform
development
Sencha Space

Overview of Capabilities and Benefits
SENCHA |
• Reduce the risk of data breach
• Grant access to applications and data
based only on business need
• Deploy applications securely to
anyone on any device
Key Benefits
• Data Encryption – All data is stored encrypted in Space
to protect the confidentiality of sensitive, proprietary
information
• Network Security – All data transmitted between the
Space client app and management server is SSL-
encrypted
• VPN Support – Integration with Cisco and Juniper
clientless SSL VPN for secure connectivity between the
Space client app and back-end data centre assets
• Authentication – Single sign-on support using widely
accepted SAML open standard
Security
Sencha Space

Security
SENCHA |
• Simplify mobility management
• Grant/deny access to applications
and data based on business need
• Deploy applications securely to
anyone on any device
Key Benefits
• Centralised view of all users and group membership
• Inventory of mobile devices
• Revoke user access instantly
• Revoke access from individual devices instantly
• Remotely wipe your organisation’s data from a Space
client
• Provision apps to groups or users instantly
Device / User / App
Management
Sencha Space

Policy Engine
SENCHA |
• Improve situational awareness
• Reduce the complexity of audit and
compliance
Key Benefits
• Monitor activity usage – Monitor
and track the usage of applications,
as well as user and device activity
• Reporting – Easily generate useful
reports that will simplify audit and
compliance efforts
Analytics / Reporting
Sencha Space

Analytics
SENCHA |
• Eliminate or reduce costly
development processes
• Enable true cross-platform
development
• Maintain a modern, mobile user
experience without the
complications of native and hybrid
mobile development
Key Benefits
• Cross-platform API
• Allows developers to access mobile
OS/device capabilities in their
HTML5 apps
• Supported APIs
Developer API
✓Secure file system
✓Secure SQL DB
✓Camera
✓GPS
✓Orientation
✓Invocation
Sencha Space

Developer API
Copyright Sencha Inc. 2014
Questions & Answers
!
Demo
질문과 답변
Copyright Sencha Inc. 2014
Thank you
감사합니다
Jeff Pope
Managing Director Asia & Pacific | Sencha Inc.

Weitere ähnliche Inhalte

Was ist angesagt?

Federal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesFederal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesSolarWinds
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?Ahmed Banafa
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSolarWinds
 
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Inductive Automation
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Itential
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutaminePrimend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutaminePrimend
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...Jürgen Ambrosi
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsSolarWinds
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsSBWebinars
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 

Was ist angesagt? (20)

Federal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesFederal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New Features
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your Logs
 
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutaminePrimend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal Standards
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 

Andere mochten auch

[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5미래웹기술연구소 (MIRAE WEB)
 
Towards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software ApplicationsTowards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software ApplicationsHeiko Koziolek
 
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss GimSTONE BRAND COMMUNICATIONS
 
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진Jwajin Yoon
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개미래웹기술연구소 (MIRAE WEB)
 
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향미래웹기술연구소 (MIRAE WEB)
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대미래웹기술연구소 (MIRAE WEB)
 
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?미래웹기술연구소 (MIRAE WEB)
 
HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안욱래 김
 
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례미래웹기술연구소 (MIRAE WEB)
 
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우
실무자를 위한  ExtJS  엔터프라이즈 개발 노하우실무자를 위한  ExtJS  엔터프라이즈 개발 노하우
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우미래웹기술연구소 (MIRAE WEB)
 
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례미래웹기술연구소 (MIRAE WEB)
 
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션미래웹기술연구소 (MIRAE WEB)
 
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS미래웹기술연구소 (MIRAE WEB)
 

Andere mochten auch (20)

[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
 
Towards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software ApplicationsTowards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software Applications
 
Mobile UI Framework
Mobile UI FrameworkMobile UI Framework
Mobile UI Framework
 
HTML5 와 미래웹기술 part 1
HTML5 와 미래웹기술 part 1HTML5 와 미래웹기술 part 1
HTML5 와 미래웹기술 part 1
 
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
 
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
 
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
 
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
 
HTML5 기업 적용시 고려사항 : 미래웹기술연구소
HTML5 기업 적용시 고려사항 : 미래웹기술연구소 HTML5 기업 적용시 고려사항 : 미래웹기술연구소
HTML5 기업 적용시 고려사항 : 미래웹기술연구소
 
Sencha ExtJS를 활용한 Big Data Platform 개발 사례
Sencha ExtJS를 활용한 Big Data Platform 개발 사례 Sencha ExtJS를 활용한 Big Data Platform 개발 사례
Sencha ExtJS를 활용한 Big Data Platform 개발 사례
 
HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안
 
HTML5 와 미래웹기술 part 3
HTML5 와 미래웹기술 part 3HTML5 와 미래웹기술 part 3
HTML5 와 미래웹기술 part 3
 
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
 
HTML5 와 미래웹기술 part 2
HTML5 와 미래웹기술 part 2HTML5 와 미래웹기술 part 2
HTML5 와 미래웹기술 part 2
 
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우
실무자를 위한  ExtJS  엔터프라이즈 개발 노하우실무자를 위한  ExtJS  엔터프라이즈 개발 노하우
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우
 
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
 
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
 
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
 

Ähnlich wie [Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremDipesh Mukerji
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
CipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 
Shift to Application & Infrastructure Hosting
Shift to Application & Infrastructure HostingShift to Application & Infrastructure Hosting
Shift to Application & Infrastructure Hostingtechzimslides
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestAvere Systems
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangMinh Le
 

Ähnlich wie [Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
CipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access Gateway
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
Shift to Application & Infrastructure Hosting
Shift to Application & Infrastructure HostingShift to Application & Infrastructure Hosting
Shift to Application & Infrastructure Hosting
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 

Mehr von 미래웹기술연구소 (MIRAE WEB)

[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트미래웹기술연구소 (MIRAE WEB)
 
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석미래웹기술연구소 (MIRAE WEB)
 

Mehr von 미래웹기술연구소 (MIRAE WEB) (14)

미래웹기술연구소는 왜 Sencha 를 채택하였는가?
미래웹기술연구소는 왜 Sencha 를 채택하였는가?미래웹기술연구소는 왜 Sencha 를 채택하였는가?
미래웹기술연구소는 왜 Sencha 를 채택하였는가?
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
 
Ext JS 구축사례 : 하나로 TNS
Ext JS 구축사례 : 하나로 TNSExt JS 구축사례 : 하나로 TNS
Ext JS 구축사례 : 하나로 TNS
 
[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육
[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육
[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육
 
Sencha Ext JS 구축사례 : 콜로사 프로세스메이커
Sencha Ext JS 구축사례 : 콜로사 프로세스메이커Sencha Ext JS 구축사례 : 콜로사 프로세스메이커
Sencha Ext JS 구축사례 : 콜로사 프로세스메이커
 
Sencha Ext JS 구축사례 : 마케토
Sencha Ext JS 구축사례 : 마케토Sencha Ext JS 구축사례 : 마케토
Sencha Ext JS 구축사례 : 마케토
 
Sencha Ext JS 구축사례 : 코드스미스 툴즈
Sencha Ext JS 구축사례 : 코드스미스 툴즈Sencha Ext JS 구축사례 : 코드스미스 툴즈
Sencha Ext JS 구축사례 : 코드스미스 툴즈
 
Sencha Touch 구축사례 : 포드 쇼룸 앱
Sencha Touch 구축사례 : 포드 쇼룸 앱Sencha Touch 구축사례 : 포드 쇼룸 앱
Sencha Touch 구축사례 : 포드 쇼룸 앱
 
Sencha Ext JS 구축사례 : 클릭타임
Sencha Ext JS 구축사례 : 클릭타임Sencha Ext JS 구축사례 : 클릭타임
Sencha Ext JS 구축사례 : 클릭타임
 
Sencha Touch 구축사례 : 스텔라앤닷
Sencha Touch 구축사례 : 스텔라앤닷Sencha Touch 구축사례 : 스텔라앤닷
Sencha Touch 구축사례 : 스텔라앤닷
 
양면브로셔0324
양면브로셔0324양면브로셔0324
양면브로셔0324
 
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
 
W3C 온라인 트레이닝 한국어과정
W3C 온라인 트레이닝 한국어과정W3C 온라인 트레이닝 한국어과정
W3C 온라인 트레이닝 한국어과정
 
N-Screen 종결자, HTML5
N-Screen 종결자, HTML5N-Screen 종결자, HTML5
N-Screen 종결자, HTML5
 

Kürzlich hochgeladen

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Kürzlich hochgeladen (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space

  • 1. Copyright Sencha Inc. 2014 Sencha Space MIRAE WEB Inc. Developer Conference
 May 16 2014
  • 2. SENCHA | Contents • Technology Trends • Challenges with Enterprise Mobility • Sencha Space • Introduction to Space • Benefits and Capabilities • Packaging • Space in the Enterprise Mobility Management Landscape • Q & A
  • 3. SENCHA | Consumerisation of IT • Personal devices becoming pervasive in the enterprise • Organisations must address challenges around BYOD • Opportunity for productivity gains and cost savings Rapid Adoption of Mobile • Mobile device sales surpass PC sales • Mobility comes with heightened security risks • Driving a shift to mobile-first development Enterprise Cloud Goes Mainstream • Cloud services gain acceptance for use in production • Cloud providers adapt offerings for the enterprise • Cloud IT investment poised for explosive growth Accelerating workforce virtualisation • Collaboration with non-employees is the new normal • Managing access and data security is a major challenge • Organisational boundaries increasingly dynamic Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 4. SENCHA | • Personal devices becoming pervasive in the enterprise • Organisations must address challenges around BYOD • Opportunity for productivity gains and cost savings Consumerisation of IT Source: IDC Survey: US Mobile Security Survey, April, 2013 2013: Enterprises move towards BYOD IT Controlled
 (no BYOD) BYOD Allowed 0% 18% 35% 53% 70% Enterprise Mobility Policy Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 5. SENCHA | • Mobile device sales surpass 
 PC sales • Driving a shift to mobile-first application development • Mobility comes with heightened security risks • Mobile app development incurs new costs related to multi-platform development and testing, app store distribution Rapid Adoption of Mobile • Source: http://www.gartner.com/newsroom/id/2610015, October, 2013 • http://www.smartplanet.com/blog/bulletin/outsourcing-to-surge-in-2013-study/ Forecast: PC vs. Mobile Sales DeviceShipments(ThousandsofUnits) 0 750,000 1,500,000 2,250,000 3,000,000 2012 2013 2014 2,168,259 1,994,7351,866,380 321,464321,698351,060 PC Smart Mobile Devices CAGR:+7.7% CAGR:-4.3% Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 6. SENCHA | • Cloud services gain acceptance for use in production • Cloud providers adapt offerings for the enterprise • Cloud IT investment poised for explosive growth Enterprise Cloud Goes Mainstream 35% increase in production VMs between 2012-20131 69% of organisations expect growth in cloud spending from 2013 to 20142 • Source: Verizon, State of the Enterprise Cloud, 2013 • Source: 451Research, “Enterprise Cloud Computing Poised for Explosive Growth During Next Two Years,” September 2013 Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 7. SENCHA | Telework grew by 79.7% between 2005 and 2012, expected to grow another 21% by 20161 80-85% of enterprises in a recent survey plan to increase workforce outsourcing2 • Collaboration with remote colleagues and non-employees is the new normal • Managing access and data security is a major challenge • Organisational boundaries increasingly dynamic Accelerating workforce virtualisation 1. http://www.globalworkplaceanalytics.com/telecommuting-statistics, September, 2013 2. Source: “2013 State of Outsourcing”, HfS Research Ltd. and KPMG Shared Services and Outsourcing Advisory, p. 5 Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 8. SENCHA | Mobility can make it more difficult to… Enforce business policies consistently Secure data moving across untrusted 
 networks and devices Manage user, data, application life cycles Challenges
 Mobility and BYOD increase risk
  • 9. SENCHA | The cost of mobility can erode its ROI Write Code Test Publish to app market Deploy Update $ $ $ $ $Each part of the app development process incurs expenses… Write Code Test Publish to AppStore Deploy Update $ $ $ $ $ Write Code Test Publish to app market Deploy Update $ $ $ $ $…which multiply with each new supported mobile OS/ device platform Management SecurityAnd these processes and apps need to be managed and secure to limit risk Challenges
 Enterprise mobility can be expensive
  • 10. SENCHA | The security landscape has raised the stakes ✓ Targeted attacks ✓ Spear phishing and social engineering ✓ Mobile malware ✓ Advanced Persistent Threats ✓ Rising cost of data breaches How do you manage the tradeoffs between ✓ Operational flexibility ✓ Security ✓ Cost and complexity $ Challenges
 Security is increasingly challenging
  • 11. SENCHA | 1. Management Console 2. Mobile Client Application What is Space? 1 2 Sencha Space
 Introduction to Space
  • 12. SENCHA | • Provides centralised management of the user, data, and application life cycles • Allows administrators to enforce policy consistently • Set minimum PIN length • Specify group membership • Provision apps to groups • Configure advanced user authentication • Enable SSL VPN connectivity • Facilitates reporting and auditing with detailed usage analytics Management Console Sencha Space
 Management Console Overview Space Management Centralised Admin Console Policy Engine Identity and Access App Delivery Data Security Network Security
  • 13. SENCHA | • Supports iOS and Android (Win Phone 8 and Blackberry in beta) • Segregates business and personal data • Secures business data with strong encryption and digital signatures • Enforces policies downloaded from the console • Facilitates secure, managed use of HTML5 apps • Provides developer API to OS/Device features for rich, modern, mobile user experience Mobile Client Application Sencha Space
 Mobile Client Application
  • 14. SENCHA | Component Capabilities Benefits Security • Secure data in-motion and at-rest • Manage user access entitlements • Manage risk • Facilitate compliance Policy Engine • Set and enforce consistent usage and security policies • Deploy applications instantly • Block users/devices instantly • Improve operational efficiency • Manage mobility risk Analytics • Monitor activity at the user and device level • Track application activity • Facilitate audit and reporting • Enhance operational visibility Developer API • Provide consistent API access to native device/OS capabilities • Provide developer access to Space platform capabilities • Help reduce the cost of cross-platform development Sencha Space
 Overview of Capabilities and Benefits
  • 15. SENCHA | • Reduce the risk of data breach • Grant access to applications and data based only on business need • Deploy applications securely to anyone on any device Key Benefits • Data Encryption – All data is stored encrypted in Space to protect the confidentiality of sensitive, proprietary information • Network Security – All data transmitted between the Space client app and management server is SSL- encrypted • VPN Support – Integration with Cisco and Juniper clientless SSL VPN for secure connectivity between the Space client app and back-end data centre assets • Authentication – Single sign-on support using widely accepted SAML open standard Security Sencha Space
 Security
  • 16. SENCHA | • Simplify mobility management • Grant/deny access to applications and data based on business need • Deploy applications securely to anyone on any device Key Benefits • Centralised view of all users and group membership • Inventory of mobile devices • Revoke user access instantly • Revoke access from individual devices instantly • Remotely wipe your organisation’s data from a Space client • Provision apps to groups or users instantly Device / User / App Management Sencha Space
 Policy Engine
  • 17. SENCHA | • Improve situational awareness • Reduce the complexity of audit and compliance Key Benefits • Monitor activity usage – Monitor and track the usage of applications, as well as user and device activity • Reporting – Easily generate useful reports that will simplify audit and compliance efforts Analytics / Reporting Sencha Space
 Analytics
  • 18. SENCHA | • Eliminate or reduce costly development processes • Enable true cross-platform development • Maintain a modern, mobile user experience without the complications of native and hybrid mobile development Key Benefits • Cross-platform API • Allows developers to access mobile OS/device capabilities in their HTML5 apps • Supported APIs Developer API ✓Secure file system ✓Secure SQL DB ✓Camera ✓GPS ✓Orientation ✓Invocation Sencha Space
 Developer API
  • 19. Copyright Sencha Inc. 2014 Questions & Answers ! Demo 질문과 답변
  • 20. Copyright Sencha Inc. 2014 Thank you 감사합니다 Jeff Pope Managing Director Asia & Pacific | Sencha Inc.