4. Company business card
Founded in 2000, Germany and now covering 33 countries
worldwide with 12 regional offices
Core business – IT Security
Offices
in
Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kaz
ahstan, Ekaterinburg, Minsk, Baku, Almaty, Sofia
More than 80 employees
More than 25 vendors in portfolio
Official distributor (for many cases exclusive) in Eastern Europe and
Asia for number of products/solutions/vendors
Participant of many IT exhibitions, road shows, business
forums, ENISA IT Security Awareness programm – local IT Security
evangelist.
8. Björk – adopting technology
«And when you see the show or play with the apps, most people so far have
commented on how cut-the-crap it is and simple. It just looks complicated on paper.»
/Björk/
17. From desktop to mobile
We are at point where
functionality of desktop collides
with mobility of mobile device.
Mobile IT
18. What do local companies say?
• Up to 60% of new phone buyers choose smartphones;
• Most bought smartphones at the moment – iPhone5, iPhone4S and Samsung
Galaxy S4;
• In our network there are 150 000+ smartphone users.
Jānis Vēvers, LMT
• We predict that in 2014 the internet on mobile devices will be over 100 Mb p/s;
• On year 2015 from all sold mobile phones 75% will be smartphones;
• All-in-one plans and solutions will be the dominating choice for buyers.
Valdis Vancovičs, Tele2
19. Challanges
M - the need for mobility
O - the need to improve operations
B - the need to break business barriers
I - the need to improve information quality
L - the need to decrease transaction lag
E - the need to improve efficiency
20. Mobile drives a fundamental shift in behavior
Desktop as primary
Salesforce
Task workers
Knowledge workers
Industry-specific roles
Mobile as primary
21. What is Mobile IT?
Mobile IT requires new strategies, skills, and platforms because
mobile is fundamentally different than desktop computing
Management, security, and apps development are tightly
intertwined.
Device and app lifecycles are 6-12 months, not 3-5 years.
22. The birth of Mobile IT
2-3x as many employees using mobile
Devices not Windows-based
Mobile
>50% owned by employees
>50 apps per device
Most mobile apps built outside IT
Constant OS migration
IT
24. Black or white? Smart ones choose colour!
Forbidding apps on a device is not an option
“The more the CIO says no, the less secure the organization becomes.”
25. My experience - 3 types of CIO`s
If you spend more on coffee than on IT security, you will be hacked.
What’s more, you deserve to be hacked.
/Richard A. Clarke/
NO NO`s – declines mobile technology in their infrastructure due to
security and/or financial reasons.
Providers – provides business with minimal needs (such as email), doesn`t iniciate any other use of devices.
GO GO`s – shows strong iniciative to business, recommends new
and innovative ways how mobile IT can support business.
27. Mobile Apps: The Role of IT
User Experience, Developer Sourcing & Timelines
API accessibility to Corporate Data & Developer Security
Consumer-Grade App Discovery Experience
Easy-Configuration For Users
Global Delivery & Integration with Other Services
App & Data Security
28.
29.
30. User Experience Crucial To Success
Consumer apps for the employee
.. not …
Business apps for the enterprise
Singular function, not multiple features … feature creep is the kiss of
death in a mobile app
Fast cycles … eight weeks of development, fast iteration, six month
lifespan, and reasonable cost
High expectations … your employees are mobile experts in their
personal lives. Your business app design is not competing against a
desktop SAP app in their minds. It is competing against that great
Twitter on Instagram app they downloaded last night which feels
like it was built JUST for them.
37. How much do you carry around?
“Businesses can no longer ignore mobility trends. Instead, they must
find ways to meet their needs, while meeting strict security
demands,”
Anthony Foy, CEO of Workshare.
40. Mobile IT requirements in the post-PC era
Prevent data loss
Mobilize apps and documents
Preserve user experience and privacy
Support mobile OS and device evolution
Deploy at scale across global organizations
41. MobileIron - Beyond Enterprise MDM
3
Email and
Content Security (MCM)
2
Application Delivery,
Security and Policy (MAM)
1
OS Management
and Control (MDM)
42. MobileIron offer for developers – SDK
Any app can leverage AppConnect through an easy-to-use app
wrapper or a simple SDK
App wrapping minimizes developer time and secures apps postdevelopment
The SDK can be used at any time during the development process
Your own application storefront
43. Benefits?
Authentication: Confirm user identity through domain username
and password or certificates
Single sign-on: Enforce time-based app-level sign-on across
secured app containers
Authorization: Allow or block app usage or data storage based on
device or user risk
Configuration: Silently configure personalized settings such as user
name, server name, and custom attributes without requiring user
intervention
44. More benefits
Encryption: Ensure that all app data stored on the device is
encrypted
DLP
controls:
Set
data
loss
prevention
(DLP)
policies, e.g., copy/paste, print, and open-in permissions, so
unauthorized apps cannot access secure data
Dynamic policy: Update app policies dynamically
Reporting: Provide app usage statistics
Selective wipe: Remotely wipe app data without touching personal
data
45. ..and more benefits
VPN: Create app-specific VPN connection
Application control: Application whitelist/blacklist
Patch management: Manage application versions, force updates
And more..
49. The journey to the Mobile First enterprise
Commit to
Mobile First
Deliver Apps
& Content
Adopt
Devices
Transformation (biz/org)
New user experiences
New business processes
Core apps
Core documents
Experiments
BYOD
Email access
Multi-OS device security
Users
Enterprise IT
Mobile is where functionality of desktop collides with mobility with mobile device.
Mobile drivesa fundamental shift in user behavior as revolutionary as the PC and web transitions of the past>>>60% or more of the workforce will adopt mobile as their primary business device. It will be the first place they look to do their workDeveluperi arī mainās.
This shift has driven the birth of Mobile IT, which extends far beyond traditional mobile device management (MDM) and mobile application management (MAM). >>>Our customers have found that Mobile IT requires new strategies, skills, and platforms because mobile is fundamentally different than desktop computing.First, it is user-led, not company-led. This means Mobile IT mustBe flexible enough to deal with a constantly changing mobile operating system environmentBe focused on user experience first and foremostBe able to quickly leverage innovations that users bring into the company from their personal experiencesMobile IT has to be extremely agile to stay ahead of this curve.Second, it is cross-functional. Silos don’t work for Mobile IT.Management, security, and apps development are tightly intertwined.Successful Mobile IT teams either integrate these functions or effectively break down the barriers between themThird, it moves faster than any other enterprise technologyUser preference and mobile technology evolution happens at consumer speed, not enterprise speedDevice and app lifecycles are 6-12 months, not 3-5 years.Apps are small and focused, not monolithic, and are built in short iterations, not long projectsMobile IT needs to make fast decisions and provide quick turnaround.Our customers have found that these capabilities are not optional. Users will move forward even if Mobile IT can’t keep up. As Vivek Kundra, the first CIO of the United States, told us when he visited MobileIron at the beginning of this market transition in January 2011, “The more the CIO says ‘no’ the less secure the organization becomes.” Apps built outside IT – consumer apps to business app.s
%Piemēri applikāciju izmantošanai.
Izstrādājati, SPotify
Citi ražotāji – tirgus ir pilns, ražo visi, kam nav slinkums.Cisco, juniper, checkpoint
[Purpose of this slide is to understand the audience’s pain points in mobile – generate discussion around these questions to identify core needs]Mobile is how people work in the post-PC era, but mobile introduces risk, cost, and usability challenges that traditional IT strategies cannot address. Mobile IT needs the tools to speed things up, not slow things down.Our customers have five core Mobile IT requirements>>>How do I prevent data loss?Enterprise data is moving to moving to the mobile device. That means data loss prevention for both data-at-rest and data-in-motion is the foundational requirement for the security team.[ask what data is on their devices … what are they most concerned about on the data security side]>>>How do I take enterprise apps and documents mobile?This is what transforms the business – when organizations move beyond email to mobilize core business processes[ask what apps they are deploying. Is the business asking for apps? For documents?]>>>How do I preserve user experience and privacy?The biggest trap in mobile is compromising user experience for security Our customers are committed to having a great user experience AND being secure – it’s not a choiceAn additional complexity, especially in BYOD settings, is maintaining user privacy for personal data[Ask about BYOD programs. How are they thinking about privacy? What did users think of Good (if they had it)?]>>>How do I support the evolution of mobile operating systems and devices?Five years ago, BlackBerry, Symbian, Windows Mobile, and Palm made up 100% of enterprise mobility. Now all four of those operating systems have been end-of-lifedMobile technology changes faster than anything else IT has to manage.Keeping up is hard but essential … and the Mobile IT platform must support that evolution[Ask about Android … Windows Phone … Mac … how many OS do they think they will have to support?]>>>How do I scale across my global organization?Mobile scale is very difficult – devices, apps, registrations, certificates, email traffic all have to scaleMust scale through architecture, not by requiring you to spend lots of money on more hardware, software, and people[How many devices will they have? How big are their apps? How much staff is available to support mobile?]MobileIron’s focus:Secure dataMake it easy to take apps and docs mobileNever compromise the user experienceGive you the tools to keep up with mobile technologyGive you the platform to go big cost-effectively[Use these MobileIron firsts for each of the items as anecdotes:Data loss: first with DLP for iOS email, first with secure tunnel and access control for ActiveSync (Sentry)Apps and docs: first enterprise app storefront, first scalable app delivery (App Delivery Network), first complete app security platform (AppConnect / AppTunnel)User experience and privacy: first full security for native iOS email, first privacy policyOS and device evolution: first platform purpose-built for multi-OS, purpose-built for Mobile ITScale: first server to scale to 100,000 devices, first scalable app delivery, largest mobile certs deployment in the world (150K certs), first to build mobile scale testing infrastructure (TRUST)
We fundamentally believe that to address the new era of mobile, one must look not simply at the device, but application, content and email. Let’s dive into the operating systems.Appconnect.