SlideShare ist ein Scribd-Unternehmen logo
1 von 52
Partners:
Bring Your Own Device? More like Bring your Own Problems
Kaspars Pētersons
Account Manager Baltic’s

14.11.2013
headtechnology Group
Company business card
Founded in 2000, Germany and now covering 33 countries
worldwide with 12 regional offices
Core business – IT Security
Offices
in
Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kaz
ahstan, Ekaterinburg, Minsk, Baku, Almaty, Sofia
More than 80 employees
More than 25 vendors in portfolio
Official distributor (for many cases exclusive) in Eastern Europe and
Asia for number of products/solutions/vendors
Participant of many IT exhibitions, road shows, business
forums, ENISA IT Security Awareness programm – local IT Security
evangelist.
Content
History lesson
Where are we now?
It`s all about apps
Security perspective

How can we help?
My business card

Kaspars Pētersons
Riga, Latvia
IT Security Distribution business in Baltics
3+ years experience
And more..
Tech/Gadgets/Toys
Björk – adopting technology

«And when you see the show or play with the apps, most people so far have
commented on how cut-the-crap it is and simple. It just looks complicated on paper.»
/Björk/
History lesson
Let`s go back in time
PHONE
Elisha Gray & Alexander Granham Bell

2013
Xperia Z Ultra
SONY
ENIAC COMPUTER
John Mauchlu & John Presper Eckert

December 2013
Mac Pro
Apple
WORLD WIDE WEB
Sir Tim Berners - Lee

WORLD WIDE WEB
2,405,518,376 users in 2012
BARCODE
Norman Joseph Woodland & Bernard Silver

1994
QR CODE
DENSO WAVE
Leap in history
Where are we now?
21st centrury – Mobile centrury

PC era

Mobile era
From desktop to mobile

We are at point where
functionality of desktop collides
with mobility of mobile device.

Mobile IT
What do local companies say?

• Up to 60% of new phone buyers choose smartphones;
• Most bought smartphones at the moment – iPhone5, iPhone4S and Samsung
Galaxy S4;
• In our network there are 150 000+ smartphone users.
Jānis Vēvers, LMT

• We predict that in 2014 the internet on mobile devices will be over 100 Mb p/s;
• On year 2015 from all sold mobile phones 75% will be smartphones;
• All-in-one plans and solutions will be the dominating choice for buyers.
Valdis Vancovičs, Tele2
Challanges

M - the need for mobility
O - the need to improve operations
B - the need to break business barriers
I - the need to improve information quality
L - the need to decrease transaction lag
E - the need to improve efficiency
Mobile drives a fundamental shift in behavior
Desktop as primary

Salesforce

Task workers

Knowledge workers

Industry-specific roles

Mobile as primary
What is Mobile IT?
Mobile IT requires new strategies, skills, and platforms because
mobile is fundamentally different than desktop computing
Management, security, and apps development are tightly
intertwined.
Device and app lifecycles are 6-12 months, not 3-5 years.
The birth of Mobile IT

2-3x as many employees using mobile
Devices not Windows-based
Mobile

>50% owned by employees
>50 apps per device
Most mobile apps built outside IT
Constant OS migration

IT
Mobility redefines business practices
Black or white? Smart ones choose colour!
Forbidding apps on a device is not an option

“The more the CIO says no, the less secure the organization becomes.”
My experience - 3 types of CIO`s
If you spend more on coffee than on IT security, you will be hacked.
What’s more, you deserve to be hacked.
/Richard A. Clarke/
NO NO`s – declines mobile technology in their infrastructure due to
security and/or financial reasons.
Providers – provides business with minimal needs (such as email), doesn`t iniciate any other use of devices.
GO GO`s – shows strong iniciative to business, recommends new
and innovative ways how mobile IT can support business.
It`s all about apps
Mobile Apps: The Role of IT
User Experience, Developer Sourcing & Timelines
API accessibility to Corporate Data & Developer Security
Consumer-Grade App Discovery Experience
Easy-Configuration For Users
Global Delivery & Integration with Other Services
App & Data Security
User Experience Crucial To Success

Consumer apps for the employee
.. not …
Business apps for the enterprise
Singular function, not multiple features … feature creep is the kiss of
death in a mobile app
Fast cycles … eight weeks of development, fast iteration, six month
lifespan, and reasonable cost
High expectations … your employees are mobile experts in their
personal lives. Your business app design is not competing against a
desktop SAP app in their minds. It is competing against that great
Twitter on Instagram app they downloaded last night which feels
like it was built JUST for them.
Simplify App Configuration

?

Server: 1
us2439.kraymerica.com/948

Server: 2
server12.arcisionline.com/en

User Name:
johnsmith

Password:

Password
••••••••

**************

License Key:
Hx7h#2294aC

SUBMIT

SUBMIT
Security perspective
Reality check
Smartphones – not so secure at all
Hacked?
How much do you carry around?

“Businesses can no longer ignore mobility trends. Instead, they must
find ways to meet their needs, while meeting strict security
demands,”
Anthony Foy, CEO of Workshare.
472% increase in Android malware in 2011
Everyone does MDM
Mobile IT requirements in the post-PC era

Prevent data loss
Mobilize apps and documents
Preserve user experience and privacy
Support mobile OS and device evolution
Deploy at scale across global organizations
MobileIron - Beyond Enterprise MDM

3

Email and
Content Security (MCM)

2

Application Delivery,
Security and Policy (MAM)

1

OS Management
and Control (MDM)
MobileIron offer for developers – SDK
Any app can leverage AppConnect through an easy-to-use app
wrapper or a simple SDK
App wrapping minimizes developer time and secures apps postdevelopment
The SDK can be used at any time during the development process

Your own application storefront
Benefits?
Authentication: Confirm user identity through domain username
and password or certificates
Single sign-on: Enforce time-based app-level sign-on across
secured app containers
Authorization: Allow or block app usage or data storage based on
device or user risk
Configuration: Silently configure personalized settings such as user
name, server name, and custom attributes without requiring user
intervention
More benefits
Encryption: Ensure that all app data stored on the device is
encrypted
DLP
controls:
Set
data
loss
prevention
(DLP)
policies, e.g., copy/paste, print, and open-in permissions, so
unauthorized apps cannot access secure data
Dynamic policy: Update app policies dynamically

Reporting: Provide app usage statistics
Selective wipe: Remotely wipe app data without touching personal
data
..and more benefits
VPN: Create app-specific VPN connection
Application control: Application whitelist/blacklist
Patch management: Manage application versions, force updates
And more..
Tunnel per App

Traditional

FIREWALL

Tunnel per App

VPN

AppTunnel

AppTunnel

SENTRY

AppTunnel

AppTunnel
AppConnect DLP Policy Control
SDK vs Wrapping Apps

AppConnect
SDK
… Coming Soon

AppConnect
Wrapping
The journey to the Mobile First enterprise

Commit to
Mobile First
Deliver Apps
& Content
Adopt
Devices

Transformation (biz/org)
New user experiences
New business processes

Core apps
Core documents
Experiments

BYOD
Email access
Multi-OS device security

Users

Enterprise IT
Feedback

  
Partners:

Weitere ähnliche Inhalte

Was ist angesagt?

Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...Fujitsu France
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solutionroshanjk
 
Sims presentation
Sims presentationSims presentation
Sims presentationEduGeek.net
 
in-house deployment & development case study, SoftShake 2011
in-house deployment & development case study, SoftShake 2011in-house deployment & development case study, SoftShake 2011
in-house deployment & development case study, SoftShake 2011Valentin Jacquemin
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Stanley-Atilon-Ong
Stanley-Atilon-OngStanley-Atilon-Ong
Stanley-Atilon-OngStanley Ong
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - dbDavid Bressler
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
iPhone in Enterprise: in-house deployment & development case study, SoftShake...
iPhone in Enterprise: in-house deployment & development case study, SoftShake...iPhone in Enterprise: in-house deployment & development case study, SoftShake...
iPhone in Enterprise: in-house deployment & development case study, SoftShake...Valentin Jacquemin
 
Mobile Application Developer
Mobile Application DeveloperMobile Application Developer
Mobile Application DeveloperEr. Amreesh Kumar
 
Enterprise Mobile App UX: Designing from UI to Backend
Enterprise Mobile App UX: Designing from UI to BackendEnterprise Mobile App UX: Designing from UI to Backend
Enterprise Mobile App UX: Designing from UI to BackendSanjeev Sharma
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessisitnewsafrica
 

Was ist angesagt? (20)

Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solution
 
Sims presentation
Sims presentationSims presentation
Sims presentation
 
in-house deployment & development case study, SoftShake 2011
in-house deployment & development case study, SoftShake 2011in-house deployment & development case study, SoftShake 2011
in-house deployment & development case study, SoftShake 2011
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Stanley-Atilon-Ong
Stanley-Atilon-OngStanley-Atilon-Ong
Stanley-Atilon-Ong
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - db
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
3i Infotech Case Study
3i Infotech Case Study3i Infotech Case Study
3i Infotech Case Study
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
iPhone in Enterprise: in-house deployment & development case study, SoftShake...
iPhone in Enterprise: in-house deployment & development case study, SoftShake...iPhone in Enterprise: in-house deployment & development case study, SoftShake...
iPhone in Enterprise: in-house deployment & development case study, SoftShake...
 
Mobile Application Developer
Mobile Application DeveloperMobile Application Developer
Mobile Application Developer
 
Enterprise Mobile App UX: Designing from UI to Backend
Enterprise Mobile App UX: Designing from UI to BackendEnterprise Mobile App UX: Designing from UI to Backend
Enterprise Mobile App UX: Designing from UI to Backend
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
Low Code Application Development Platform
Low Code Application Development PlatformLow Code Application Development Platform
Low Code Application Development Platform
 

Ähnlich wie Kaspars Petersons - BYOD - more like BYOP

Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Designing and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDesigning and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDunn Solutions Group
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
COMPANY PORTFOLIO
COMPANY PORTFOLIO COMPANY PORTFOLIO
COMPANY PORTFOLIO Georgey John
 
Mobile Distillery professional services
Mobile Distillery professional servicesMobile Distillery professional services
Mobile Distillery professional servicesMobile Distillery
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Steven Williams
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!Mike Brannon
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremDipesh Mukerji
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 

Ähnlich wie Kaspars Petersons - BYOD - more like BYOP (20)

Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Designing and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDesigning and Developing Custom Mobile Applications
Designing and Developing Custom Mobile Applications
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
COMPANY PORTFOLIO
COMPANY PORTFOLIO COMPANY PORTFOLIO
COMPANY PORTFOLIO
 
Mobile Distillery professional services
Mobile Distillery professional servicesMobile Distillery professional services
Mobile Distillery professional services
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 

Mehr von DevConFu

Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...
Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...
Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...DevConFu
 
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...DevConFu
 
Gojko Adzic - Taking the business on the journey - ConFu
Gojko Adzic - Taking the business on the journey - ConFuGojko Adzic - Taking the business on the journey - ConFu
Gojko Adzic - Taking the business on the journey - ConFuDevConFu
 
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFu
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFuVasco Duarte - Agile Innovation - Product Management in turbulent times - ConFu
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFuDevConFu
 
Hanno Jarvet - VSM, Planning and Problem Solving - ConFu
Hanno Jarvet - VSM, Planning and Problem Solving - ConFuHanno Jarvet - VSM, Planning and Problem Solving - ConFu
Hanno Jarvet - VSM, Planning and Problem Solving - ConFuDevConFu
 
Andrey Adamovich - Enterprise flight into DevOps space - ConFu
Andrey Adamovich - Enterprise flight into DevOps space - ConFuAndrey Adamovich - Enterprise flight into DevOps space - ConFu
Andrey Adamovich - Enterprise flight into DevOps space - ConFuDevConFu
 
Jina Bolton - in the search of the single source of truth
Jina Bolton - in the search of the single source of truth Jina Bolton - in the search of the single source of truth
Jina Bolton - in the search of the single source of truth DevConFu
 
Jina bolton - Refactoring Web Interfaces
Jina bolton - Refactoring Web InterfacesJina bolton - Refactoring Web Interfaces
Jina bolton - Refactoring Web InterfacesDevConFu
 
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem Solving
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem SolvingHanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem Solving
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem SolvingDevConFu
 
Didzis Balodis - Web application security – war stories from real penetration...
Didzis Balodis - Web application security – war stories from real penetration...Didzis Balodis - Web application security – war stories from real penetration...
Didzis Balodis - Web application security – war stories from real penetration...DevConFu
 
Ivan Gaydamakin and Juri Tishko - ​3D Printing (workshop)
Ivan Gaydamakin and Juri Tishko -  ​3D Printing (workshop)Ivan Gaydamakin and Juri Tishko -  ​3D Printing (workshop)
Ivan Gaydamakin and Juri Tishko - ​3D Printing (workshop)DevConFu
 
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3D
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3DRobin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3D
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3DDevConFu
 
Marion de Groot - Scrum and Specs
Marion de Groot - Scrum and SpecsMarion de Groot - Scrum and Specs
Marion de Groot - Scrum and SpecsDevConFu
 
Allan Kelly - Dialogue Sheets for retrospectives and discussion
Allan Kelly - Dialogue Sheets for retrospectives and discussionAllan Kelly - Dialogue Sheets for retrospectives and discussion
Allan Kelly - Dialogue Sheets for retrospectives and discussionDevConFu
 
Robert Virkus - Playing with LEGO Mindstorms from your Mobile Phone
Robert Virkus - Playing with LEGO Mindstorms from your Mobile PhoneRobert Virkus - Playing with LEGO Mindstorms from your Mobile Phone
Robert Virkus - Playing with LEGO Mindstorms from your Mobile PhoneDevConFu
 
Eduards Sizovs - Micro Service Architecture
Eduards Sizovs - Micro Service Architecture Eduards Sizovs - Micro Service Architecture
Eduards Sizovs - Micro Service Architecture DevConFu
 
Misha Beshkin - How to organize execution of tests on real Android devices
Misha Beshkin - How to organize execution of tests on real Android devicesMisha Beshkin - How to organize execution of tests on real Android devices
Misha Beshkin - How to organize execution of tests on real Android devicesDevConFu
 
Jon Arne Sæterås - Give Responsive Design a mobile performance boost
Jon Arne Sæterås - Give Responsive Design a mobile performance boost Jon Arne Sæterås - Give Responsive Design a mobile performance boost
Jon Arne Sæterås - Give Responsive Design a mobile performance boost DevConFu
 
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloud
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloudAndrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloud
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloudDevConFu
 
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer events
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer eventsPatrick H. Lauke - Getting Touchy; an introduction to touch and pointer events
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer eventsDevConFu
 

Mehr von DevConFu (20)

Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...
Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...
Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...
 
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
 
Gojko Adzic - Taking the business on the journey - ConFu
Gojko Adzic - Taking the business on the journey - ConFuGojko Adzic - Taking the business on the journey - ConFu
Gojko Adzic - Taking the business on the journey - ConFu
 
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFu
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFuVasco Duarte - Agile Innovation - Product Management in turbulent times - ConFu
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFu
 
Hanno Jarvet - VSM, Planning and Problem Solving - ConFu
Hanno Jarvet - VSM, Planning and Problem Solving - ConFuHanno Jarvet - VSM, Planning and Problem Solving - ConFu
Hanno Jarvet - VSM, Planning and Problem Solving - ConFu
 
Andrey Adamovich - Enterprise flight into DevOps space - ConFu
Andrey Adamovich - Enterprise flight into DevOps space - ConFuAndrey Adamovich - Enterprise flight into DevOps space - ConFu
Andrey Adamovich - Enterprise flight into DevOps space - ConFu
 
Jina Bolton - in the search of the single source of truth
Jina Bolton - in the search of the single source of truth Jina Bolton - in the search of the single source of truth
Jina Bolton - in the search of the single source of truth
 
Jina bolton - Refactoring Web Interfaces
Jina bolton - Refactoring Web InterfacesJina bolton - Refactoring Web Interfaces
Jina bolton - Refactoring Web Interfaces
 
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem Solving
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem SolvingHanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem Solving
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem Solving
 
Didzis Balodis - Web application security – war stories from real penetration...
Didzis Balodis - Web application security – war stories from real penetration...Didzis Balodis - Web application security – war stories from real penetration...
Didzis Balodis - Web application security – war stories from real penetration...
 
Ivan Gaydamakin and Juri Tishko - ​3D Printing (workshop)
Ivan Gaydamakin and Juri Tishko -  ​3D Printing (workshop)Ivan Gaydamakin and Juri Tishko -  ​3D Printing (workshop)
Ivan Gaydamakin and Juri Tishko - ​3D Printing (workshop)
 
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3D
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3DRobin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3D
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3D
 
Marion de Groot - Scrum and Specs
Marion de Groot - Scrum and SpecsMarion de Groot - Scrum and Specs
Marion de Groot - Scrum and Specs
 
Allan Kelly - Dialogue Sheets for retrospectives and discussion
Allan Kelly - Dialogue Sheets for retrospectives and discussionAllan Kelly - Dialogue Sheets for retrospectives and discussion
Allan Kelly - Dialogue Sheets for retrospectives and discussion
 
Robert Virkus - Playing with LEGO Mindstorms from your Mobile Phone
Robert Virkus - Playing with LEGO Mindstorms from your Mobile PhoneRobert Virkus - Playing with LEGO Mindstorms from your Mobile Phone
Robert Virkus - Playing with LEGO Mindstorms from your Mobile Phone
 
Eduards Sizovs - Micro Service Architecture
Eduards Sizovs - Micro Service Architecture Eduards Sizovs - Micro Service Architecture
Eduards Sizovs - Micro Service Architecture
 
Misha Beshkin - How to organize execution of tests on real Android devices
Misha Beshkin - How to organize execution of tests on real Android devicesMisha Beshkin - How to organize execution of tests on real Android devices
Misha Beshkin - How to organize execution of tests on real Android devices
 
Jon Arne Sæterås - Give Responsive Design a mobile performance boost
Jon Arne Sæterås - Give Responsive Design a mobile performance boost Jon Arne Sæterås - Give Responsive Design a mobile performance boost
Jon Arne Sæterås - Give Responsive Design a mobile performance boost
 
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloud
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloudAndrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloud
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloud
 
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer events
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer eventsPatrick H. Lauke - Getting Touchy; an introduction to touch and pointer events
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer events
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Kaspars Petersons - BYOD - more like BYOP

  • 2. Bring Your Own Device? More like Bring your Own Problems Kaspars Pētersons Account Manager Baltic’s 14.11.2013
  • 4. Company business card Founded in 2000, Germany and now covering 33 countries worldwide with 12 regional offices Core business – IT Security Offices in Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kaz ahstan, Ekaterinburg, Minsk, Baku, Almaty, Sofia More than 80 employees More than 25 vendors in portfolio Official distributor (for many cases exclusive) in Eastern Europe and Asia for number of products/solutions/vendors Participant of many IT exhibitions, road shows, business forums, ENISA IT Security Awareness programm – local IT Security evangelist.
  • 5. Content History lesson Where are we now? It`s all about apps Security perspective How can we help?
  • 6. My business card Kaspars Pētersons Riga, Latvia IT Security Distribution business in Baltics 3+ years experience And more..
  • 8. Björk – adopting technology «And when you see the show or play with the apps, most people so far have commented on how cut-the-crap it is and simple. It just looks complicated on paper.» /Björk/
  • 10. Let`s go back in time PHONE Elisha Gray & Alexander Granham Bell 2013 Xperia Z Ultra SONY
  • 11. ENIAC COMPUTER John Mauchlu & John Presper Eckert December 2013 Mac Pro Apple
  • 12. WORLD WIDE WEB Sir Tim Berners - Lee WORLD WIDE WEB 2,405,518,376 users in 2012
  • 13. BARCODE Norman Joseph Woodland & Bernard Silver 1994 QR CODE DENSO WAVE
  • 15. Where are we now?
  • 16. 21st centrury – Mobile centrury PC era Mobile era
  • 17. From desktop to mobile We are at point where functionality of desktop collides with mobility of mobile device. Mobile IT
  • 18. What do local companies say? • Up to 60% of new phone buyers choose smartphones; • Most bought smartphones at the moment – iPhone5, iPhone4S and Samsung Galaxy S4; • In our network there are 150 000+ smartphone users. Jānis Vēvers, LMT • We predict that in 2014 the internet on mobile devices will be over 100 Mb p/s; • On year 2015 from all sold mobile phones 75% will be smartphones; • All-in-one plans and solutions will be the dominating choice for buyers. Valdis Vancovičs, Tele2
  • 19. Challanges M - the need for mobility O - the need to improve operations B - the need to break business barriers I - the need to improve information quality L - the need to decrease transaction lag E - the need to improve efficiency
  • 20. Mobile drives a fundamental shift in behavior Desktop as primary Salesforce Task workers Knowledge workers Industry-specific roles Mobile as primary
  • 21. What is Mobile IT? Mobile IT requires new strategies, skills, and platforms because mobile is fundamentally different than desktop computing Management, security, and apps development are tightly intertwined. Device and app lifecycles are 6-12 months, not 3-5 years.
  • 22. The birth of Mobile IT 2-3x as many employees using mobile Devices not Windows-based Mobile >50% owned by employees >50 apps per device Most mobile apps built outside IT Constant OS migration IT
  • 24. Black or white? Smart ones choose colour! Forbidding apps on a device is not an option “The more the CIO says no, the less secure the organization becomes.”
  • 25. My experience - 3 types of CIO`s If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. /Richard A. Clarke/ NO NO`s – declines mobile technology in their infrastructure due to security and/or financial reasons. Providers – provides business with minimal needs (such as email), doesn`t iniciate any other use of devices. GO GO`s – shows strong iniciative to business, recommends new and innovative ways how mobile IT can support business.
  • 27. Mobile Apps: The Role of IT User Experience, Developer Sourcing & Timelines API accessibility to Corporate Data & Developer Security Consumer-Grade App Discovery Experience Easy-Configuration For Users Global Delivery & Integration with Other Services App & Data Security
  • 28.
  • 29.
  • 30. User Experience Crucial To Success Consumer apps for the employee .. not … Business apps for the enterprise Singular function, not multiple features … feature creep is the kiss of death in a mobile app Fast cycles … eight weeks of development, fast iteration, six month lifespan, and reasonable cost High expectations … your employees are mobile experts in their personal lives. Your business app design is not competing against a desktop SAP app in their minds. It is competing against that great Twitter on Instagram app they downloaded last night which feels like it was built JUST for them.
  • 31.
  • 32. Simplify App Configuration ? Server: 1 us2439.kraymerica.com/948 Server: 2 server12.arcisionline.com/en User Name: johnsmith Password: Password •••••••• ************** License Key: Hx7h#2294aC SUBMIT SUBMIT
  • 35. Smartphones – not so secure at all
  • 37. How much do you carry around? “Businesses can no longer ignore mobility trends. Instead, they must find ways to meet their needs, while meeting strict security demands,” Anthony Foy, CEO of Workshare.
  • 38. 472% increase in Android malware in 2011
  • 40. Mobile IT requirements in the post-PC era Prevent data loss Mobilize apps and documents Preserve user experience and privacy Support mobile OS and device evolution Deploy at scale across global organizations
  • 41. MobileIron - Beyond Enterprise MDM 3 Email and Content Security (MCM) 2 Application Delivery, Security and Policy (MAM) 1 OS Management and Control (MDM)
  • 42. MobileIron offer for developers – SDK Any app can leverage AppConnect through an easy-to-use app wrapper or a simple SDK App wrapping minimizes developer time and secures apps postdevelopment The SDK can be used at any time during the development process Your own application storefront
  • 43. Benefits? Authentication: Confirm user identity through domain username and password or certificates Single sign-on: Enforce time-based app-level sign-on across secured app containers Authorization: Allow or block app usage or data storage based on device or user risk Configuration: Silently configure personalized settings such as user name, server name, and custom attributes without requiring user intervention
  • 44. More benefits Encryption: Ensure that all app data stored on the device is encrypted DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste, print, and open-in permissions, so unauthorized apps cannot access secure data Dynamic policy: Update app policies dynamically Reporting: Provide app usage statistics Selective wipe: Remotely wipe app data without touching personal data
  • 45. ..and more benefits VPN: Create app-specific VPN connection Application control: Application whitelist/blacklist Patch management: Manage application versions, force updates And more..
  • 46. Tunnel per App Traditional FIREWALL Tunnel per App VPN AppTunnel AppTunnel SENTRY AppTunnel AppTunnel
  • 48. SDK vs Wrapping Apps AppConnect SDK … Coming Soon AppConnect Wrapping
  • 49. The journey to the Mobile First enterprise Commit to Mobile First Deliver Apps & Content Adopt Devices Transformation (biz/org) New user experiences New business processes Core apps Core documents Experiments BYOD Email access Multi-OS device security Users Enterprise IT
  • 50.

Hinweis der Redaktion

  1. Mobile is where functionality of desktop collides with mobility with mobile device.
  2. Mobile drivesa fundamental shift in user behavior as revolutionary as the PC and web transitions of the past>>>60% or more of the workforce will adopt mobile as their primary business device. It will be the first place they look to do their workDeveluperi arī mainās.
  3. This shift has driven the birth of Mobile IT, which extends far beyond traditional mobile device management (MDM) and mobile application management (MAM). >>>Our customers have found that Mobile IT requires new strategies, skills, and platforms because mobile is fundamentally different than desktop computing.First, it is user-led, not company-led. This means Mobile IT mustBe flexible enough to deal with a constantly changing mobile operating system environmentBe focused on user experience first and foremostBe able to quickly leverage innovations that users bring into the company from their personal experiencesMobile IT has to be extremely agile to stay ahead of this curve.Second, it is cross-functional. Silos don’t work for Mobile IT.Management, security, and apps development are tightly intertwined.Successful Mobile IT teams either integrate these functions or effectively break down the barriers between themThird, it moves faster than any other enterprise technologyUser preference and mobile technology evolution happens at consumer speed, not enterprise speedDevice and app lifecycles are 6-12 months, not 3-5 years.Apps are small and focused, not monolithic, and are built in short iterations, not long projectsMobile IT needs to make fast decisions and provide quick turnaround.Our customers have found that these capabilities are not optional. Users will move forward even if Mobile IT can’t keep up. As Vivek Kundra, the first CIO of the United States, told us when he visited MobileIron at the beginning of this market transition in January 2011, “The more the CIO says ‘no’ the less secure the organization becomes.” Apps built outside IT – consumer apps to business app.s
  4. %Piemēri applikāciju izmantošanai.
  5. Izstrādājati, SPotify
  6. Citi ražotāji – tirgus ir pilns, ražo visi, kam nav slinkums.Cisco, juniper, checkpoint
  7. [Purpose of this slide is to understand the audience’s pain points in mobile – generate discussion around these questions to identify core needs]Mobile is how people work in the post-PC era, but mobile introduces risk, cost, and usability challenges that traditional IT strategies cannot address. Mobile IT needs the tools to speed things up, not slow things down.Our customers have five core Mobile IT requirements>>>How do I prevent data loss?Enterprise data is moving to moving to the mobile device. That means data loss prevention for both data-at-rest and data-in-motion is the foundational requirement for the security team.[ask what data is on their devices … what are they most concerned about on the data security side]>>>How do I take enterprise apps and documents mobile?This is what transforms the business – when organizations move beyond email to mobilize core business processes[ask what apps they are deploying. Is the business asking for apps? For documents?]>>>How do I preserve user experience and privacy?The biggest trap in mobile is compromising user experience for security Our customers are committed to having a great user experience AND being secure – it’s not a choiceAn additional complexity, especially in BYOD settings, is maintaining user privacy for personal data[Ask about BYOD programs. How are they thinking about privacy? What did users think of Good (if they had it)?]>>>How do I support the evolution of mobile operating systems and devices?Five years ago, BlackBerry, Symbian, Windows Mobile, and Palm made up 100% of enterprise mobility. Now all four of those operating systems have been end-of-lifedMobile technology changes faster than anything else IT has to manage.Keeping up is hard but essential … and the Mobile IT platform must support that evolution[Ask about Android … Windows Phone … Mac … how many OS do they think they will have to support?]>>>How do I scale across my global organization?Mobile scale is very difficult – devices, apps, registrations, certificates, email traffic all have to scaleMust scale through architecture, not by requiring you to spend lots of money on more hardware, software, and people[How many devices will they have? How big are their apps? How much staff is available to support mobile?]MobileIron’s focus:Secure dataMake it easy to take apps and docs mobileNever compromise the user experienceGive you the tools to keep up with mobile technologyGive you the platform to go big cost-effectively[Use these MobileIron firsts for each of the items as anecdotes:Data loss: first with DLP for iOS email, first with secure tunnel and access control for ActiveSync (Sentry)Apps and docs: first enterprise app storefront, first scalable app delivery (App Delivery Network), first complete app security platform (AppConnect / AppTunnel)User experience and privacy: first full security for native iOS email, first privacy policyOS and device evolution: first platform purpose-built for multi-OS, purpose-built for Mobile ITScale: first server to scale to 100,000 devices, first scalable app delivery, largest mobile certs deployment in the world (150K certs), first to build mobile scale testing infrastructure (TRUST)
  8. We fundamentally believe that to address the new era of mobile, one must look not simply at the device, but application, content and email. Let’s dive into the operating systems.Appconnect.