SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Understanding the Enterprise Evan Miller Mobile Solutions Manager, Enterprise Marketing Director Symbian Exposition  London  October 6, 2004
Wireless Changes How We Work
Enterprise Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Wireless ROI ,[object Object],2.  Downtime conversion into productive time: 196 hours/year/person* * 2004 Ipsos-Reid Blackberry study
Enterprise Handheld Value Stack Balanced design trade-offs between voice and data Business Apps. Browse Intranet Web Secure push Email & PIM Mobile Phone Value stack Market Size
Enterprise Wireless Handhelds: Closer to the target
How Component Selection  Impacts the Enterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Total Cost of Ownership* *Excluding operator fees Automated end user support processes Total integrated solution  (no assembly required) Reduce !
Self-Serve IT: Scaling Service without Scaling Cost ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Server/Infrastructure Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Security Architecture Requirements Application server Mobile Server Internet Mobile Network Operator Server-enforced password policy Remote erase Outbound  Connection through firewall Nothing listening in  firewall / DMZ End-to-end encryption Server  Network  Operator
Future Security Requirements (12 mos.) ,[object Object],Secure / voice-only Bluetooth ® Handheld storage encryption
Conclusion ,[object Object],[object Object],[object Object],[object Object]
 
End

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud mobile inline mobile recording
Cloud mobile inline mobile recordingCloud mobile inline mobile recording
Cloud mobile inline mobile recordingcompliantphones
 
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsKeith Harris
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentationAdvanced comm
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 
World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology
 
Modern Access Control Systems
Modern Access Control SystemsModern Access Control Systems
Modern Access Control SystemsThomas P. Johnson
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Keith Harris
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Chubb ims small resolution_print version
Chubb ims small resolution_print versionChubb ims small resolution_print version
Chubb ims small resolution_print versionmksiu
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshareAmir Einav
 
Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Videohypknight
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAlgoSec
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
F5 LTM HEALTH CHECKS
F5 LTM HEALTH CHECKSF5 LTM HEALTH CHECKS
F5 LTM HEALTH CHECKSMarco Essomba
 

Was ist angesagt? (20)

IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Cloud mobile inline mobile recording
Cloud mobile inline mobile recordingCloud mobile inline mobile recording
Cloud mobile inline mobile recording
 
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentation
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Mitel Corporate Systems Engineering
Mitel Corporate Systems EngineeringMitel Corporate Systems Engineering
Mitel Corporate Systems Engineering
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONE
 
Modern Access Control Systems
Modern Access Control SystemsModern Access Control Systems
Modern Access Control Systems
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Personal identity information protection
Personal identity information protectionPersonal identity information protection
Personal identity information protection
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus
 
Vega Impianti En 1
Vega Impianti En 1Vega Impianti En 1
Vega Impianti En 1
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Chubb ims small resolution_print version
Chubb ims small resolution_print versionChubb ims small resolution_print version
Chubb ims small resolution_print version
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
 
Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Video
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
F5 LTM HEALTH CHECKS
F5 LTM HEALTH CHECKSF5 LTM HEALTH CHECKS
F5 LTM HEALTH CHECKS
 

Andere mochten auch

Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...
Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...
Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...Elemica
 
CONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍ
CONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍCONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍ
CONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍcarme tribo berga
 
Quimisa Household 2016
Quimisa Household 2016Quimisa Household 2016
Quimisa Household 2016Neiri Bozzolo
 
Dialogue Sheets for Retrospectives (Riga)
Dialogue Sheets for Retrospectives (Riga)Dialogue Sheets for Retrospectives (Riga)
Dialogue Sheets for Retrospectives (Riga)allan kelly
 
Business Patterns presentation @ Oredev 2012
Business Patterns presentation @ Oredev 2012Business Patterns presentation @ Oredev 2012
Business Patterns presentation @ Oredev 2012allan kelly
 
8 Indian Culinary Festivals & Expos You Can't Miss in 2016!
8 Indian Culinary Festivals & Expos You Can't Miss in 2016!8 Indian Culinary Festivals & Expos You Can't Miss in 2016!
8 Indian Culinary Festivals & Expos You Can't Miss in 2016!AIMSInstitutes
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Elemica
 
Basf Household 2016-Equacionando valor e inovação
Basf   Household 2016-Equacionando valor e inovaçãoBasf   Household 2016-Equacionando valor e inovação
Basf Household 2016-Equacionando valor e inovaçãoNeiri Bozzolo
 
Introduction to WildFly Swarm #jjug
Introduction to WildFly Swarm #jjugIntroduction to WildFly Swarm #jjug
Introduction to WildFly Swarm #jjugYoshimasa Tanabe
 
Corona Extra.
Corona Extra.Corona Extra.
Corona Extra.Pony RT
 
Risk management
Risk managementRisk management
Risk managementElemica
 
Firmenich - Hipersensorialidade home care Household 2016
Firmenich - Hipersensorialidade home care Household 2016Firmenich - Hipersensorialidade home care Household 2016
Firmenich - Hipersensorialidade home care Household 2016Neiri Bozzolo
 
Чистота у бібліотеці
Чистота у бібліотеціЧистота у бібліотеці
Чистота у бібліотеціНБ МДУ
 
Запрограмуй своє навчання
Запрограмуй своє навчанняЗапрограмуй своє навчання
Запрограмуй своє навчанняНБ МДУ
 

Andere mochten auch (14)

Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...
Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...
Ignite 2015 NA - Ann-Marie Craig - "Keys to a Successful Connection: A Custom...
 
CONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍ
CONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍCONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍ
CONFERÈNCIA COM ES FA L'OLI: DE L'OLIVERA AL MOLÍ
 
Quimisa Household 2016
Quimisa Household 2016Quimisa Household 2016
Quimisa Household 2016
 
Dialogue Sheets for Retrospectives (Riga)
Dialogue Sheets for Retrospectives (Riga)Dialogue Sheets for Retrospectives (Riga)
Dialogue Sheets for Retrospectives (Riga)
 
Business Patterns presentation @ Oredev 2012
Business Patterns presentation @ Oredev 2012Business Patterns presentation @ Oredev 2012
Business Patterns presentation @ Oredev 2012
 
8 Indian Culinary Festivals & Expos You Can't Miss in 2016!
8 Indian Culinary Festivals & Expos You Can't Miss in 2016!8 Indian Culinary Festivals & Expos You Can't Miss in 2016!
8 Indian Culinary Festivals & Expos You Can't Miss in 2016!
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
 
Basf Household 2016-Equacionando valor e inovação
Basf   Household 2016-Equacionando valor e inovaçãoBasf   Household 2016-Equacionando valor e inovação
Basf Household 2016-Equacionando valor e inovação
 
Introduction to WildFly Swarm #jjug
Introduction to WildFly Swarm #jjugIntroduction to WildFly Swarm #jjug
Introduction to WildFly Swarm #jjug
 
Corona Extra.
Corona Extra.Corona Extra.
Corona Extra.
 
Risk management
Risk managementRisk management
Risk management
 
Firmenich - Hipersensorialidade home care Household 2016
Firmenich - Hipersensorialidade home care Household 2016Firmenich - Hipersensorialidade home care Household 2016
Firmenich - Hipersensorialidade home care Household 2016
 
Чистота у бібліотеці
Чистота у бібліотеціЧистота у бібліотеці
Чистота у бібліотеці
 
Запрограмуй своє навчання
Запрограмуй своє навчанняЗапрограмуй своє навчання
Запрограмуй своє навчання
 

Ähnlich wie Understanding the Enterprise

Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.Century Software, Inc.
 
Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29evancmiller
 
Leverage your business with cloud architecture
Leverage your business with cloud architectureLeverage your business with cloud architecture
Leverage your business with cloud architectureCBC Solutions.biz
 
Increase Security Observability with IBM i Machine Data
Increase Security Observability with IBM i Machine DataIncrease Security Observability with IBM i Machine Data
Increase Security Observability with IBM i Machine DataPrecisely
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueDan Mårtensson
 
SmartOffice Webinar - Technology Challenges in starting a new business!
SmartOffice Webinar - Technology Challenges in starting a new business!SmartOffice Webinar - Technology Challenges in starting a new business!
SmartOffice Webinar - Technology Challenges in starting a new business!Tata Tele Business Services
 
Cloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedCloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedAutotask
 
Why nimans... why ericsson lg cloud october 2021
Why nimans... why ericsson lg cloud october 2021Why nimans... why ericsson lg cloud october 2021
Why nimans... why ericsson lg cloud october 2021John McKindland
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtmAgora Group
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
Fort Technologies Cloud Iaa S
Fort Technologies Cloud Iaa SFort Technologies Cloud Iaa S
Fort Technologies Cloud Iaa Sjohnmuni
 
Shift into video enabled unified collaboration By Polycom
Shift into video enabled unified collaboration By PolycomShift into video enabled unified collaboration By Polycom
Shift into video enabled unified collaboration By PolycomAVI-SPL
 
Getting Smart About Hotel Security
Getting Smart About Hotel SecurityGetting Smart About Hotel Security
Getting Smart About Hotel Securitybradleyhemphill
 
Cuae Business Values V 1.8.2
Cuae   Business Values V 1.8.2Cuae   Business Values V 1.8.2
Cuae Business Values V 1.8.2Chinmoy Misra
 
Ag pres m for mobile conference 2nd march 2011
Ag pres   m for mobile conference 2nd march 2011Ag pres   m for mobile conference 2nd march 2011
Ag pres m for mobile conference 2nd march 2011Mithun Mandal
 

Ähnlich wie Understanding the Enterprise (20)

Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
 
Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29
 
Leverage your business with cloud architecture
Leverage your business with cloud architectureLeverage your business with cloud architecture
Leverage your business with cloud architecture
 
Blackberry basic training deck[1]
Blackberry basic training deck[1]Blackberry basic training deck[1]
Blackberry basic training deck[1]
 
Increase Security Observability with IBM i Machine Data
Increase Security Observability with IBM i Machine DataIncrease Security Observability with IBM i Machine Data
Increase Security Observability with IBM i Machine Data
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
SmartOffice Webinar - Technology Challenges in starting a new business!
SmartOffice Webinar - Technology Challenges in starting a new business!SmartOffice Webinar - Technology Challenges in starting a new business!
SmartOffice Webinar - Technology Challenges in starting a new business!
 
Cloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedCloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is Consumed
 
Integrated managed services
Integrated managed servicesIntegrated managed services
Integrated managed services
 
Why nimans... why ericsson lg cloud october 2021
Why nimans... why ericsson lg cloud october 2021Why nimans... why ericsson lg cloud october 2021
Why nimans... why ericsson lg cloud october 2021
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Fort Technologies Cloud Iaa S
Fort Technologies Cloud Iaa SFort Technologies Cloud Iaa S
Fort Technologies Cloud Iaa S
 
Shift into video enabled unified collaboration By Polycom
Shift into video enabled unified collaboration By PolycomShift into video enabled unified collaboration By Polycom
Shift into video enabled unified collaboration By Polycom
 
Getting Smart About Hotel Security
Getting Smart About Hotel SecurityGetting Smart About Hotel Security
Getting Smart About Hotel Security
 
Cuae Business Values V 1.8.2
Cuae   Business Values V 1.8.2Cuae   Business Values V 1.8.2
Cuae Business Values V 1.8.2
 
iZone Presentation
iZone PresentationiZone Presentation
iZone Presentation
 
Ag pres m for mobile conference 2nd march 2011
Ag pres   m for mobile conference 2nd march 2011Ag pres   m for mobile conference 2nd march 2011
Ag pres m for mobile conference 2nd march 2011
 

Understanding the Enterprise

  • 1. Understanding the Enterprise Evan Miller Mobile Solutions Manager, Enterprise Marketing Director Symbian Exposition London October 6, 2004
  • 3.
  • 4.
  • 5. Enterprise Handheld Value Stack Balanced design trade-offs between voice and data Business Apps. Browse Intranet Web Secure push Email & PIM Mobile Phone Value stack Market Size
  • 6. Enterprise Wireless Handhelds: Closer to the target
  • 7.
  • 8. IT Total Cost of Ownership* *Excluding operator fees Automated end user support processes Total integrated solution (no assembly required) Reduce !
  • 9.
  • 10.
  • 11. IT Security Architecture Requirements Application server Mobile Server Internet Mobile Network Operator Server-enforced password policy Remote erase Outbound Connection through firewall Nothing listening in firewall / DMZ End-to-end encryption Server Network Operator
  • 12.
  • 13.
  • 14.  
  • 15. End

Hinweis der Redaktion

  1. Hello, I’m Evan Miller, the Mobile Solutions Manager for TI’s IT Operations organization, and Enterprise Marketing Director for TI. TI started deploying mobile solutions including cellular data-enabled handhelds and wireless LAN enabled notebooks three years ago. Today I’m going to share the lessons we have learned to help you understand the needs of the enterprise, particularly large security-conscious enterprises.