SlideShare a Scribd company logo
1 of 21
 Tablets are hitting the enterprise in force
iPad: 35M in 2011 → 55M+ in 2012
Android: 20M in 2011 → 45M+ in 2012
Source: DroidMatters & Digitimes
 People bring them to work because they are…
Productivity-enhancing
Portable
Trendy
 Consumerization of IT
Unstoppable influx of personal
and unmanaged devices
IT must act…
The BYOD Revolution
BYOD Moves to the Forefront
Corporate Issued
• PCs
• Laptops
• Mobile phones
Personal
• Tablets (iPad, Android, etc.)
• Smart Phones (iPhone, Android, etc.)
• Laptops (Mac, etc.)
• Home PCs
What Do We Want From BYOD?
 Enable employees to use personal devices
to conduct business
 Enable IT to address mobility in a manner
that is secure and cost-effective
BYOD Challenges
Security
• Every user is a potential hole in the corporate network
• Each device can and will accumulate corporate data
• Increased risk of data leakage is inherent to BYOD
App Support
• Enabling mobile access for email is relatively easy
• Mobilizing select applications is feasible
• Supporting all applications remains a challenge
Device Support
• Each employee has a preferred platform and OS
• BYOD means tablets, smart phones, laptops and PCs
• Corporate use must not interfere with personal use
Time & Cost
• BYOD must scale to support all users and applications
• Common BYOD approaches are resource-intensive
Common Approaches to BYOD
 Native enterprise apps…
- or -
published apps and desktops?
BYOD
Native Enterprise Apps
 Apps purpose-built for mobile
devices and download by users
from an enterprise app store
 Devices and apps are managed
and secured using VPN, MDM and
other solutions
Published Apps & Desktops
 Traditional enterprise apps run in
a centralized and/or virtual
computing enviroment
 Apps and data remain safe in the
data center and are accessed over
the network from mobile devices
Native Enterprise Applications
Developing or purchasing native
apps is just the tip of the iceberg…
User Training
Productivity
Vs.
Security
App Servers
VPNs
Enterprise App
Stores
Mobile Device
Management
Security
Limitations of Native Enterprise Apps
Security
• Allows devices on the network and data on devices
• VPN just a secure pipe, MDM just a management tool
• Unable to secure data at the application level
App Support
• Requires the purchase or development of native apps
• Most enterprises run hundreds or thousands of apps
• Native apps enterprise-wide is an impractical approach
Device Support
• Not all apps available on all platforms
• Not all users choose the same platform
• Supporting permutations is resource intensive
Time & Cost
• Purchase or development of apps enterprise-wide
• Scaling server infrastructure, VPNs and MDM
• Deployment, management and support costs
Published Apps & Desktops
 Citrix supports personal mobile
devices including tablets, smart
phones, laptops and PCs
 Citrix supports most all apps
and prevents data leakage
However…
 Citrix is rarely supported
for every user and every
application…
And there’s a reason.
Limitations of Citrix Approach
Security
• Fundamentally sound approach
• Apps reside in the data center and accessed remotely
• Data does not leave the corporate network
App Support
• Delivers any application running in virtual environment
• Cost of scaling and virtualizing all apps is prohibitive
• Not ideal for applications running on physical desktops
Device Support
• Fundamentally sound approach
• Receiver supports mobile devices, laptops and PCs
Time & Cost
• Citrix/published apps rarely deployed enterprise-wide
• Centralized computing and virtualization is expensive
• Managing Citrix/published apps is more expensive
A Smarter, More Scalable Approach to BYOD
Virtual Desktops &
Terminal
Services
Physical
Desktops
Office
Securely
connect
to office
desktops
from any
device,
anywhere.
Desktop DeliveryRemote
Tablets
Smart Phones
PCs
Laptops
 Enterprise-class, appliance-based remote desktop for BYOD that’s
simple, scalable and secure
Office Desktop
Windows Desktop
Remote
Any Platform
(iPad, iPhone, Android, Windows, Mac)
DesktopDirect Demonstration
The DesktopDirect Advantage
Security
• Not a VPN – personal devices kept “off the network”
• Data never leaves the corporate network
• Extends security already established on office PCs
App Support
• All apps on office PCs available on personal devices
• Employees can work from anywhere as if in the office
• Eliminates need for duplicate app environments
Device Support
• Supports any mobile platform without IT intervention
• Does not interfere with function of personal devices
• Supports PCs and laptops in addition to mobile devices
Time & Cost
• Leverages existing infrastructure
• Less expensive than native apps VPN, MDM or Citrix
• Rapid ROI solution deployed in weeks and not months
BYOD Case Study: Needham Bank
 Customer-owned community bank
5 locations
Over $1B in assets
 48X increase in mobile devices since 2007
Needed to quickly and cost-effectively provide access to
range of bank applications from tablets without the
risk of data leakage
Selected DesktopDirect with advanced client package
 DesktopDirect impact on iPad access
11X unique users
120X total hours spent
10X time per user
No security issues, no additional IT staff required
BYOD Case Study: Buckingham Research Group
 Institutional research and brokerage firm
Founded in 1982, based in New York
 Why the need for BYOD?
Employees bringing personal iPads to the office and
wanted access to corporate applications
Field employees wanted to use iPads instead
of laptops
 DesktopDirect impact on BYOD strategy
No user learning curve, no new passwords
$30K HW install vs. $300K SW upgrade
3 week installation vs. 8 month project
One HA pair and one DR unit, that’s it!
BYOD Case Study: Central Ohio Primary Care
 Ohio’s largest physician-owned cooperative
Over 50 physician offices and
over 200 physicians
 Healthcare mobility requirements
BYOD strategy that provides physicians with
flexibility while also addressing IT requirements
for security, manageability and cost
 Benefits for physicians and IT
Renew prescriptions anytime, anywhere
and move seamlessly between exam
rooms using iPads
Reduces cost and complexity
while improving productivity
and compliance
Appliance-Based Remote Desktop Access
Scalable Appliance Options
SPX1800
Up to 100 Concurrent Users
SPX2800
Up to 1,200 Concurrent Users
SPX4800
Up to 6,000 Concurrent Users
SPX5800
Up to 12,000 Concurrent Users
 Security
128-bit/256-bit key exchange and 1024/2048-bit encryption
Integration with AD, LDAP and RADIUS and two-factor authentication including RSA
SecurID, Vasco, Swivel and SSL certificates
Redirection control, enable-disable clipboard and printing
Device-based identification, register and enable-disable devices per user
 Array Registration Technology (ART)
Physical or virtual desktops may be registered by the administrator manually or via a
database or by end-users for scalability and simplified deployment
 Power Management
Wake-on-LAN (WoL) technology allows users to remotely power up desktops
 Mobile-Device Gesture Suite
Comprehensive suite of iOS and Android gesture controls for manipulating Windows
applications within mobile environments
Advanced BYOD Feature Set
DesktopDirect BYOD Summary
Security
• Personal devices kept “off the network”
• Data never leaves the corporate network
• Extends security already established on office PCs
App Support
• All apps on office PCs available on personal devices
• Employees can work from anywhere as if in the office
• Eliminates need for duplicate app environments
Device Support
• Supports any mobile platform without IT intervention
• Does not interfere with function of personal devices
• Supports PCs and laptops in addition to mobile devices
Time & Cost
• Leverages existing infrastructure
• Less expensive than native apps VPN, MDM or Citrix
• Rapid ROI solution deployed in weeks and not months
 Bring Your Own Device - DesktopDirect by Array Networks

More Related Content

What's hot

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 

What's hot (20)

Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Wp byod
Wp byodWp byod
Wp byod
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User Computing
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 

Viewers also liked

Props, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography PlansProps, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography Plans
brookepatrick
 

Viewers also liked (9)

PID test - Quality Assurance to PV Modules
PID test - Quality Assurance to PV ModulesPID test - Quality Assurance to PV Modules
PID test - Quality Assurance to PV Modules
 
Clustering in continuïteit en contrast
Clustering in continuïteit en contrastClustering in continuïteit en contrast
Clustering in continuïteit en contrast
 
Channalging Cases in AHF Hypoperfusion
Channalging Cases in AHF HypoperfusionChannalging Cases in AHF Hypoperfusion
Channalging Cases in AHF Hypoperfusion
 
أحاديث قدسية
أحاديث قدسيةأحاديث قدسية
أحاديث قدسية
 
Introduction to management
Introduction to managementIntroduction to management
Introduction to management
 
Company Profile Finint
Company Profile FinintCompany Profile Finint
Company Profile Finint
 
Ruimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
Ruimte bieden voor beweging - aardbevingsveilig bouwen in GroningenRuimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
Ruimte bieden voor beweging - aardbevingsveilig bouwen in Groningen
 
Props, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography PlansProps, Costume, Equipment and Filming/ Photography Plans
Props, Costume, Equipment and Filming/ Photography Plans
 
Pulmonary congestion
Pulmonary congestionPulmonary congestion
Pulmonary congestion
 

Similar to Bring Your Own Device - DesktopDirect by Array Networks

Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
Pete Valentine
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Nordic Infrastructure Conference
 

Similar to Bring Your Own Device - DesktopDirect by Array Networks (20)

Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddag
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Bring Your Own Device - DesktopDirect by Array Networks

  • 1.
  • 2.  Tablets are hitting the enterprise in force iPad: 35M in 2011 → 55M+ in 2012 Android: 20M in 2011 → 45M+ in 2012 Source: DroidMatters & Digitimes  People bring them to work because they are… Productivity-enhancing Portable Trendy  Consumerization of IT Unstoppable influx of personal and unmanaged devices IT must act… The BYOD Revolution
  • 3. BYOD Moves to the Forefront Corporate Issued • PCs • Laptops • Mobile phones Personal • Tablets (iPad, Android, etc.) • Smart Phones (iPhone, Android, etc.) • Laptops (Mac, etc.) • Home PCs
  • 4. What Do We Want From BYOD?  Enable employees to use personal devices to conduct business  Enable IT to address mobility in a manner that is secure and cost-effective
  • 5. BYOD Challenges Security • Every user is a potential hole in the corporate network • Each device can and will accumulate corporate data • Increased risk of data leakage is inherent to BYOD App Support • Enabling mobile access for email is relatively easy • Mobilizing select applications is feasible • Supporting all applications remains a challenge Device Support • Each employee has a preferred platform and OS • BYOD means tablets, smart phones, laptops and PCs • Corporate use must not interfere with personal use Time & Cost • BYOD must scale to support all users and applications • Common BYOD approaches are resource-intensive
  • 6. Common Approaches to BYOD  Native enterprise apps… - or - published apps and desktops? BYOD Native Enterprise Apps  Apps purpose-built for mobile devices and download by users from an enterprise app store  Devices and apps are managed and secured using VPN, MDM and other solutions Published Apps & Desktops  Traditional enterprise apps run in a centralized and/or virtual computing enviroment  Apps and data remain safe in the data center and are accessed over the network from mobile devices
  • 7. Native Enterprise Applications Developing or purchasing native apps is just the tip of the iceberg… User Training Productivity Vs. Security App Servers VPNs Enterprise App Stores Mobile Device Management Security
  • 8. Limitations of Native Enterprise Apps Security • Allows devices on the network and data on devices • VPN just a secure pipe, MDM just a management tool • Unable to secure data at the application level App Support • Requires the purchase or development of native apps • Most enterprises run hundreds or thousands of apps • Native apps enterprise-wide is an impractical approach Device Support • Not all apps available on all platforms • Not all users choose the same platform • Supporting permutations is resource intensive Time & Cost • Purchase or development of apps enterprise-wide • Scaling server infrastructure, VPNs and MDM • Deployment, management and support costs
  • 9. Published Apps & Desktops  Citrix supports personal mobile devices including tablets, smart phones, laptops and PCs  Citrix supports most all apps and prevents data leakage However…  Citrix is rarely supported for every user and every application… And there’s a reason.
  • 10. Limitations of Citrix Approach Security • Fundamentally sound approach • Apps reside in the data center and accessed remotely • Data does not leave the corporate network App Support • Delivers any application running in virtual environment • Cost of scaling and virtualizing all apps is prohibitive • Not ideal for applications running on physical desktops Device Support • Fundamentally sound approach • Receiver supports mobile devices, laptops and PCs Time & Cost • Citrix/published apps rarely deployed enterprise-wide • Centralized computing and virtualization is expensive • Managing Citrix/published apps is more expensive
  • 11. A Smarter, More Scalable Approach to BYOD Virtual Desktops & Terminal Services Physical Desktops Office Securely connect to office desktops from any device, anywhere. Desktop DeliveryRemote Tablets Smart Phones PCs Laptops
  • 12.  Enterprise-class, appliance-based remote desktop for BYOD that’s simple, scalable and secure Office Desktop Windows Desktop Remote Any Platform (iPad, iPhone, Android, Windows, Mac) DesktopDirect Demonstration
  • 13. The DesktopDirect Advantage Security • Not a VPN – personal devices kept “off the network” • Data never leaves the corporate network • Extends security already established on office PCs App Support • All apps on office PCs available on personal devices • Employees can work from anywhere as if in the office • Eliminates need for duplicate app environments Device Support • Supports any mobile platform without IT intervention • Does not interfere with function of personal devices • Supports PCs and laptops in addition to mobile devices Time & Cost • Leverages existing infrastructure • Less expensive than native apps VPN, MDM or Citrix • Rapid ROI solution deployed in weeks and not months
  • 14. BYOD Case Study: Needham Bank  Customer-owned community bank 5 locations Over $1B in assets  48X increase in mobile devices since 2007 Needed to quickly and cost-effectively provide access to range of bank applications from tablets without the risk of data leakage Selected DesktopDirect with advanced client package  DesktopDirect impact on iPad access 11X unique users 120X total hours spent 10X time per user No security issues, no additional IT staff required
  • 15. BYOD Case Study: Buckingham Research Group  Institutional research and brokerage firm Founded in 1982, based in New York  Why the need for BYOD? Employees bringing personal iPads to the office and wanted access to corporate applications Field employees wanted to use iPads instead of laptops  DesktopDirect impact on BYOD strategy No user learning curve, no new passwords $30K HW install vs. $300K SW upgrade 3 week installation vs. 8 month project One HA pair and one DR unit, that’s it!
  • 16. BYOD Case Study: Central Ohio Primary Care  Ohio’s largest physician-owned cooperative Over 50 physician offices and over 200 physicians  Healthcare mobility requirements BYOD strategy that provides physicians with flexibility while also addressing IT requirements for security, manageability and cost  Benefits for physicians and IT Renew prescriptions anytime, anywhere and move seamlessly between exam rooms using iPads Reduces cost and complexity while improving productivity and compliance
  • 18. Scalable Appliance Options SPX1800 Up to 100 Concurrent Users SPX2800 Up to 1,200 Concurrent Users SPX4800 Up to 6,000 Concurrent Users SPX5800 Up to 12,000 Concurrent Users
  • 19.  Security 128-bit/256-bit key exchange and 1024/2048-bit encryption Integration with AD, LDAP and RADIUS and two-factor authentication including RSA SecurID, Vasco, Swivel and SSL certificates Redirection control, enable-disable clipboard and printing Device-based identification, register and enable-disable devices per user  Array Registration Technology (ART) Physical or virtual desktops may be registered by the administrator manually or via a database or by end-users for scalability and simplified deployment  Power Management Wake-on-LAN (WoL) technology allows users to remotely power up desktops  Mobile-Device Gesture Suite Comprehensive suite of iOS and Android gesture controls for manipulating Windows applications within mobile environments Advanced BYOD Feature Set
  • 20. DesktopDirect BYOD Summary Security • Personal devices kept “off the network” • Data never leaves the corporate network • Extends security already established on office PCs App Support • All apps on office PCs available on personal devices • Employees can work from anywhere as if in the office • Eliminates need for duplicate app environments Device Support • Supports any mobile platform without IT intervention • Does not interfere with function of personal devices • Supports PCs and laptops in addition to mobile devices Time & Cost • Leverages existing infrastructure • Less expensive than native apps VPN, MDM or Citrix • Rapid ROI solution deployed in weeks and not months