SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Enterprise Mobile Apps: Beauty & The Beast
BYOD, Enterprise Integration, and Beautiful Mobile Apps
Chris O’Connor, CEO & Co-founder, Taptera
Matt McLarty, VP Client Solutions, Layer 7 Technologies
Housekeeping

 Questions
 - Chat any questions you have and we’ll answer them at the end of this call


                                                                   facebook.com/layer7
 Twitter
 - Today’s event hashtag:
   - #L7webinar                                                    layer7.com/linkedin

                                                                   layer7.com/blogs
 - Follow us on Twitter:
   - @Layer7
   - @Taptera
   - @MattMcLartyBC
   - @NowHearChris
“Beauty”…


Visually appealing
Highly functional
Uncluttered
Intuitive
Smooth
Personal
Beauty – The Mobile Enterprise
 Worldwide mobile trends ...
  - “By 2015, more U.S. Internet users will access the Internet through mobile devices than
    through PCs or other wireline devices.”
  - “By 2015, the world's mobile worker population will reach 1.3 billion, representing
    37.2% of the total workforce.”

 Trends driving the growth of Mobile in Enterprise IT ...
                                                                        Source: IDC (September 2011, January 2012)




  - Consumerization, BYOD
  - Verticalization
  - New devices & device categories
  - Cloud-based mobile applications
  - Emerging M2M technologies
               “Mobility is poised to become the next major IT paradigm.
    This gravitational shift will bring an array of opportunities and challenges to the
                     chief information officers in most enterprises.”
                                                                                      Source: McKinsey (June 2012)
Why “Beautiful” Apps Matter


 - Mobile devices have become personal extensions
 Better Productivity

 - BYOD enables work on one’s favourite “toy”
 - An appealing, usable, functional app further incents usage




     Personal mobile devices—tablets, smartphones—are ubiquitous
 Greater Accessibility

     New form factor brings new capabilities—geo-location, presence, photo
 -

     Truly “always-on”
 -

     Speed and consumability compel usage
 -
 -
“The Beast”…
“The Beast” – The Challenges of Mobile


   - Identity management
 Security


   - Application and data lifecycle (access → transport → storage → removal)

 Deployment complexity
   - New mobile apps
   - Integration with existing applications and systems



   - Platform fragmentation
 Technology


   - Pace of change



   - Privacy issues
 Governance
The Shedding of Tiers
                Web Application

     Presentation

     Business Logic

      Data Access

                    Relational
                    Database
The Shedding of Tiers
                Mobile Devices

     Presentation

     Business Logic

      Data Access

                    Big Data
The Shedding of Tiers
                Mobile Devices

     Presentation

     Business Logic
      Data Access

                    Big Data
The Shedding of Tiers
                 Mobile Devices

      Presentation


Business and Data Services
       Data Access

                     Big Data
The Shedding of Tiers
          Presentation
                         Mobile Devices




Business and Data Services


                           Big Data
APIs: The New Perimeter
 BYOD       Presentation
                           Mobile Devices



             API

  Business and Data Services


                             Big Data
APIs: The New Perimeter
 BYOD       Presentation
                           Mobile Devices



             API

  Business and Data Services


                             Big Data
Beauty…
Beautiful Apps Are




                     INTUITIVE
Beautiful Apps Are




                     focused
Taptera Collateral Demo
Taptera Rooms Demo
Resulting In
Taming the Beast
Layer 7 Mobile Access Gateway
 A lightweight, low-latency mobile gateway for solving critical mobile challenges in the
  following areas:
Identity: Extending Enterprise Identity to Mobile
 Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens
 Create granular access policies at user, app and device levels
 Build composite access policies combining geolocation, message content and other
  network attributes
 Simplify PKI-based certificate delivery and provisioning




                                         +
Identity: Extending Enterprise Identity to Mobile
 Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens
 Create granular access policies at user, app and device levels
 Build composite access policies combining geolocation, message content and other
  network attributes
 Simplify PKI-based certificate delivery and provisioning


                              Firewall
                                                           Mobile Devices & Apps




                                                 +
       Protected
       Resource
                                         Authorization &
                                         Resource Server
            Identity Access
             Management
Security: Mobile Application Firewalling
 Protect REST, SOAP and OData APIs against DoS and API attacks
 Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging
 Enforce FIPS 140-2 grade data privacy and integrity
 Validate data exchanges, including all JSON, XML, header and parameter content
Security: Mobile Application Firewalling
 Protect REST, SOAP and OData APIs against DoS and API attacks
 Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging
 Enforce FIPS 140-2 grade data privacy and integrity
 Validate data exchanges, including all JSON, XML, header and parameter content



                           Firewall                 Mobile Devices & Apps




                                                                            Hacker


                                                         Protect against
                                                        attacks: DOS, SQL
                                                        Injection, XSS, …
            Enterprise
            Resources
Adaptation: Translate & Orchestrate Data & APIs
 Surface any legacy application or database as RESTful APIs
 Quickly map between data formats such as XML and JSON
 Recompose & virtualize APIs to specific mobile identities, apps and devices
 Orchestrate API mashups with configurable workflow
Adaptation: Translate & Orchestrate Data & APIs
 Surface any legacy application or database as RESTful APIs
 Quickly map between data formats such as XML and JSON
 Recompose & virtualize APIs to specific mobile identities, apps and devices
 Orchestrate API mashups with configurable workflow

                                   Firewall


                                                         Mobile Devices & Apps




           Legacy Enterprise
        Applications & Databases
Optimization: Handle Scale
 Cache calls to backend applications
 Recompose small backend calls into efficiently aggregated mobile requests
 Compress traffic to minimize bandwidth costs and improve user experience
 Pre-fetch content for hypermedia-based API calls
Optimization: Handle Scale
 Cache calls to backend applications
 Recompose small backend calls into efficiently aggregated mobile requests
 Compress traffic to minimize bandwidth costs and improve user experience
 Pre-fetch content for hypermedia-based API calls

                                 Firewall


                                                         Mobile Devices & Apps




              Enterprise
             Applications
Integration: Centralize Cloud Connectivity
 Proxy and manage app interactions with social networks
 Broker call-outs to cloud services like Salesforce.com
 Bridge connectivity to iPhone, Windows and Android notification services
 Integrate with legacy applications using ESB capabilities
Integration: Centralize Cloud Connectivity
 Proxy and manage app interactions with social networks
 Broker call-outs to cloud services like Salesforce.com
 Bridge connectivity to iPhone, Windows and Android notification services
 Integrate with legacy applications using ESB capabilities

                                   Firewall
                                                                Cloud Services
                                                               & Social Networks




              On-Premise
         Enterprise Applications               End User
Summary
 BYOD and Mobility are sweeping Enterprise IT
 Beautiful Apps will lead to greater productivity
 Taptera’s enterprise apps are fast, beautiful and secure

 Simplifying mobile access to the enterprise helps to keep apps beautiful
 The Layer 7 Mobile Access Gateway solves key needs:
 - Identity
 - Security
 - Adaptation
 - Optimization
 - Integration
Q&A




      Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSO
WSO2
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
UC San Diego
 

Was ist angesagt? (20)

Offline Data Access in Enterprise Mobility
Offline Data Access in Enterprise MobilityOffline Data Access in Enterprise Mobility
Offline Data Access in Enterprise Mobility
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Optimizing mobile apps and websites
Optimizing mobile apps and websitesOptimizing mobile apps and websites
Optimizing mobile apps and websites
 
Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSO
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not Repressive
 
When Mobile (Android) met Cloud
When Mobile (Android) met CloudWhen Mobile (Android) met Cloud
When Mobile (Android) met Cloud
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
IBM Worklight - Introduction
IBM Worklight - IntroductionIBM Worklight - Introduction
IBM Worklight - Introduction
 
Enterprise Application Distribution Technical White Paper[1]
Enterprise Application Distribution   Technical White Paper[1]Enterprise Application Distribution   Technical White Paper[1]
Enterprise Application Distribution Technical White Paper[1]
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 

Andere mochten auch (7)

Seth Edwards on MongoDB
Seth Edwards on MongoDBSeth Edwards on MongoDB
Seth Edwards on MongoDB
 
Famous spanish people in sports by mario garcia
Famous spanish people in sports by mario garciaFamous spanish people in sports by mario garcia
Famous spanish people in sports by mario garcia
 
1993 Doubles Features Film Can Set
1993 Doubles Features   Film Can Set1993 Doubles Features   Film Can Set
1993 Doubles Features Film Can Set
 
Office Of Substance Abuse Prevention2
Office Of Substance Abuse Prevention2Office Of Substance Abuse Prevention2
Office Of Substance Abuse Prevention2
 
Noboxing plugin
Noboxing pluginNoboxing plugin
Noboxing plugin
 
Gartenkunst china (2)
Gartenkunst china (2)Gartenkunst china (2)
Gartenkunst china (2)
 
5 things cucumber is bad at by Richard Lawrence
5 things cucumber is bad at by Richard Lawrence5 things cucumber is bad at by Richard Lawrence
5 things cucumber is bad at by Richard Lawrence
 

Ähnlich wie BYOD Enterprise Mobility: Beauty & the Beast

Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Dirk Nicol
 
Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08
niklaus
 
Software panel
Software panelSoftware panel
Software panel
MassTLC
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
Leigh Williamson
 

Ähnlich wie BYOD Enterprise Mobility: Beauty & the Beast (20)

Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Why WSO2 for Digital Transformation
Why WSO2 for Digital TransformationWhy WSO2 for Digital Transformation
Why WSO2 for Digital Transformation
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
 
Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08Technology Vision 2008 at ICCG HD08
Technology Vision 2008 at ICCG HD08
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online Learning
 
Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?Interactive Mobile Applications in the Enterprise: Are You Ready?
Interactive Mobile Applications in the Enterprise: Are You Ready?
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdc
 
HTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level DesignHTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level Design
 
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
Mobile Apps, Embedded Apps...and IoT - session from Data Driven Summit 2014
 
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
(SPOT205) State of the Union: AWS Mobile Services and New World of Connected ...
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
Red Hat Mobile
Red Hat MobileRed Hat Mobile
Red Hat Mobile
 
Informix SQL & NoSQL -- for Chat with the labs on 4/22
Informix SQL & NoSQL -- for Chat with the labs on 4/22Informix SQL & NoSQL -- for Chat with the labs on 4/22
Informix SQL & NoSQL -- for Chat with the labs on 4/22
 
Software panel
Software panelSoftware panel
Software panel
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Web 2.0 e RIAs
Web 2.0 e RIAsWeb 2.0 e RIAs
Web 2.0 e RIAs
 
Hematian seminar grid
Hematian seminar gridHematian seminar grid
Hematian seminar grid
 
Visible Market FinTech Demo 07182012
Visible Market FinTech Demo 07182012Visible Market FinTech Demo 07182012
Visible Market FinTech Demo 07182012
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 

Mehr von CA API Management

5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
CA API Management
 

Mehr von CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

BYOD Enterprise Mobility: Beauty & the Beast

  • 1. Enterprise Mobile Apps: Beauty & The Beast BYOD, Enterprise Integration, and Beautiful Mobile Apps Chris O’Connor, CEO & Co-founder, Taptera Matt McLarty, VP Client Solutions, Layer 7 Technologies
  • 2. Housekeeping  Questions - Chat any questions you have and we’ll answer them at the end of this call facebook.com/layer7  Twitter - Today’s event hashtag: - #L7webinar layer7.com/linkedin layer7.com/blogs - Follow us on Twitter: - @Layer7 - @Taptera - @MattMcLartyBC - @NowHearChris
  • 4. Beauty – The Mobile Enterprise  Worldwide mobile trends ... - “By 2015, more U.S. Internet users will access the Internet through mobile devices than through PCs or other wireline devices.” - “By 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the total workforce.”  Trends driving the growth of Mobile in Enterprise IT ... Source: IDC (September 2011, January 2012) - Consumerization, BYOD - Verticalization - New devices & device categories - Cloud-based mobile applications - Emerging M2M technologies “Mobility is poised to become the next major IT paradigm. This gravitational shift will bring an array of opportunities and challenges to the chief information officers in most enterprises.” Source: McKinsey (June 2012)
  • 5. Why “Beautiful” Apps Matter - Mobile devices have become personal extensions  Better Productivity - BYOD enables work on one’s favourite “toy” - An appealing, usable, functional app further incents usage Personal mobile devices—tablets, smartphones—are ubiquitous  Greater Accessibility New form factor brings new capabilities—geo-location, presence, photo - Truly “always-on” - Speed and consumability compel usage - -
  • 7. “The Beast” – The Challenges of Mobile - Identity management Security - Application and data lifecycle (access → transport → storage → removal) Deployment complexity - New mobile apps - Integration with existing applications and systems - Platform fragmentation Technology - Pace of change - Privacy issues Governance
  • 8. The Shedding of Tiers Web Application Presentation Business Logic Data Access Relational Database
  • 9. The Shedding of Tiers Mobile Devices Presentation Business Logic Data Access Big Data
  • 10. The Shedding of Tiers Mobile Devices Presentation Business Logic Data Access Big Data
  • 11. The Shedding of Tiers Mobile Devices Presentation Business and Data Services Data Access Big Data
  • 12. The Shedding of Tiers Presentation Mobile Devices Business and Data Services Big Data
  • 13. APIs: The New Perimeter BYOD Presentation Mobile Devices API Business and Data Services Big Data
  • 14. APIs: The New Perimeter BYOD Presentation Mobile Devices API Business and Data Services Big Data
  • 16. Beautiful Apps Are INTUITIVE
  • 22. Layer 7 Mobile Access Gateway  A lightweight, low-latency mobile gateway for solving critical mobile challenges in the following areas:
  • 23. Identity: Extending Enterprise Identity to Mobile  Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens  Create granular access policies at user, app and device levels  Build composite access policies combining geolocation, message content and other network attributes  Simplify PKI-based certificate delivery and provisioning +
  • 24. Identity: Extending Enterprise Identity to Mobile  Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens  Create granular access policies at user, app and device levels  Build composite access policies combining geolocation, message content and other network attributes  Simplify PKI-based certificate delivery and provisioning Firewall Mobile Devices & Apps + Protected Resource Authorization & Resource Server Identity Access Management
  • 25. Security: Mobile Application Firewalling  Protect REST, SOAP and OData APIs against DoS and API attacks  Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging  Enforce FIPS 140-2 grade data privacy and integrity  Validate data exchanges, including all JSON, XML, header and parameter content
  • 26. Security: Mobile Application Firewalling  Protect REST, SOAP and OData APIs against DoS and API attacks  Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging  Enforce FIPS 140-2 grade data privacy and integrity  Validate data exchanges, including all JSON, XML, header and parameter content Firewall Mobile Devices & Apps Hacker Protect against attacks: DOS, SQL Injection, XSS, … Enterprise Resources
  • 27. Adaptation: Translate & Orchestrate Data & APIs  Surface any legacy application or database as RESTful APIs  Quickly map between data formats such as XML and JSON  Recompose & virtualize APIs to specific mobile identities, apps and devices  Orchestrate API mashups with configurable workflow
  • 28. Adaptation: Translate & Orchestrate Data & APIs  Surface any legacy application or database as RESTful APIs  Quickly map between data formats such as XML and JSON  Recompose & virtualize APIs to specific mobile identities, apps and devices  Orchestrate API mashups with configurable workflow Firewall Mobile Devices & Apps Legacy Enterprise Applications & Databases
  • 29. Optimization: Handle Scale  Cache calls to backend applications  Recompose small backend calls into efficiently aggregated mobile requests  Compress traffic to minimize bandwidth costs and improve user experience  Pre-fetch content for hypermedia-based API calls
  • 30. Optimization: Handle Scale  Cache calls to backend applications  Recompose small backend calls into efficiently aggregated mobile requests  Compress traffic to minimize bandwidth costs and improve user experience  Pre-fetch content for hypermedia-based API calls Firewall Mobile Devices & Apps Enterprise Applications
  • 31. Integration: Centralize Cloud Connectivity  Proxy and manage app interactions with social networks  Broker call-outs to cloud services like Salesforce.com  Bridge connectivity to iPhone, Windows and Android notification services  Integrate with legacy applications using ESB capabilities
  • 32. Integration: Centralize Cloud Connectivity  Proxy and manage app interactions with social networks  Broker call-outs to cloud services like Salesforce.com  Bridge connectivity to iPhone, Windows and Android notification services  Integrate with legacy applications using ESB capabilities Firewall Cloud Services & Social Networks On-Premise Enterprise Applications End User
  • 33. Summary  BYOD and Mobility are sweeping Enterprise IT  Beautiful Apps will lead to greater productivity  Taptera’s enterprise apps are fast, beautiful and secure  Simplifying mobile access to the enterprise helps to keep apps beautiful  The Layer 7 Mobile Access Gateway solves key needs: - Identity - Security - Adaptation - Optimization - Integration
  • 34. Q&A Questions?