Upload
devconfu
View
167
Download
1
Tags:
Embed Size (px)
Citation preview
Partners:
Kaspars PētersonsAccount Manager Baltic’s
14.11.2013
Bring Your Own Device? More like Bring your Own Problems
headtechnology Group
Company business card
Founded in 2000, Germany and now covering 33 countries worldwide with 12 regional officesCore business – IT SecurityOffices in Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kazahstan, Ekaterinburg, Minsk, Baku, Almaty, SofiaMore than 80 employeesMore than 25 vendors in portfolioOfficial distributor (for many cases exclusive) in Eastern Europe and Asia for number of products/solutions/vendorsParticipant of many IT exhibitions, road shows, business forums, ENISA IT Security Awareness programm – local IT Security evangelist.
Content
History lesson
Where are we now?
It`s all about apps
Security perspective
How can we help?
My business card
Kaspars PētersonsRiga, LatviaIT Security Distribution business in Baltics3+ years experienceAnd more..
Tech/Gadgets/Toys
Björk – adopting technology
«And when you see the show or play with the apps, most people so far have commented on how cut-the-crap it is and simple. It just looks complicated on paper.»
/Björk/
History lesson
PHONE Elisha Gray & Alexander Granham Bell
Let`s go back in time
2013Xperia Z UltraSONY
ENIAC COMPUTERJohn Mauchlu & John Presper Eckert
December 2013Mac ProApple
WORLD WIDE WEB Sir Tim Berners - Lee
WORLD WIDE WEB 2,405,518,376 users in 2012
BARCODENorman Joseph Woodland & Bernard Silver
1994QR CODEDENSO WAVE
Leap in history
Where are we now?
PC era Mobile era
21st centrury – Mobile centrury
From desktop to mobile
Mobile IT
We are at point where functionality of desktop collides with mobility of mobile device.
What do local companies say?
• Up to 60% of new phone buyers choose smartphones;• Most bought smartphones at the moment – iPhone5, iPhone4S and Samsung
Galaxy S4;• In our network there are 150 000+ smartphone users.
Jānis Vēvers, LMT
• We predict that in 2014 the internet on mobile devices will be over 100 Mb p/s;• On year 2015 from all sold mobile phones 75% will be smartphones;• All-in-one plans and solutions will be the dominating choice for buyers.
Valdis Vancovičs, Tele2
Challanges
M - the need for mobility O - the need to improve operations B - the need to break business barriers I - the need to improve information quality L - the need to decrease transaction lag E - the need to improve efficiency
Mobile drives a fundamental shift in behavior
Desktop as primary Mobile as primary
Salesforce
Task workers
Knowledge workers
Industry-specific roles
What is Mobile IT?
Mobile IT requires new strategies, skills, and platforms because mobile is fundamentally different than desktop computing
Management, security, and apps development are tightly intertwined.
Device and app lifecycles are 6-12 months, not 3-5 years.
The birth of Mobile IT
ITMobile
2-3x as many employees using mobile
Devices not Windows-based
>50% owned by employees
>50 apps per device
Most mobile apps built outside IT
Constant OS migration
Mobility redefines business practices
Black or white? Smart ones choose colour!
Forbidding apps on a device is not an option
“The more the CIO says no, the less secure the organization becomes.”
My experience - 3 types of CIO`s
NO NO`s – declines mobile technology in their infrastructure due to security and/or financial reasons.
Providers – provides business with minimal needs (such as e-mail), doesn`t iniciate any other use of devices.
GO GO`s – shows strong iniciative to business, recommends new and innovative ways how mobile IT can support business.
If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.
/Richard A. Clarke/
It`s all about apps
Mobile Apps: The Role of IT
API accessibility to Corporate Data & Developer Security
Consumer-Grade App Discovery Experience
Global Delivery & Integration with Other Services
Easy-Configuration For Users
User Experience, Developer Sourcing & Timelines
App & Data Security
User Experience Crucial To Success
Consumer apps for the employee.. not …
Business apps for the enterpriseSingular function, not multiple features … feature creep is the kiss of death in a mobile app
Fast cycles … eight weeks of development, fast iteration, six month lifespan, and reasonable cost
High expectations … your employees are mobile experts in their personal lives. Your business app design is not competing against a desktop SAP app in their minds. It is competing against that great Twitter on Instagram app they downloaded last night which feels like it was built JUST for them.
Simplify App Configuration
SUBMIT
SUBMIT
Server: 1
Server: 2
User Name:
Password:
License Key:
Password
? us2439.kraymerica.com/948
••••••••
server12.arcisionline.com/en
johnsmith
**************
Hx7h#2294aC
Security perspective
Reality check
Smartphones – not so secure at all
Hacked?
How much do you carry around?
“Businesses can no longer ignore mobility trends. Instead, they must find ways to meet their needs, while meeting strict security
demands,” Anthony Foy, CEO of Workshare.
472% increase in Android malware in 2011
Everyone does MDM
Mobile IT requirements in the post-PC era
Mobilize apps and documents
Support mobile OS and device evolution
Deploy at scale across global organizations
Prevent data loss
Preserve user experience and privacy
Email and Content Security (MCM)3
Application Delivery, Security and Policy (MAM)2
OS Management and Control (MDM) 1
MobileIron - Beyond Enterprise MDM
MobileIron offer for developers – SDK
Any app can leverage AppConnect through an easy-to-use app wrapper or a simple SDK
App wrapping minimizes developer time and secures apps post-development
The SDK can be used at any time during the development process
Your own application storefront
Benefits?
Authentication: Confirm user identity through domain username and password or certificates
Single sign-on: Enforce time-based app-level sign-on across secured app containers
Authorization: Allow or block app usage or data storage based on device or user risk
Configuration: Silently configure personalized settings such as user name, server name, and custom attributes without requiring user intervention
More benefits
Encryption: Ensure that all app data stored on the device is encrypted
DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste, print, and open-in permissions, so unauthorized apps cannot access secure data
Dynamic policy: Update app policies dynamically
Reporting: Provide app usage statistics
Selective wipe: Remotely wipe app data without touching personal data
..and more benefits
VPN: Create app-specific VPN connection
Application control: Application whitelist/blacklist
Patch management: Manage application versions, force updates
And more..
Tunnel per App
FIR
EW
ALL
Tunnel per App
VPN
AppTunnel
AppTunnel
AppTunnel
AppTunnel
Traditional
SE
NT
RY
AppConnect DLP Policy Control
SDK vs Wrapping Apps
AppConnectWrapping
AppConnectSDK
… Coming Soon
The journey to the Mobile First enterprise
Adopt Devices
BYOD
Email access
Multi-OS device security
Deliver Apps & Content
Core apps
Core documents
Experiments
Commit toMobile First
Transformation (biz/org)
New user experiences
New business processes
Users Enterprise IT
Feedback
Partners: