Partners:
Bring Your Own Device? More like Bring your Own Problems
Kaspars Pētersons
Account Manager Baltic’s

14.11.2013
headtechnology Group
Company business card
Founded in 2000, Germany and now covering 33 countries
worldwide with 12 regional offices
Core busin...
Content
History lesson
Where are we now?
It`s all about apps
Security perspective

How can we help?
My business card

Kaspars Pētersons
Riga, Latvia
IT Security Distribution business in Baltics
3+ years experience
And more...
Tech/Gadgets/Toys
Björk – adopting technology

«And when you see the show or play with the apps, most people so far have
commented on how cu...
History lesson
Let`s go back in time
PHONE
Elisha Gray & Alexander Granham Bell

2013
Xperia Z Ultra
SONY
ENIAC COMPUTER
John Mauchlu & John Presper Eckert

December 2013
Mac Pro
Apple
WORLD WIDE WEB
Sir Tim Berners - Lee

WORLD WIDE WEB
2,405,518,376 users in 2012
BARCODE
Norman Joseph Woodland & Bernard Silver

1994
QR CODE
DENSO WAVE
Leap in history
Where are we now?
21st centrury – Mobile centrury

PC era

Mobile era
From desktop to mobile

We are at point where
functionality of desktop collides
with mobility of mobile device.

Mobile IT
What do local companies say?

• Up to 60% of new phone buyers choose smartphones;
• Most bought smartphones at the moment ...
Challanges

M - the need for mobility
O - the need to improve operations
B - the need to break business barriers
I - the n...
Mobile drives a fundamental shift in behavior
Desktop as primary

Salesforce

Task workers

Knowledge workers

Industry-sp...
What is Mobile IT?
Mobile IT requires new strategies, skills, and platforms because
mobile is fundamentally different than...
The birth of Mobile IT

2-3x as many employees using mobile
Devices not Windows-based
Mobile

>50% owned by employees
>50 ...
Mobility redefines business practices
Black or white? Smart ones choose colour!
Forbidding apps on a device is not an option

“The more the CIO says no, the les...
My experience - 3 types of CIO`s
If you spend more on coffee than on IT security, you will be hacked.
What’s more, you des...
It`s all about apps
Mobile Apps: The Role of IT
User Experience, Developer Sourcing & Timelines
API accessibility to Corporate Data & Develope...
User Experience Crucial To Success

Consumer apps for the employee
.. not …
Business apps for the enterprise
Singular func...
Simplify App Configuration

?

Server: 1
us2439.kraymerica.com/948

Server: 2
server12.arcisionline.com/en

User Name:
joh...
Security perspective
Reality check
Smartphones – not so secure at all
Hacked?
How much do you carry around?

“Businesses can no longer ignore mobility trends. Instead, they must
find ways to meet thei...
472% increase in Android malware in 2011
Everyone does MDM
Mobile IT requirements in the post-PC era

Prevent data loss
Mobilize apps and documents
Preserve user experience and priv...
MobileIron - Beyond Enterprise MDM

3

Email and
Content Security (MCM)

2

Application Delivery,
Security and Policy (MAM...
MobileIron offer for developers – SDK
Any app can leverage AppConnect through an easy-to-use app
wrapper or a simple SDK
A...
Benefits?
Authentication: Confirm user identity through domain username
and password or certificates
Single sign-on: Enfor...
More benefits
Encryption: Ensure that all app data stored on the device is
encrypted
DLP
controls:
Set
data
loss
preventio...
..and more benefits
VPN: Create app-specific VPN connection
Application control: Application whitelist/blacklist
Patch man...
Tunnel per App

Traditional

FIREWALL

Tunnel per App

VPN

AppTunnel

AppTunnel

SENTRY

AppTunnel

AppTunnel
AppConnect DLP Policy Control
SDK vs Wrapping Apps

AppConnect
SDK
… Coming Soon

AppConnect
Wrapping
The journey to the Mobile First enterprise

Commit to
Mobile First
Deliver Apps
& Content
Adopt
Devices

Transformation (b...
Feedback

  
Partners:
Kaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOP
Upcoming SlideShare
Loading in …5
×

Kaspars Petersons - BYOD - more like BYOP

351 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
351
On SlideShare
0
From Embeds
0
Number of Embeds
55
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Mobile is where functionality of desktop collides with mobility with mobile device.
  • Mobile drivesa fundamental shift in user behavior as revolutionary as the PC and web transitions of the past>>>60% or more of the workforce will adopt mobile as their primary business device. It will be the first place they look to do their workDeveluperi arī mainās.
  • This shift has driven the birth of Mobile IT, which extends far beyond traditional mobile device management (MDM) and mobile application management (MAM). >>>Our customers have found that Mobile IT requires new strategies, skills, and platforms because mobile is fundamentally different than desktop computing.First, it is user-led, not company-led. This means Mobile IT mustBe flexible enough to deal with a constantly changing mobile operating system environmentBe focused on user experience first and foremostBe able to quickly leverage innovations that users bring into the company from their personal experiencesMobile IT has to be extremely agile to stay ahead of this curve.Second, it is cross-functional. Silos don’t work for Mobile IT.Management, security, and apps development are tightly intertwined.Successful Mobile IT teams either integrate these functions or effectively break down the barriers between themThird, it moves faster than any other enterprise technologyUser preference and mobile technology evolution happens at consumer speed, not enterprise speedDevice and app lifecycles are 6-12 months, not 3-5 years.Apps are small and focused, not monolithic, and are built in short iterations, not long projectsMobile IT needs to make fast decisions and provide quick turnaround.Our customers have found that these capabilities are not optional. Users will move forward even if Mobile IT can’t keep up. As Vivek Kundra, the first CIO of the United States, told us when he visited MobileIron at the beginning of this market transition in January 2011, “The more the CIO says ‘no’ the less secure the organization becomes.” Apps built outside IT – consumer apps to business app.s
  • %Piemēri applikāciju izmantošanai.
  • Izstrādājati, SPotify
  • Citi ražotāji – tirgus ir pilns, ražo visi, kam nav slinkums.Cisco, juniper, checkpoint
  • [Purpose of this slide is to understand the audience’s pain points in mobile – generate discussion around these questions to identify core needs]Mobile is how people work in the post-PC era, but mobile introduces risk, cost, and usability challenges that traditional IT strategies cannot address. Mobile IT needs the tools to speed things up, not slow things down.Our customers have five core Mobile IT requirements>>>How do I prevent data loss?Enterprise data is moving to moving to the mobile device. That means data loss prevention for both data-at-rest and data-in-motion is the foundational requirement for the security team.[ask what data is on their devices … what are they most concerned about on the data security side]>>>How do I take enterprise apps and documents mobile?This is what transforms the business – when organizations move beyond email to mobilize core business processes[ask what apps they are deploying. Is the business asking for apps? For documents?]>>>How do I preserve user experience and privacy?The biggest trap in mobile is compromising user experience for security Our customers are committed to having a great user experience AND being secure – it’s not a choiceAn additional complexity, especially in BYOD settings, is maintaining user privacy for personal data[Ask about BYOD programs. How are they thinking about privacy? What did users think of Good (if they had it)?]>>>How do I support the evolution of mobile operating systems and devices?Five years ago, BlackBerry, Symbian, Windows Mobile, and Palm made up 100% of enterprise mobility. Now all four of those operating systems have been end-of-lifedMobile technology changes faster than anything else IT has to manage.Keeping up is hard but essential … and the Mobile IT platform must support that evolution[Ask about Android … Windows Phone … Mac … how many OS do they think they will have to support?]>>>How do I scale across my global organization?Mobile scale is very difficult – devices, apps, registrations, certificates, email traffic all have to scaleMust scale through architecture, not by requiring you to spend lots of money on more hardware, software, and people[How many devices will they have? How big are their apps? How much staff is available to support mobile?]MobileIron’s focus:Secure dataMake it easy to take apps and docs mobileNever compromise the user experienceGive you the tools to keep up with mobile technologyGive you the platform to go big cost-effectively[Use these MobileIron firsts for each of the items as anecdotes:Data loss: first with DLP for iOS email, first with secure tunnel and access control for ActiveSync (Sentry)Apps and docs: first enterprise app storefront, first scalable app delivery (App Delivery Network), first complete app security platform (AppConnect / AppTunnel)User experience and privacy: first full security for native iOS email, first privacy policyOS and device evolution: first platform purpose-built for multi-OS, purpose-built for Mobile ITScale: first server to scale to 100,000 devices, first scalable app delivery, largest mobile certs deployment in the world (150K certs), first to build mobile scale testing infrastructure (TRUST)
  • We fundamentally believe that to address the new era of mobile, one must look not simply at the device, but application, content and email. Let’s dive into the operating systems.Appconnect.
  • Kaspars Petersons - BYOD - more like BYOP

    1. 1. Partners:
    2. 2. Bring Your Own Device? More like Bring your Own Problems Kaspars Pētersons Account Manager Baltic’s 14.11.2013
    3. 3. headtechnology Group
    4. 4. Company business card Founded in 2000, Germany and now covering 33 countries worldwide with 12 regional offices Core business – IT Security Offices in Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kaz ahstan, Ekaterinburg, Minsk, Baku, Almaty, Sofia More than 80 employees More than 25 vendors in portfolio Official distributor (for many cases exclusive) in Eastern Europe and Asia for number of products/solutions/vendors Participant of many IT exhibitions, road shows, business forums, ENISA IT Security Awareness programm – local IT Security evangelist.
    5. 5. Content History lesson Where are we now? It`s all about apps Security perspective How can we help?
    6. 6. My business card Kaspars Pētersons Riga, Latvia IT Security Distribution business in Baltics 3+ years experience And more..
    7. 7. Tech/Gadgets/Toys
    8. 8. Björk – adopting technology «And when you see the show or play with the apps, most people so far have commented on how cut-the-crap it is and simple. It just looks complicated on paper.» /Björk/
    9. 9. History lesson
    10. 10. Let`s go back in time PHONE Elisha Gray & Alexander Granham Bell 2013 Xperia Z Ultra SONY
    11. 11. ENIAC COMPUTER John Mauchlu & John Presper Eckert December 2013 Mac Pro Apple
    12. 12. WORLD WIDE WEB Sir Tim Berners - Lee WORLD WIDE WEB 2,405,518,376 users in 2012
    13. 13. BARCODE Norman Joseph Woodland & Bernard Silver 1994 QR CODE DENSO WAVE
    14. 14. Leap in history
    15. 15. Where are we now?
    16. 16. 21st centrury – Mobile centrury PC era Mobile era
    17. 17. From desktop to mobile We are at point where functionality of desktop collides with mobility of mobile device. Mobile IT
    18. 18. What do local companies say? • Up to 60% of new phone buyers choose smartphones; • Most bought smartphones at the moment – iPhone5, iPhone4S and Samsung Galaxy S4; • In our network there are 150 000+ smartphone users. Jānis Vēvers, LMT • We predict that in 2014 the internet on mobile devices will be over 100 Mb p/s; • On year 2015 from all sold mobile phones 75% will be smartphones; • All-in-one plans and solutions will be the dominating choice for buyers. Valdis Vancovičs, Tele2
    19. 19. Challanges M - the need for mobility O - the need to improve operations B - the need to break business barriers I - the need to improve information quality L - the need to decrease transaction lag E - the need to improve efficiency
    20. 20. Mobile drives a fundamental shift in behavior Desktop as primary Salesforce Task workers Knowledge workers Industry-specific roles Mobile as primary
    21. 21. What is Mobile IT? Mobile IT requires new strategies, skills, and platforms because mobile is fundamentally different than desktop computing Management, security, and apps development are tightly intertwined. Device and app lifecycles are 6-12 months, not 3-5 years.
    22. 22. The birth of Mobile IT 2-3x as many employees using mobile Devices not Windows-based Mobile >50% owned by employees >50 apps per device Most mobile apps built outside IT Constant OS migration IT
    23. 23. Mobility redefines business practices
    24. 24. Black or white? Smart ones choose colour! Forbidding apps on a device is not an option “The more the CIO says no, the less secure the organization becomes.”
    25. 25. My experience - 3 types of CIO`s If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. /Richard A. Clarke/ NO NO`s – declines mobile technology in their infrastructure due to security and/or financial reasons. Providers – provides business with minimal needs (such as email), doesn`t iniciate any other use of devices. GO GO`s – shows strong iniciative to business, recommends new and innovative ways how mobile IT can support business.
    26. 26. It`s all about apps
    27. 27. Mobile Apps: The Role of IT User Experience, Developer Sourcing & Timelines API accessibility to Corporate Data & Developer Security Consumer-Grade App Discovery Experience Easy-Configuration For Users Global Delivery & Integration with Other Services App & Data Security
    28. 28. User Experience Crucial To Success Consumer apps for the employee .. not … Business apps for the enterprise Singular function, not multiple features … feature creep is the kiss of death in a mobile app Fast cycles … eight weeks of development, fast iteration, six month lifespan, and reasonable cost High expectations … your employees are mobile experts in their personal lives. Your business app design is not competing against a desktop SAP app in their minds. It is competing against that great Twitter on Instagram app they downloaded last night which feels like it was built JUST for them.
    29. 29. Simplify App Configuration ? Server: 1 us2439.kraymerica.com/948 Server: 2 server12.arcisionline.com/en User Name: johnsmith Password: Password •••••••• ************** License Key: Hx7h#2294aC SUBMIT SUBMIT
    30. 30. Security perspective
    31. 31. Reality check
    32. 32. Smartphones – not so secure at all
    33. 33. Hacked?
    34. 34. How much do you carry around? “Businesses can no longer ignore mobility trends. Instead, they must find ways to meet their needs, while meeting strict security demands,” Anthony Foy, CEO of Workshare.
    35. 35. 472% increase in Android malware in 2011
    36. 36. Everyone does MDM
    37. 37. Mobile IT requirements in the post-PC era Prevent data loss Mobilize apps and documents Preserve user experience and privacy Support mobile OS and device evolution Deploy at scale across global organizations
    38. 38. MobileIron - Beyond Enterprise MDM 3 Email and Content Security (MCM) 2 Application Delivery, Security and Policy (MAM) 1 OS Management and Control (MDM)
    39. 39. MobileIron offer for developers – SDK Any app can leverage AppConnect through an easy-to-use app wrapper or a simple SDK App wrapping minimizes developer time and secures apps postdevelopment The SDK can be used at any time during the development process Your own application storefront
    40. 40. Benefits? Authentication: Confirm user identity through domain username and password or certificates Single sign-on: Enforce time-based app-level sign-on across secured app containers Authorization: Allow or block app usage or data storage based on device or user risk Configuration: Silently configure personalized settings such as user name, server name, and custom attributes without requiring user intervention
    41. 41. More benefits Encryption: Ensure that all app data stored on the device is encrypted DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste, print, and open-in permissions, so unauthorized apps cannot access secure data Dynamic policy: Update app policies dynamically Reporting: Provide app usage statistics Selective wipe: Remotely wipe app data without touching personal data
    42. 42. ..and more benefits VPN: Create app-specific VPN connection Application control: Application whitelist/blacklist Patch management: Manage application versions, force updates And more..
    43. 43. Tunnel per App Traditional FIREWALL Tunnel per App VPN AppTunnel AppTunnel SENTRY AppTunnel AppTunnel
    44. 44. AppConnect DLP Policy Control
    45. 45. SDK vs Wrapping Apps AppConnect SDK … Coming Soon AppConnect Wrapping
    46. 46. The journey to the Mobile First enterprise Commit to Mobile First Deliver Apps & Content Adopt Devices Transformation (biz/org) New user experiences New business processes Core apps Core documents Experiments BYOD Email access Multi-OS device security Users Enterprise IT
    47. 47. Feedback   
    48. 48. Partners:

    ×