SlideShare a Scribd company logo
1 of 30
Zenprise
Protect the Enterprise In Your Pocket


Shafaq Abdullah
Principal/Architect, Software
Twitter:@shafaq110 : shafaq.abdullah@zenprise.com



                                                    © 2011 Zenprise, Inc. All rights reserved. 0
Mobile Is A Top Priority Across The Board


    69% higher than                                                                          $6,600

    their prediction
    earlier this year                                                         $3,400
                                                                     $1,800
                                          $300          $700
         $200
         2010                             2011          2012         2013     2014              2015
        Forrester




                 59%                                           3x                17,000

              Forrester                                   Aberdeen               Research2Guidance
1


    |      © 2011 Zenprise, Inc. All rights reserved.
                                                                                             © 2011 Zenprise, Inc. All rights reserved. 1
The Problem: The Mobile Blind Spot




                                     © 2011 Zenprise, Inc. All rights reserved. 2
Three Enterprise Mobility Use Cases




   CEO at Starbucks         Employee at Office      VP Lands in China
   Viewing Corporate Data   Loading Photos to       Accessing M&A
   on Personal iPad via     Facebook on Corporate   Documents from Dropbox
   Unrestricted WiFi        Android                 on Personal iPhone




                             On Any Device

     Are your data              Which apps           Is the connection
      protected?                 are safe?                secure?

                                                                © 2011 Zenprise, Inc. All rights reserved. 3
Zenprise Offerings




                                                        Complete
                                                  Management Solution
ZENPRISE               Industry’s Only Solution      for All Devices
MOBILEMANAGER™         With Security At All        iPhone, iPad, Android,
Software Solution      Layers                      Windows Mobile,
                                                   Blackberry, Symbian….



ZENCLOUD™              Public, Private, Hybrid
Cloud-based Offering   100% SLA




                                                             © 2011 Zenprise, Inc. All rights reserved. 4
Zenprise Differentiated Value:
Protection At All Layers



        CEO                    Employee                      Board of Directors


   DEVICES            APPLICATIONS           NETWORK                   DATA


                  +                     +                    +
                                            Any Connection          Repository
    Any and All       Ever Increasing        to Enterprise          Integration


                    DATA (IP, non-public financial,
                  BI, customer data, employee data)


                  Real-Time Security At All Layers
                                                                    © 2011 Zenprise, Inc. All rights reserved. 5
Differentiated Value At The Device Layer



  Dynamic Defense




   Dynamic Defense
   • Dynamic, context-aware policies for device resource or
     app usage based on time of day or location
   • Granular device and data governance and control
     reduces risk and enables compliance


                                                              © 2011 Zenprise, Inc. All rights reserved. 6
Differentiated Value At The App Layer




                    Mobile
                    App Tunnels


      Mobile App Tunnels
      • Secure, dedicated, VPN-like connection from user to app
      • Granular access vs. all-or-nothing with VPN
      • Segregate critical business apps
      • Better performance, reliability, and cost through data
        compression and continuity even with poor connectivity

                                                                  © 2011 Zenprise, Inc. All rights reserved. 7
Differentiated Value At The Network Layer


  Mobile Security
  Intelligence



 Mobile Network Intelligence
 • Visibility into mobile network traffic and behavior by
   device, user, system, or application
 • Identifies unauthorized access, insider threats, leakage
   of sensitive corporate data, and compliance violations
 • SIEM integration

                                                              © 2011 Zenprise, Inc. All rights reserved. 8
Differentiated Value At The Data Layer



 • The industry’s first mobile
   DLP solution that
   addresses sensitive data
 • Secure file synch in
   document container
 • Provides context- and
   content-aware mobile DLP
 • Leverages SharePoint –
   the primary enterprise
   collaboration tool



                                         © 2011 Zenprise, Inc. All rights reserved. 9
Secure Data Container on Android


• (app + ciphering) + sqlite = encrypted data container
• app + (sqlite (with ciphering)) = encrypted data container




                                                           © 2011 Zenprise, Inc. All rights reserved. 10
Enterprise Virtual Machine on Mobile Devices




           Office Phone, Personal Phone paradox!
        Isolating Personal Content from Enterprise one




                                                    © 2011 Zenprise, Inc. All rights reserved. 11
Enterprise-Grade Architecture


 •   Proven in production             Number of Devices Managed
     deployments with 10s of
     1,000s of users and devices      Fortune 500 Tech                      25K

 •   Managing 65,000 devices on       Fortune 500 Manufacturing             30K
     a single Zenprise server
                                      Government Agency                     30K
 •   Six years of technology
     development in scalability and   Global Carrier                        28K
     service management
                                      Fortune 500 Conglomerate              65K
 •   High availability at web, app,
     and data tiers
 •   100% uptime SLA with cloud


         Proven to Meet Needs of Any Size Organization
                                                                  © 2011 Zenprise, Inc. All rights reserved. 12
Recognized As The Leader By Gartner




            Zenprise




                                      © 2011 Zenprise, Inc. All rights reserved. 13
How It Works: Full Lifecycle Management


                      Configure


        Decom-
                                    Provision
        mission



             Monitor
                                Support
            and report
                                            © 2011 Zenprise, Inc. All rights reserved. 14
How It Works: Configure, Set Policies,
Define Apps




                                         © 2011 Zenprise, Inc. All rights reserved. 15
How It Works: Users Self-Enroll In Minutes



       1             2               3                      4




     Begin          Enter       Install cert   Download enterprise
   enrollment    credentials    and profile    recommended apps


                                                     © 2011 Zenprise, Inc. All rights reserved. 16
How It Works: Enterprise-Grade Architecture




                                              © 2011 Zenprise, Inc. All rights reserved. 17
How It Works: Enterprise-Grade Architecture




                                              © 2011 Zenprise, Inc. All rights reserved. 18
ZencloudTM: Flexible Deployment Options




                                          © 2011 Zenprise, Inc. All rights reserved. 19
Customer Case Study: Aerospace


• Fortune 100 aerospace company
• Challenges
    - Management
        Dozens of devices types, operating systems, applications, carrier and support plans
    - Security
        Lost or stolen devices exposing data, mobile threats via browser
    - Visibility
        Installed applications, user activity

• Chose Zenprise over MobileIron because
    -   Best fit with security and technical requirements
    -   Actionable intelligence about carrier expenses and service

•   Foundational to multi-thousand device global roll-out


                                                                                 © 2011 Zenprise, Inc. All rights reserved. 20
Customer Case Study: Telecommunications


 •   Fortune 100 global telecommunications company
 •   Challenges
      •   Scalability
          Centrally manage tens of thousands of employees around the world
      •   Management
          Diverse array of operating systems (iOS, Android, BlackBerry, WinMo, and Symbian)
      •   Enterprise integration
          Active Directory, integration with business process management system, single
          sign-on
 •   Chose Zenprise over MobileIron, AirWatch, BoxTone, and
     Good because
      •   Simple, well-supported integration and configuration
      •   Strong match with current and future requirements (roadmap)
 •   Result: 30%+ reduction in device-enablement service requests
                                                                              © 2011 Zenprise, Inc. All rights reserved. 21
The Top Five
Win Customers While Planting Competitive Landmines



        Protection across ALL LAYERS: device, app, network,
   1    data


   2    Security ARCHITECTED in; no data exposed in the DMZ

        The most SCALABLE cloud and on-prem solution in the
   3    market; proven in production


   4    …with the HIGHEST AVAILABILITY (fully-redundant at all
        levels)

   5    The LEADER in Critical Capabilities, per Gartner

                                                      © 2011 Zenprise, Inc. All rights reserved. 22
Android Security and best Practices




                                      © 2011 Zenprise, Inc. All rights reserved. 23
Android Apps SECURITY


• UIDs
• Application Sandbox with distinct permission
• Application signing using self-signing certificates
• Permissions on Manifest




                                                        © 2011 Zenprise, Inc. All rights reserved. 24
Levels of Permission


• Normal
• Dangerous
• Signature
• SignatureOrSystem




                       © 2011 Zenprise, Inc. All rights reserved. 25
Intent Filter


• IntentFilters are not a security boundary they cannot be
  associated with permissions
• Categories when added to Intent, help to avoid unintented
  consequences
• android:permission attribute in an <activity>
• When are Activities Private
• Intent arugments: Command-line




                                                      © 2011 Zenprise, Inc. All rights reserved. 26
Broadcast Listener


• Securing BroadcastReceivers with permissions




                                                 © 2011 Zenprise, Inc. All rights reserved. 27
Questions?




             © 2011 Zenprise, Inc. All rights reserved. 28
© 2011 Zenprise, Inc. All rights reserved. 29

More Related Content

What's hot

Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
Cana Ko
 
Managing content in_a_mobile_world
Managing content in_a_mobile_worldManaging content in_a_mobile_world
Managing content in_a_mobile_world
QuestexConf
 
MicroVision 2011 ASM presentation
MicroVision 2011 ASM presentationMicroVision 2011 ASM presentation
MicroVision 2011 ASM presentation
Tiffany Bradford
 
Emmbedding Oracle
Emmbedding OracleEmmbedding Oracle
Emmbedding Oracle
didemtopuz
 
Oracle Embedded
Oracle EmbeddedOracle Embedded
Oracle Embedded
Prem Kumar
 
Ecm mythbusters the_real_story_behind_vendor_marketing
Ecm mythbusters the_real_story_behind_vendor_marketingEcm mythbusters the_real_story_behind_vendor_marketing
Ecm mythbusters the_real_story_behind_vendor_marketing
QuestexConf
 
Bi ecm a_shotgun_wedding
Bi ecm a_shotgun_weddingBi ecm a_shotgun_wedding
Bi ecm a_shotgun_wedding
QuestexConf
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
Leigh Williamson
 

What's hot (18)

Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Managing content in_a_mobile_world
Managing content in_a_mobile_worldManaging content in_a_mobile_world
Managing content in_a_mobile_world
 
The New Collaboration Technologies Experience
The New Collaboration Technologies Experience The New Collaboration Technologies Experience
The New Collaboration Technologies Experience
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
MicroVision 2011 ASM presentation
MicroVision 2011 ASM presentationMicroVision 2011 ASM presentation
MicroVision 2011 ASM presentation
 
Mwc wip jam jabber sdk final
Mwc wip jam jabber sdk finalMwc wip jam jabber sdk final
Mwc wip jam jabber sdk final
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
 
Designing Mobile Applications
Designing Mobile ApplicationsDesigning Mobile Applications
Designing Mobile Applications
 
Unwired Platform
Unwired PlatformUnwired Platform
Unwired Platform
 
Emmbedding Oracle
Emmbedding OracleEmmbedding Oracle
Emmbedding Oracle
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
 
Oracle Embedded
Oracle EmbeddedOracle Embedded
Oracle Embedded
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011
 
Ecm mythbusters the_real_story_behind_vendor_marketing
Ecm mythbusters the_real_story_behind_vendor_marketingEcm mythbusters the_real_story_behind_vendor_marketing
Ecm mythbusters the_real_story_behind_vendor_marketing
 
Bi ecm a_shotgun_wedding
Bi ecm a_shotgun_weddingBi ecm a_shotgun_wedding
Bi ecm a_shotgun_wedding
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 

Similar to Zenprise ctia 10-11-2011_v02

Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Dirk Nicol
 
Mobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four WallsMobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four Walls
InSync Conference
 
#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud
Central NyT
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
stefriche0199
 

Similar to Zenprise ctia 10-11-2011_v02 (20)

Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Mobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four WallsMobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four Walls
 
#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud#1 keynote get social_be_mobile_runcloud
#1 keynote get social_be_mobile_runcloud
 
IBM Worklight-Overview
IBM Worklight-OverviewIBM Worklight-Overview
IBM Worklight-Overview
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
 
Sap Bi OnDemand Overview
Sap Bi OnDemand OverviewSap Bi OnDemand Overview
Sap Bi OnDemand Overview
 
Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Centrify Intellect event
Centrify   Intellect eventCentrify   Intellect event
Centrify Intellect event
 
Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Zenprise ctia 10-11-2011_v02

  • 1. Zenprise Protect the Enterprise In Your Pocket Shafaq Abdullah Principal/Architect, Software Twitter:@shafaq110 : shafaq.abdullah@zenprise.com © 2011 Zenprise, Inc. All rights reserved. 0
  • 2. Mobile Is A Top Priority Across The Board 69% higher than $6,600 their prediction earlier this year $3,400 $1,800 $300 $700 $200 2010 2011 2012 2013 2014 2015 Forrester 59% 3x 17,000 Forrester Aberdeen Research2Guidance 1 | © 2011 Zenprise, Inc. All rights reserved. © 2011 Zenprise, Inc. All rights reserved. 1
  • 3. The Problem: The Mobile Blind Spot © 2011 Zenprise, Inc. All rights reserved. 2
  • 4. Three Enterprise Mobility Use Cases CEO at Starbucks Employee at Office VP Lands in China Viewing Corporate Data Loading Photos to Accessing M&A on Personal iPad via Facebook on Corporate Documents from Dropbox Unrestricted WiFi Android on Personal iPhone On Any Device Are your data Which apps Is the connection protected? are safe? secure? © 2011 Zenprise, Inc. All rights reserved. 3
  • 5. Zenprise Offerings Complete Management Solution ZENPRISE Industry’s Only Solution for All Devices MOBILEMANAGER™ With Security At All iPhone, iPad, Android, Software Solution Layers Windows Mobile, Blackberry, Symbian…. ZENCLOUD™ Public, Private, Hybrid Cloud-based Offering 100% SLA © 2011 Zenprise, Inc. All rights reserved. 4
  • 6. Zenprise Differentiated Value: Protection At All Layers CEO Employee Board of Directors DEVICES APPLICATIONS NETWORK DATA + + + Any Connection Repository Any and All Ever Increasing to Enterprise Integration DATA (IP, non-public financial, BI, customer data, employee data) Real-Time Security At All Layers © 2011 Zenprise, Inc. All rights reserved. 5
  • 7. Differentiated Value At The Device Layer Dynamic Defense Dynamic Defense • Dynamic, context-aware policies for device resource or app usage based on time of day or location • Granular device and data governance and control reduces risk and enables compliance © 2011 Zenprise, Inc. All rights reserved. 6
  • 8. Differentiated Value At The App Layer Mobile App Tunnels Mobile App Tunnels • Secure, dedicated, VPN-like connection from user to app • Granular access vs. all-or-nothing with VPN • Segregate critical business apps • Better performance, reliability, and cost through data compression and continuity even with poor connectivity © 2011 Zenprise, Inc. All rights reserved. 7
  • 9. Differentiated Value At The Network Layer Mobile Security Intelligence Mobile Network Intelligence • Visibility into mobile network traffic and behavior by device, user, system, or application • Identifies unauthorized access, insider threats, leakage of sensitive corporate data, and compliance violations • SIEM integration © 2011 Zenprise, Inc. All rights reserved. 8
  • 10. Differentiated Value At The Data Layer • The industry’s first mobile DLP solution that addresses sensitive data • Secure file synch in document container • Provides context- and content-aware mobile DLP • Leverages SharePoint – the primary enterprise collaboration tool © 2011 Zenprise, Inc. All rights reserved. 9
  • 11. Secure Data Container on Android • (app + ciphering) + sqlite = encrypted data container • app + (sqlite (with ciphering)) = encrypted data container © 2011 Zenprise, Inc. All rights reserved. 10
  • 12. Enterprise Virtual Machine on Mobile Devices Office Phone, Personal Phone paradox! Isolating Personal Content from Enterprise one © 2011 Zenprise, Inc. All rights reserved. 11
  • 13. Enterprise-Grade Architecture • Proven in production Number of Devices Managed deployments with 10s of 1,000s of users and devices Fortune 500 Tech 25K • Managing 65,000 devices on Fortune 500 Manufacturing 30K a single Zenprise server Government Agency 30K • Six years of technology development in scalability and Global Carrier 28K service management Fortune 500 Conglomerate 65K • High availability at web, app, and data tiers • 100% uptime SLA with cloud Proven to Meet Needs of Any Size Organization © 2011 Zenprise, Inc. All rights reserved. 12
  • 14. Recognized As The Leader By Gartner Zenprise © 2011 Zenprise, Inc. All rights reserved. 13
  • 15. How It Works: Full Lifecycle Management Configure Decom- Provision mission Monitor Support and report © 2011 Zenprise, Inc. All rights reserved. 14
  • 16. How It Works: Configure, Set Policies, Define Apps © 2011 Zenprise, Inc. All rights reserved. 15
  • 17. How It Works: Users Self-Enroll In Minutes 1 2 3 4 Begin Enter Install cert Download enterprise enrollment credentials and profile recommended apps © 2011 Zenprise, Inc. All rights reserved. 16
  • 18. How It Works: Enterprise-Grade Architecture © 2011 Zenprise, Inc. All rights reserved. 17
  • 19. How It Works: Enterprise-Grade Architecture © 2011 Zenprise, Inc. All rights reserved. 18
  • 20. ZencloudTM: Flexible Deployment Options © 2011 Zenprise, Inc. All rights reserved. 19
  • 21. Customer Case Study: Aerospace • Fortune 100 aerospace company • Challenges - Management Dozens of devices types, operating systems, applications, carrier and support plans - Security Lost or stolen devices exposing data, mobile threats via browser - Visibility Installed applications, user activity • Chose Zenprise over MobileIron because - Best fit with security and technical requirements - Actionable intelligence about carrier expenses and service • Foundational to multi-thousand device global roll-out © 2011 Zenprise, Inc. All rights reserved. 20
  • 22. Customer Case Study: Telecommunications • Fortune 100 global telecommunications company • Challenges • Scalability Centrally manage tens of thousands of employees around the world • Management Diverse array of operating systems (iOS, Android, BlackBerry, WinMo, and Symbian) • Enterprise integration Active Directory, integration with business process management system, single sign-on • Chose Zenprise over MobileIron, AirWatch, BoxTone, and Good because • Simple, well-supported integration and configuration • Strong match with current and future requirements (roadmap) • Result: 30%+ reduction in device-enablement service requests © 2011 Zenprise, Inc. All rights reserved. 21
  • 23. The Top Five Win Customers While Planting Competitive Landmines Protection across ALL LAYERS: device, app, network, 1 data 2 Security ARCHITECTED in; no data exposed in the DMZ The most SCALABLE cloud and on-prem solution in the 3 market; proven in production 4 …with the HIGHEST AVAILABILITY (fully-redundant at all levels) 5 The LEADER in Critical Capabilities, per Gartner © 2011 Zenprise, Inc. All rights reserved. 22
  • 24. Android Security and best Practices © 2011 Zenprise, Inc. All rights reserved. 23
  • 25. Android Apps SECURITY • UIDs • Application Sandbox with distinct permission • Application signing using self-signing certificates • Permissions on Manifest © 2011 Zenprise, Inc. All rights reserved. 24
  • 26. Levels of Permission • Normal • Dangerous • Signature • SignatureOrSystem © 2011 Zenprise, Inc. All rights reserved. 25
  • 27. Intent Filter • IntentFilters are not a security boundary they cannot be associated with permissions • Categories when added to Intent, help to avoid unintented consequences • android:permission attribute in an <activity> • When are Activities Private • Intent arugments: Command-line © 2011 Zenprise, Inc. All rights reserved. 26
  • 28. Broadcast Listener • Securing BroadcastReceivers with permissions © 2011 Zenprise, Inc. All rights reserved. 27
  • 29. Questions? © 2011 Zenprise, Inc. All rights reserved. 28
  • 30. © 2011 Zenprise, Inc. All rights reserved. 29