Enterprise Mobility
Enterprise Mobility
Page ii Advaiya Solutions Pvt. Ltd.
Contents
Introduction................................................
Enterprise Mobility
Page i Advaiya Solutions Pvt. Ltd.
Introduction
IT grapples with the need to extend enterprise archite...
Enterprise Mobility
Page ii Advaiya Solutions Pvt. Ltd.
Trends, Challenges, and Drivers
In today’s changing markets, enter...
Enterprise Mobility
Page iii Advaiya Solutions Pvt. Ltd.
Challenges12
12
IQT, The Challenges of Enterprise Mobility
http:/...
Enterprise Mobility
Page iv Advaiya Solutions Pvt. Ltd.
Enterprise Mobility Maturity and Optimization Framework
Optimizati...
Enterprise Mobility
Page v Advaiya Solutions Pvt. Ltd.
 App inventory, distribution
 Real-time, permission-based remote ...
Enterprise Mobility
Page vi Advaiya Solutions Pvt. Ltd.
Key Mobility Considerations and Vendor Characteristics
There are t...
Enterprise Mobility
Page vii Advaiya Solutions Pvt. Ltd.
 Simplified onboarding and provisioning
 Secure, IT controlled ...
Enterprise Mobility
Page viii Advaiya Solutions Pvt. Ltd.
 Configure device security policies based on device ownership
...
Enterprise Mobility
Page ix Advaiya Solutions Pvt. Ltd.
SMS Matrix
 Send bulk message in fraction of seconds
 Integratio...
Enterprise Mobility
Page x Advaiya Solutions Pvt. Ltd.
 Supports single sign-on capabilities for all applications and dat...
Enterprise Mobility
Page xi Advaiya Solutions Pvt. Ltd.
 EDI Application Integrator for drag and drop mapping
Jitterbit A...
Enterprise Mobility
Page xii Advaiya Solutions Pvt. Ltd.
Conclusion
Consumerization of IT has significantly increased the ...
Enterprise Mobility
Page xiii Advaiya Solutions Pvt. Ltd.
References
Enterasys Mobile IAM
http://www.enterasys.com/product...
Enterprise Mobility
Page xiv Advaiya Solutions Pvt. Ltd.
http://www.symantec.com/app-center-enterprise-edition
NetScaler A...
Enterprise Mobility
Page xv Advaiya Solutions Pvt. Ltd.
Glossary
Term Long form/ Expansion Definition
BYOD Bring Your Own ...
Enterprise Mobility
Page xvi Advaiya Solutions Pvt. Ltd.
at-rest (data storage)
OTA Over-the-Air A general term for wirele...
Enterprise Mobility
Page xvii Advaiya Solutions Pvt. Ltd.
RPC Remote Procedure Call Remote procedure call (RPC) is an inte...
Enterprise Mobility
Page xviii Advaiya Solutions Pvt. Ltd.
Contact Us
Advaiya Solutions Pvt. Ltd.
G14-17, IT Park, Madri I...
Upcoming SlideShare
Loading in …5
×

Advaiya enterprise mobility whitepaper

1,144 views

Published on

This paper discusses trends and challenges affecting enterprise mobility and how organizations can effectively build and deploy around enterprise mobility framework

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,144
On SlideShare
0
From Embeds
0
Number of Embeds
16
Actions
Shares
0
Downloads
30
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Advaiya enterprise mobility whitepaper

  1. 1. Enterprise Mobility
  2. 2. Enterprise Mobility Page ii Advaiya Solutions Pvt. Ltd. Contents Introduction...........................................................................................................................................................1 Trends, Challenges, and Drivers...........................................................................................................................2 Enterprise Mobility Maturity and Optimization Framework............................................................................4 Key Mobility Considerations and Vendor Characteristics.................................................................................6 Conclusion............................................................................................................................................................12 References............................................................................................................................................................13 Glossary................................................................................................................................................................15
  3. 3. Enterprise Mobility Page i Advaiya Solutions Pvt. Ltd. Introduction IT grapples with the need to extend enterprise architecture to include mobility considerations making personal devices as business tools. Mobile devices bring enterprise data to new roles, supporting a seamless mobile experience. Businesses pursue opportunities to stay ahead of the competition, providing users with secure and compliant information, anytimeand anywhere on mobile infrastructure. Theprimary research of current landscape of mobile solutions for varying business needs provided with the mobility optimization framework and considerations for mobile app management. Various analyst firms and IT firms including IDC, Gartner, Aberdeen, Intel etc. have carried our researches and conducted surveys on Enterprise Mobility. In one such study, Gartner observed that consumerization and the ubiquity of connected smart devices, people's behavior has caused a convergenceof these forces. A Nexus of converging forces — social, mobile, cloud and information — is building upon and transforming user behavior while creating new business opportunities. Mobile computing is forcing the biggest change to the way work. It changes how they spend theirday. Mass adoption forces new infrastructure. It spawns new businesses. And it threatens the status quo1 . The innovation rate in mobile devices, social software and cloud computing is accelerating fasterthan the enterprise adaptation rate. IT organizations that fail to adapt to this new reality will lose their relevance in the era of pervasive mobility.2 With this comes the responsibility for Businesses to consider mobility management as important as datacenter management. This is the core premise of study – that enterprise mobility management deals with Mobile Strategy and Roadmap, Mobile Device Management, Mobile Device Security, Mobile Device Policy, Enterprise Application Enablement, Mobile App Management. We have studied mobility trends and studies from various analysts, mobility solutions of leader vendors and developed Enterprise Mobility framework with three maturity levels (Mobileaware, Mobile enabled, Mobile enterprise) of these capabilities through which organizations can advancewith a strategic roadmap and accruemeasurable business value.3 This paper discusses trends and challenges affecting enterprise mobility and how organizations can effectively build and deploy around enterprise mobility framework 1 Gartner, The Nexus of Forces: Foundational Research for the Technical Professional, June 2012, http://www.gartner.com/technology/research/technical-professionals/nexus-of-forces.jsp 2 Gartner, Enterprise Mobility and Its Impact on IT, April 2012, http://www.gartner.com/technology/research/technical-professionals/mobility.jsp 3 Aberdeen Group, Enterprise Mobility Management 2012, April 2012, http://content.maas360.com/www/content/ar/Aberdeen_SoMoClo_2012.pdf Analyzing mobility infrastructure and architecture helps enterprise to quickly assess the technology landscape, current trends and make company data available in real time with device support across various platforms.
  4. 4. Enterprise Mobility Page ii Advaiya Solutions Pvt. Ltd. Trends, Challenges, and Drivers In today’s changing markets, enterprises face several challenges in creating an enterprise mobility strategy. The challenge is not building mobile application but providing mobile application platform. They need to slowly move up the maturity curve in adopting mobility. Trends  70% of mobile professionals will conduct their work on personal smart devices by 20184  BYOC is attracting interest from organizations that look to reduce IT costs and satisfy user demands for device choice, While "bring your own computer" removes some of IT's desktop management responsibility, IT must make additional management investments to make it work.5  Enterprise tablet adoption will grow by 50 percent annually. In addition, 71 percent of workers surveyed use tablets as an additional device rather than a computer replacement6  More than 40 percent of all enterprise web applications will have mobile apps by 2014, and 90 percent of companies will support corporate apps on mobile devices by 20147  Expect MDM to fade from marketing language in 2013, replaced by MAM (mobile application management) or MEM (mobile enterprise management).8  2013 will bring a lot more integration between mobile apps and the cloud. Wherever possible, you won't have data that resides on the device.9  Security, manageability, and remote wipe capabilities are top requirements for a successful BYOD program10 Drivers11 4 Gartner, Bring Your Own Device, 2013 http://www.gartner.com/technology/topics/byod.jsp 5 Gartner, The Impact of BYOC on Management and Support, October 2011 http://www.gartner.com/id=1820215 6 ClickSoftware.com, 2013 http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 7 Gartner, 2013 http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 8 Information Week, 2013 http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-predictions-for-20/240145435 9 451 Research – Hazelton, 2013 http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-predictions-for-20/240145435?pgno=2 10 Intel, Insights on the Current State of BYOD, October 2012 http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/consumerization-enterprise-byod-peer-research-paper.pdf 11 Cognizant, F orces Driving Enterprise Mobility http://www.cognizant.com/insights/perspectives/forces-driving-enterprise-mobility Support flexible workstyle to drive employee satisfaction Enhancing remote productivity Increased Use of Mobility by Consumers
  5. 5. Enterprise Mobility Page iii Advaiya Solutions Pvt. Ltd. Challenges12 12 IQT, The Challenges of Enterprise Mobility http://www.iqt.org/portfolio/on-our-ra dar/Enterprise_mobility.pdf Securing corporate Information systems with increase in offsite work through personal devices Integrating mobile apps with enterprise systems Supporting variety of mobile devices and rapidly changing mobile technology Managing what’s on the mobile device
  6. 6. Enterprise Mobility Page iv Advaiya Solutions Pvt. Ltd. Enterprise Mobility Maturity and Optimization Framework Optimization is a structured, systematic process of assessing mobile infrastructure and architecture maturity across IT and Business world. Theprocess begins with where the mobility infrastructure is and where the enterprise wants it to be. Enterprise mobility framework defines 3 maturity phases as Mobile Aware, Mobile Enabled and Mobile Enterprise. The Enterprise Mobility Maturity Model capabilities, maturity definitions and features are illustrated below. Capability Mobile Aware Mobile Enabled Mobile Enterprise Mobile Strategy and Roadmap Agreed upon strategic direction, no mobile strategy roadmap Strategy published and communicated, bottom- up driven roadmap Mobile strategy drives the mobility roadmap, measured results feed the strategy Mobile Device Management Limited platform specific management Platform specific, comprehensive device management Centrally managed, policy driven, integrated device management Features  Web based authentication  Corporate device provisioning by IT  Certificates, passcodes, multifactorauthentication, single sign-on to apps and data  Device enrollment through web-portal, e-mail, over-the-air using smartphones/tablets application, or SMS with OTP authentication.  Central policy management system for endpoint devices  Predictive analytics, proactive alerting, real-time diagnostics and problem resolution  Remote support and troubleshooting including VOIP and chat  AD/LDAP based authentication  Personal device provisioning and self-service enrollment  Management console with strong dashboard and detailed reporting capabilities (role-based views) Mobile Device Security Limited platform specific device security Cross platform mobile device security Fully managed cross platform mobile device security Features  Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking, context-aware policies, app blacklist/whitelist  Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking, context-aware policies, app blacklist/whitelist  Encryption policy (phone, SD)  Lockdown security (camera, SD, Bluetooth, Wi-Fi)  Password enforcement  Remote lock and wipe Mobile Aware Unmanaged user devices used in the organization in limitied capacity Use of pilot application Mobile Enabled Partially managed devices connect to limited company resources Handful of mobile applications Mobile Enterprise Fully managed employees and company devices participate in enterprise workflow 1 2 3
  7. 7. Enterprise Mobility Page v Advaiya Solutions Pvt. Ltd.  App inventory, distribution  Real-time, permission-based remote control  Enterprise data boundary with selective wipe and privacy policies  Access Control (Sentry) with ActiveSync connection activity, device visibility and blocking of email access  Certificate distribution  Secure administration with role-based access, group-based actions and persistent logs and audit trails  Lost phone recovery (locate and map) Mobile Device Policy Platform specific mobile device policy Established cross platform device policies Fully defined & enforced mobile device policies across all devices Features  Web content filtering and URL filtering on mobile devices  Mobile policies based on OS and patch levels, passcodes, device ownership, apps and device resources, platform-specific policies, encryption, device status and location  Quarantine noncompliant devices based on policies, devices, operating system versions, and complianceviolation Enterprise Application Enablement Limited enablement of select enterprise functions Key enterprise functions and processes are mobile enabled Mobility enables business process innovation Features  Embedded VPN and sandbox that can control and encrypt application traffic.  App wrapping to import mobileapps  Enables smartphone/tablet users to subscribe to enterprise document and database updates through the enterprise application distribution function  SMS Integration with other services/Applications using APIs  Application authorization even on platforms that do not support blacklisting /whitelisting Mobile App Management Unmanaged mobile Apps Unmanaged commercial and managed custom mobile apps Fully managed mobilebusiness apps portfolio Features  Enterprise App Catalogues  Advanced distribution rules selecting eligible devices based on both inclusion and exclusion criteria  Push updated versions automatically for on-demand apps  On-demand installation using app catalog  Public Appstore integration  Prevent data backup and automatically remove apps on un-enrollment  Track and view installed/approved/blacklisted applications at the device/user level  Remotely manage application settings on supported apps through Application Profiles  Container approach to separate personal versus corporate data  Secure business apps and data with encryption and mobile DLP technologies  Granular policy-based management and access controls Overall Unmanaged consumer mobile devices used in organization in limited capacity Partially managed devices connect to limited company resources Fully managed company and employee devices participate in enterprise workflow
  8. 8. Enterprise Mobility Page vi Advaiya Solutions Pvt. Ltd. Key Mobility Considerations and Vendor Characteristics There are three leading platforms in the mobilesegment—smartphones, tablets, and notebooks PCs - and new In-Stat (www.in- stat.com) research forecasts that this category of mobile “magnet platforms” will grow at a CAGR of 25.7% through 2015 as com pared to 8.7% for the overall mobile market. Employees use smartphones, tablets or personal devices at workplaces to access corporate networks, business applications and data to maximize connectivity and productivity. This demands for the need of secure and compliant access to applications and data on various mobile platforms. The mobility landscape in India is rapidly evolving. Enterprises are embracing mobility to improve work productivity and experience of customers.13 The research lays emphasis on the essentials of enterprise mobility and its integration i.e. Mobile Device Management, Controlled Services Exposure, SMS based Service Invocation, Enterprise Mobility Gateway and Business Service Interface. 14 Mobile Device Management: Mobile device management (MDM) solutions help enterprises manage smartphones and tablets by providing centralized, multivendor device management that results in lower risk and improved cost of ownership. Although the MDM market is fragmented with point solutions, it is evolving toward broader solutions that will eventually support application, security, policy, and device and service management. Important MDM features that enterprises need to consider:  Device Registration/De-registration  Bring Your Own Device  Authentication Methods Vendor Characteristics Enterasys Mobile IAM 13 NASSCOM, Mobility on the Move in India, Zinnov Managemen Consulting http://www.nasscom.org/mobility-move-india?fg=162893 14 Gartner, Mobile Device Management Evaluation Criteria, January 2012 http://www.gartner.com/DisplayDocument?docC ode=217549&ref=g_fromdoc Key Trends  ERP, CRM, SCM, along with email solutions expected to fuel the growth of the mobility market  Application maturity increase from the current dashboarding level to complete back-end integration  Declining mobility solutions costs are enabling SMBs to join the enterprise mobility bandwagon India’s mobility landscape:  840 million active mobiles operational  15% of smartphone market share  About 15 million mobile subscribers added every month  Laptop market is growing at a CAGR of 50 per cent  PC penetration in urban households have reached 38 per cent  There is an installed base of 25 million computers in India
  9. 9. Enterprise Mobility Page vii Advaiya Solutions Pvt. Ltd.  Simplified onboarding and provisioning  Secure, IT controlled BYOD solution with predictable network experience  Web based registration, Kerberos Snooping or activeAuthentication via 802.1X AirWatch’s Mobile Device Management  Employee owned and corporate owned devices deployed by IT admin or end user  Support for all major mobile platforms for a flexible BYOD program  Directory-based authentication, Via AD/LDAP, SAML, smart-card or tokens, two-factor user authentication MaaS360 Mobile Device Management  Over the air (OTA) enrollment requests (SMS, emails, custom URL)  Device decommissioning by removal of corporate data  Corporate and employee owned (BYOD) device  Authenticate against Active Directory (AD)/ Lightweight Directory Access Protocol (LDAP), using a one-timepasscode, or with Security Assertion Markup Language (SAML) Boxtone  OTA automated device self-provisioning  Enterprise-wide device Activate/Deactivate/Wipe/Quarantine  Users’ personal devices for BYOD ProMDM  OTA Device enrollment using iPhone/iPad application, or SMS with OTP authentication.  BYOD with separation of private and business information based on multipleprofiles  Simple Certificate Enrollment Protocol (SCEP) certificates for authentication Case Study Henry Ford Health System has deployed AirWatch − which currently secures and ensures BYOD compliancefor approximately 3,000 corporate-owned mobile devices and 2,500 personal devices. “Much of what we do as an IT organization is in response to what our customer base wants. With the capabilities of the [MDM platform], it fulfills what we need to do. We’re very pleased with the product and the way it is in our environment.” - Michael Staroscia, Client Technical Services Manager http://bit.ly/ZL1GQq Controlled Servicesexposure: Controlled Services exposure solutions help enterprises to expose applications and services (or just the specific features) to users and devices through a specific set of rules. This helps enterprises cost effectively provide security, compliance, application provisioning and management for BYOD environments. Important features that enterprises need to consider:  Centralized user access management  Application Level Policy  User Level Policy  Device Level Policy Vendor Characteristics Enterasys Mobile IAM  End-to-end visibility and control over access levels of applications, in multi-vendor infrastructures  identity and role based policy management  Mobile device complianceat network layer AirWatch’s Mobile Device Management
  10. 10. Enterprise Mobility Page viii Advaiya Solutions Pvt. Ltd.  Configure device security policies based on device ownership  Set up enrollment restrictions to block users or devices based on platform, version, etc.  Require acceptance of Terms of Use before granting access  Enforce restrictions on device features, apps and web browsing  Detect compromised devices and perform automated actions  Restrict native apps on a device, including YouTube, Siri and Camera  Whitelist or blacklist publicly available apps  Enforce application compliancepolicies and monitorstatus  Control user’s ability to edit, share or open files in unauthorized applications  Require user to view content online or prevent download over cellular connection  Restrict document access to a specific location through geofencing Absolute Manage for Mobile Device  Publish a list of approved apps onto each device and provide a single-click download/install process  Silently install/remove apps using management APIs  Policies to define window of time to access secured documents and corporate networks.  Policy-locked configuration profiles to stop non-compliant devices AT&T Mobile Device Management  Centrally manage user roles and access controls  Set device policies per job function and user group Case Study City of Redlands Arms and Manages Mobile Devices for its Officers on Patrol. Now the force has access to critical information, regardless of where they are, with the security that is demanded. “What AT&T proposed to uswas MobileIron, a centralized platform for managing all our devices remotely. It immediately solved the biggest issue, which was getting the 175 devices authenticated to use our Departmental apps. It also created our own private app store that makes our apps available toevery device, as needed. Ad we continue to develop our custom applications and push more and more information out to the mobile devices, we need to make sure that sensitive information isn’t accidentally made publicor put into the wrong hands.” http://soc.att.com/VcNuwZ SMS based servicesinvocation: SMS based services invocation solutions help enterprise integrate text/voice/multimedia messages to enhance application value and business to harness the power of SMS for application interface and usability enhancements, customer interaction, marketing etc. Important features that enterprises need to consider:  SMS Integration with other services/Applications using APIs  2 way SMS  Bulk SMS Vendor Characteristics SMS Global  Seamless integration with applications, including web sites, intranets, CRM's, ERP's and other corporate software through APIs  Support of 2-way SMS for one-to-one communication with customers  Set up a personalized sender ID for SMS  Support of bulk SMS and WAP Push and VCard SMS ZNI  Platform independent APIs to integrate with applications for better control and functionality  Used for lead generation and receiving feedbacks from customers  Supports bulk SMS packages that can be sent directly from Excel sheet
  11. 11. Enterprise Mobility Page ix Advaiya Solutions Pvt. Ltd. SMS Matrix  Send bulk message in fraction of seconds  Integration with legacy applications via use of simple APIs  Handles 2-way messaging using SMS, Voice and Text-to-Speech worldwide  Offers bulk FAX broadcasting  Bulk SMS scheduling Easy SMS: Communicator 2  Integrate with any backend system or application seamlessly with wide range of APIs  Use of 2-way messaging and short codes for direct line of communication  Set priority in bulk SMS while sending high volume of messages  Send email to SMS to send out reminders Enterprise Direct SMS  Standard protocols to integrate with enterprises' applications  Supports automated 2-way SMS communication channel forcustomers  Personalized short codes without rental or purchase fees  Multiple plans for different type of user Mozeo Text Messaging  Allow mobilecustomers share their thoughts and pictures in real time  Text message marketing through use of uniquemobile keywords for interaction  Supports mobile voting for an event, website or any marketing collaterals  Bulk SMS text blasting through online account center Case Study Five Tuition, needed an easy and cost effective way to communicatewith a growing number staff and an expanding clientele base. With SMSGlobal's API, Five Tuition integrated SMS into their existing database, to contact students, parents and staff via SMS. "With growing communication demands, weneeded to find a method of communication that would integrate seamlessly with our current system. Following the very simple online instructions, and with limited programming skills, I was able to successfully integrate our existing system with SMSGlobal's HTTP API. Our staff can now send bulk SMS's to tutors, students, or parents with ease." Peter Hanley, Manager, Five Tuition. http://bit.ly/Wjz2oi Enterprise Mobility Gateway: Enterprise Mobility gateway solutions helps organizations to selectively distribute enterprise application and data with remote users accessing enterprise information through variety of personal and corporate devices. Important features that enterprises need to consider:  Enterprise application availability for mobile user  User Access Controls  Users/Device Authentication Vendor Characteristics Symantec App Center  Policy enforcement for defining access controls for enterprise  Enforce policies like user authentication, re-authentication, data encryption on local storage access, off-lineaccess  Distribution of apps with corporate security and branding wrappers NetScaler Access Gateway  Seamless point of secure remote access
  12. 12. Enterprise Mobility Page x Advaiya Solutions Pvt. Ltd.  Supports single sign-on capabilities for all applications and data  Manage access control and set polices based on identity, location and the configuration of the endpoint device  User and device authentication based on the active directory WSO2 Cloud Gateway  Allows user to selectively publish services and data to the cloud in secure environment  User based authentication and authorization.  Administrator to manage access control and set polices based on user identity and roles Roverapp  Connect mobile devices with companies intranet applications securely without VPN  Access corporate applications and data based on their access policies and controls  Supports advance authentication methods Case Study To enable interactions between the mobilePOS systems and back-end software, ODEL has used components of the WSO2 Mobile Services Gateway Solution. This mobile POS systems serves as an express checkout option for those customers using a credit card to purchase five or fewer items. “WSO2 is a valuable partnerin enabling us to offer new solutions like the mobile POS systems that help drive customer loyalty and set us apart in the market.” – Thilanka Kiriporuwa, ODEL head of human resources and operations. http://bit.ly/qtqmxH Business Service Interface: Business Service Interface solutions allow organizations to expose internal applications through intermediary services to facilitate effective business collaboration in B2B and remote working scenarios. Important features that enterprises need to consider:  Messaging format supports  API support  Integration solution library Vendor Characteristics e-Zest Enterprise Application Integration  Supports Services oriented architectures (SOA’s) Messaging  Object Request Broker (ORB), Remote Procedure Call (RPC) and Subscribe based communication integration iWay Application System Adapters  Supports transportation over messaging software like WebSphere MQ and JMS  Provides direct links into packaged applications using a variety of APIs Enterprise Application Integration  Interactions with SaaS-based data via published APIs  Drag and drop assembly of application integration flows  Easily modifiable snaps based on open and standardized development environment MuleSoft Connectors  Instant API connectivity to most applications and services  Provision of a library of repeatable integration solutions EDI Application Integrator  Powerful architecture to build a library of application program interfaces (API’s)
  13. 13. Enterprise Mobility Page xi Advaiya Solutions Pvt. Ltd.  EDI Application Integrator for drag and drop mapping Jitterbit Application Integration Solutions  Application integration solutions supporting Enterprise Service Bus (ESB), Service Oriented Architecture (SOA), and point-to-point integration architectures Case Study ACAL BFi turned to Jitterbit to replace its unreliable coding-based integration with a standard platform to reduce the costs and resources required to provide a single view of the company’s ERP and CRM data. “Our previous integration tools were very slow and needed constant monitoring. In contrast, Jitterbit provided us with a st andard platform on which to build our integration projects, allowing us to quickly and cost-effectively synchronize data between our ERP and CRM applications. I have been able to configure and manage Jitterbit by myself, while giving the rest of the company an up -to-date view of all our pertinent data within the application they use on a daily basis.” -Keith Lovern, Technical Operations http://bit.ly/15kS2Ds
  14. 14. Enterprise Mobility Page xii Advaiya Solutions Pvt. Ltd. Conclusion Consumerization of IT has significantly increased the use of mobile devices in everyday life. With this widespread use of personalized devices to access corporate data, enterprise mobility management has gain prominence across various business verticals. With the Flexible work style scenarios enterprise apps can no more be restricted to inside the firewall usage. Though consumerization of IT has boosted employee productivity and flexibility but IT still has the responsibility to protect organizational intellectual property and is struggling with bring your own device (BYOD) programs and mobile data management. The mobility management framework helps business to determine current stage of enterprise mobility management, set and accomplish goals, and build roadmap to advance.
  15. 15. Enterprise Mobility Page xiii Advaiya Solutions Pvt. Ltd. References Enterasys Mobile IAM http://www.enterasys.com/products/advanced-security-apps/enterasys-network-access.aspx http://onefabric.net/byod/ETS_Mobile_IAM-Tracking_Users_and_Devices.pdf MaaS360 Mobile Device Management http://www.maas360.com/products/mobile-device-management/ http://content.maas360.com/www/content/ds/ds_maas360_mdm_overview.pdf AirWatch’s Mobile Device Management http://www.air-watch.com/solutions/mobile-device-management AirWatch's Mobile Security Solution http://www.air-watch.com/solutions/mobile-security Boxtone http://boxtone.com/mobile-device-management.aspx ProMDM http://www.promdm.com/product-overview/ Absolute Manage for Mobile Device http://www.absolute.com/products/absolute-manage-mdm SMS Global http://www.smsglobal.com/in/en/sms/apis.php http://www.smsglobal.com/in/en/sms/bulk_sms.php http://www.smsglobal.com/in/en/sms/2-way_sms.php SMS Matrix http://www.smsmatrix.com/?sms-messaging ZNI http://www.znisms.com/index.html Easy SMS: Communicator 2 http://www.clickatell.com/get-creative-with-sms/ Enterprise Direct SMS http://www.maxis.com.my/business/lmc/data/eds.asp Mozeo Text Messaging http://www.mozeo.com/text-messaging-services-features.php Symantec App Center
  16. 16. Enterprise Mobility Page xiv Advaiya Solutions Pvt. Ltd. http://www.symantec.com/app-center-enterprise-edition NetScaler Access Gateway http://www.citrix.com/products/netscaler-access-gateway/overview.html WSO2 Cloud Gateway http://wso2.com/products/cloud-gateway/ Roverapp http://roverapps.com/secure-browser e-Zest Enterprise Application Integration http://www.e-zest.net/it-services/custom-it-development/eai/ iWay Application System Adapters http://www.informationbuilders.com/products/applicationsystemadapters http://www.informationbuilders.com/products/pdf/iWaySysAdapters.pdf Enterprise Application Integration http://www.snaplogic.com/what-we-do/solutions/enterprise-application-integration.php http://www.snaplogic.com/resources/white-paper/future-proof-your-cloud-integration.pdf MuleSoft Connectors http://www.mulesoft.com/cloud-connectors-full EDI Application Integrator http://www.gecti.com/gxs.html Jitterbit Application Integration Solutions http://www.jitterbit.com/Solutions/application-integration
  17. 17. Enterprise Mobility Page xv Advaiya Solutions Pvt. Ltd. Glossary Term Long form/ Expansion Definition BYOD Bring Your Own Device Bring your own device (BYOD) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC/BYOC)) means thepolicy of permitting employees to bring personally owned mobiledevices (laptops, tablets, and smart phones) to their workplace, and use those devices to access privileged company information and applications AD Active Directory It is the software system that stores, organizes and provides access to information in a directory. In software engineering, a directory is a map between names and values. It allows the lookup of values given a name, similar to a dictionary LDAP Lightweight Directory Access Protocol It is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. OTP One-time password A one-time password (OTP) is a password that is valid for only one login session or transaction SMS Short Message Service (SMS) Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobilephone devices VOIP Voice Over Internet Protocol It commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Rooting It is the process of allowing users of smartphones, tablets, and other devices running the mobile operating system to attain privileged control (known as "root access") within subsystem. Jailbreak detection Jailbreaking is the process of removing the limitations on mobile devices through the use of software and hardware exploits. Jailbreaking permits root access to the operating system, allowing the download of additional applications, extensions, and themes that are unavailable through the official App Store. Encryption Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can Single sign- on Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Conversely, Single sign-off is the property whereby a single action of signing out terminates access to multiplesoftware systems. App blacklisting/ Whitelisting Application Whitelisting is a proactive security method where only approved programs are allowed to run and blocking rest of the programs from running by default. On the contrary, Application Blacklisting blocks certain programs while allowing rest to run by default. SD Secure Digital Secure Digital or (SD) is a non-volatile memory card format for use in portable devices, such as mobile phones, digital cameras, GPS navigation devices, and tablet computers. Sandbox Sandbox (computer security), a virtual container in which untrusted programs can be safely run. Sandbox (software development), an online environment in which code or content changes can be tested without affecting the original system DLP Data Leakage Prevention Data loss/leak prevention solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting & blocking sensitive data while in-use(endpoint actions), in-motion (network traffic), and
  18. 18. Enterprise Mobility Page xvi Advaiya Solutions Pvt. Ltd. at-rest (data storage) OTA Over-the-Air A general term for wireless programming of devices such as mobile phones and set- top boxes SAML Security Assertion Markup Language It is an XML-based open standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SCEP Simple Certificate Enrollment Protocol Simple Certificate Enrollment Protocol is an Internet Draft in the Internet Engineering Task Force (IETF). This protocol is being referenced by several manufacturers of network equipment and software who are developing simplified means of handling certificates for large-scale implementation to everyday users. Quarantine Isolation of unfit devices to ensure data and application security API Application Programming Interface An application programming interface (API) is a protocol intended to be used as an interface by software components to communicatewith each other. An API is a library that may includespecification for routines, data structures, object classes, and variables. CRM Customer Relationship Management Customer relationship management (CRM) is a model for managing a company’s interactions with current and future customers. It provides a 360 degree view of customer data. [citation needed] It involves using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support. ERP Enterprise Resource Planning Enterprise resource planning (ERP) systems integrate internal and external management information across an entire organization—embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. The purpose of ERP is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders. WAP Wireless Application Protocol Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol. VCard vCard is a file format standard for electronic business cards VPN Virtual Private Network A virtual private network (VPN) extends a private network and the resources contained in the network across public networks like the Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network SOA Services oriented Architecture Service-oriented architecture (SOA) is a set of principles and methodologies for designing and developing software in the form of interoperable services. These services have well-defined business functionalities that are built as software components (discrete pieces of code and/or data structures) which can be reused for different purposes ORB Object Request Broker Object request broker (ORB) is a piece of middleware software that allows programmers to make program calls from one computer to another via a network (so- called remote procedure calls). ORBs promote interoperability of distributed object systems because they enable users to build systems by piecing together objects from different vendors, so that they communicatewith each other via the ORB.
  19. 19. Enterprise Mobility Page xvii Advaiya Solutions Pvt. Ltd. RPC Remote Procedure Call Remote procedure call (RPC) is an inter-process communication that allows a computer program to cause a subroutine or procedure to execute in another address space (commonly on another computer on a shared network) without the programmer explicitly coding the details for this remote interaction. SaaS Software as a Service Software as a service, sometimes referred to as "on-demand software", is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser. EDI Electronic data interchange It is a method for transferring data between different computer systems or computer networks. It is commonly used by big companies for e-commercepurposes, such as sending orders to warehouses or tracking their order. ESB Enterprise Service Bus An enterprise service bus (ESB) is a software architecture model used for designing and implementing the interaction and communication between mutually interacting software applications in service-oriented architecture (SOA). As a software architecture model for distributed computing it is a specialty variant of the more general client server software architecture model and promotes agility and flexibility with regards to communication and interaction between applications.
  20. 20. Enterprise Mobility Page xviii Advaiya Solutions Pvt. Ltd. Contact Us Advaiya Solutions Pvt. Ltd. G14-17, IT Park, Madri Industrial Area, Udaipur 313002 India Phone:+91 294 305 1100 | Fax:+91 294 305 1300 infoudr@advaiya.com Advaiya, Inc. (Washington) 2475 140th Ave NE, Suite 201, Bellevue, WA 98005 USA Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201 Advaiya, Inc. (Silicon Valley) 440 North Wolfe Road, Sunnyvale, CA 94085, Silicon Valley Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201

×