An Insiders Guide To – Solving The MDM Contradiction
Upcoming SlideShare
Loading in...5
×
 

An Insiders Guide To – Solving The MDM Contradiction

on

  • 2,486 views

Mobile Device Management (MDM) has largely become popular because it can completely obliterate all data on mobile devices. On the contrary, Mobile Application Management (MAM) is focused on the ...

Mobile Device Management (MDM) has largely become popular because it can completely obliterate all data on mobile devices. On the contrary, Mobile Application Management (MAM) is focused on the acceleration of development, deployment, and management of enterprise mobile applications.

In this session we will contrast the centralized device management focus of MDM, with the mobile user empowerment of MAM. We will discover why the rise of the worldwide Bring Your Own Device (BYOD) movement demands new mobility solutions driven to create new opportunities for collaboration and productivity.

Statistics

Views

Total Views
2,486
Views on SlideShare
2,336
Embed Views
150

Actions

Likes
2
Downloads
41
Comments
0

2 Embeds 150

http://www.apperian.com 146
http://webcache.googleusercontent.com 4

Accessibility

Upload Details

Uploaded via as Apple Keynote

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • \n
  • \n
  • \n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n

An Insiders Guide To – Solving The MDM Contradiction An Insiders Guide To – Solving The MDM Contradiction Presentation Transcript

  • Apperian. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . presents . . . . . . . . . . . An Insider’s guide to solving the mdm contradiction @APPERIAN #MDMcontradiction
  • CArlos E. Montero-Luque SVP ENGINEERING APPERIAN, INC. CARLOS@apperian.com
  • AgendaMobile Evolution Stakeholders User Centric vs Device Centric A Different Model Conclusion
  • The Evolution of Mobile Enterprise • eMail Access • Device Lock & Wipe • IT Was Gatekeeper Windows Blackberry Mobile 2015Users Corporate Issued Device 4
  • $6.6BThe Evolution of Mobile Enterprise market forrester 75.5% of US workforce mobile in ’13 • Smarter devices • Sophistication of workers • BYOD & Mobile workers • Bypassing IT; Cloud, Web, IaaS, SaaS 500k iOSx Apps, 400k Android Apps 3 Billion iPad Apps downloaded • New App marketplace 66% of US jobs 6.8 Million require PC/ devices activated Internet on Christmas ’11 18 Billion iOSx App downloads iPad $3B paid to app developers by Android Apple Windows iPhone Blackberry Mobile 2015Users Corporate Issued Device Bring-Your-Own-Device (BYOD) 4
  • $6.6BImplications market forrester 75.5% of US workforce mobile in ’13 Managing Devices 500k iOSx Apps, • Approved, standard-issue devices 400k Android Apps • Device locks, restricted access • Controlled application installs 6.8 Million devices activated • Device wipe threat response 66% of US jobs on Christmas ’11 require PC/ Internet 18 Billion iOSx App downloads iPad Android $3B paid to app Windows iPhone developers by Mobile Apple Blackberry 2015Users Corporate Issued Device Bring-Your-Own-Device (BYOD) Centralized Push 5
  • $6.6BImplications market forrester 75.5% of US workforce mobile in ’13 Managing Devices Empowering the Worker • Approved, standard-issue devices • User authentication &iOSx Apps, 500k integration 400k Android Apps • Device locks, restricted access Shift • Light touch and self-service • Controlled application installs • Common architecture 6.8 Million devices activated • Device wipe threat response • Consumer-likejobs 66% of US experience on Christmas ’11 require PC/ Internet 18 Billion iOSx App downloads iPad Android $3B paid to app Windows iPhone developers by Mobile Apple Blackberry 2015Users Corporate Issued Device Bring-Your-Own-Device (BYOD) Centralized Push Shift Self-Service Pull 5
  • The Stakeholders ina Mobile Enterprise ★ Can’t commingle business & personal ★ No useful enterprise apps Workers Enterprise Mobile Ecosystem !App! !IT! ★ Hard to manage app Providers! ★ Difficult to get apps dev lifecycle installed ★ Need access to ★ Apps & data needs enterprise customers to be secured 6
  • MDM is Device Centric 7
  • MDM is Device Centric 7
  • 8
  • Mobile App StoreApplication • Discover Apps ★ Can’t commingleManagement • Personalized content business & personal • Highly customizable ★ No useful enterprise • High-value business Apps apps Workers !App! !IT! ★ Hard to manage app Providers! ★ Difficult to get apps dev lifecycle installed ★ Need access to ★ Apps & data needs enterprise customers to be secured 9
  • Mobile App StoreApplication • Discover Apps ★ Can’t commingleManagement • Personalized content business & personal • Highly customizable ★ No useful enterprise • High-value business Apps apps Workers App Infrastructure • Secure identity management & SSO • App lifecycle management • SDK for App-level security • Compliance reporting • Device control • App analytics !App! !IT! ★ Hard to manage app Providers! ★ Difficult to get apps dev lifecycle installed ★ Need access to ★ Apps & data needs enterprise customers to be secured 9
  • Mobile App StoreApplication • Discover Apps ★ Can’t commingleManagement • Personalized content business & personal • Highly customizable ★ No useful enterprise • High-value business Apps apps Workers App Infrastructure App Support • • Secure identity management & SSO App lifecycle management • Helping users find • SDK for App-level security enterprise apps • Compliance reporting • Simplified publishing • Device control • App lifecycle • App analytics !App! !IT! ★ Hard to manage app Providers! ★ Difficult to get apps dev lifecycle installed ★ Need access to ★ Apps & data needs enterprise customers to be secured 9
  • High%Level%MAM%and%MDM%Comparison% MAM% MDM% Primary%Focus% Users% Devices% User>Centric%Apps%and% Managed%Element% Mobile%Device%% Content% Usage%model% Self%Service% Central%Push% Best%Suited%for% IL%&%CL% CL% Delivery% Cloud%based% On%premise%(typically)% 10
  • MAM#vs#MDM# MAM# MDM# Primary#Target## Mobility#Professionals,#Line#of# Securing#Devices,#CompanyA Business,#Produc<vity,#Usability,# owned,#Full#Control,#Restric<ons# Collabora<on# for#Protec<on# Differences# •  UserAcentered#management## •  DeviceAspecific#management# •  Supports#user#experience,# •  Tradi<onal#systems# personal#content# management# •  Secures#apps#and#content# •  “Extend”#the#firewalls,#full# •  AddAon#MDM# device#control#and#full#access# •  Supports#IT#goals## control# •  SDK#for#applica<on#development# •  Fits#with#exis<ng#large# and#integra<on# management#frameworks# Unique#Strengths# Highly#scalable,#trivial#to#deploy.# Lock#down,#deal#with#theS,#full# Private,#branded#experience# control,#wiping#devices#clean.# without#limi<ng#access#to# personal#content#or#risking#it.# 11
  • A"Word"About"Security" •  Security"is"context"dependent" •  Some"environments"must"be"as"secure"as"humanly"possible" •  Some"environments"require"access"control,"applica;on<level"security,"audi;ng"and" repor;ng"for"compliance,"governance,"remedia;on" •  MDM"has"a"role"to"play"in"highly"secure"environments,"where"devices"must" be"controlled" •  But"most"of"the"value"increase"in"mobility"is"not"addressed"by"MDM" •  BYOD" •  Security"at"the"app"level" •  MAM"respects"and"protects"the"role"of"IT"while"enabling"users"and" organiza;ons"to"thrive" •  Core"MDM"func;onality"is"a"feature"set"within"MAM,"for"niche"high<security" environments" 12
  • Conclusion• Mobile enterprise deployments are no longer simple extensions of enterprise IT environments• The explosion of mobile apps and the BYOD movement are not transitional developments. • They fundamentally alter the relationship among the different stakeholders in the mobile enterprise environment• MDM as a traditional systems management-based view of mobile management fails at addressingthe needs and capabilities of enterprise mobile users and may provide a false sense of security• MAM is the right solution for enterprise mobile management • MAM frees users to be as productive and effective with the best user experience while it enables IT to continue their mission to protect corporate assets • MDM capabilities within MAM may be important for special types of deployments (ultra-secure environments, theft/loss sensitive deployments, etc.) 13
  • CArlos E. Montero-Luque SVP ENGINEERING APPERIAN, INC. CARLOS@apperian.com