The iThings And The Cloud
Upcoming SlideShare
Loading in...5
×
 

The iThings And The Cloud

on

  • 478 views

 

Statistics

Views

Total Views
478
Views on SlideShare
470
Embed Views
8

Actions

Likes
0
Downloads
1
Comments
0

1 Embed 8

http://speakerrate.com 8

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    The iThings And The Cloud The iThings And The Cloud Presentation Transcript

    • The iThings And The Cloud
      Consumerization of IT
      Dr. Jeannot Muller,
      VP, Head of Global Infrastructure Architecture,
      DEUTSCHE POST DHL, GBS IT Services
      22nd June 2011
    • Consumerization of IT
      Securing the Enterprise Landscape
      Protecting Data - Not Devices
      Agenda
    • The Compute Continuum
    • Consumerization was ajoke, then a threat, now obvious.
      Workers expect greater access any time, any place on any device. They will either work with or against IT to make it happen.
      While cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers.
      Consumerization of IT
    • IT needs to be prepared for the Compute Continuum:
      Provide and align on requirements and priorities.
      Abstract IT data and applications to function in diverse environments.
      Move to cloud based service offering over time.
      Establish a common development framework across devices.
      Better Be Prepared
    • IT needs to be prepared for the Compute Continuum:
      Provide and align on requirements and priorities.
      Abstract IT data and applications to function in diverse environments.
      Move to cloud based service offering over time.
      Establish a common development framework across devices.
      Better Be Prepared
    • Common Security Concept
      Blackberry
      • Only corporate container available
      • Device = corporate container
      • Comments
      • Security requirement: Private and corporate data must be separated (especially on private devices)
      • As long as no options available to separate private and corporate data on a Blackberry:Device = corporate container
      Corporate
      SandboxSolution
      • Private & corporate container available
      • Sandbox = corporate container
      • Deviceindependent
      Corp-orate
      Private
    • Securing The Landscape
      Public available apps
      Custom made apps for DPDHL
      • Apps for professional aspects which are approved for installation to the smart devices’ corporate container
      • End-2-End Process
      • Definition: Corporate Approved Apps
      Approval process
      Order
      Distri-bution
      Mainte-nance
      License Mgmt
    • 5 Tier Model – Protect Your Data
      Increasing access to data with enhanced security capabilities
    • THANK YOU.
      Jeannot.Muller@dhl.com