Your SlideShare is downloading. ×
The iThings And The Cloud
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

The iThings And The Cloud

370
views

Published on

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
370
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The iThings And The Cloud
    Consumerization of IT
    Dr. Jeannot Muller,
    VP, Head of Global Infrastructure Architecture,
    DEUTSCHE POST DHL, GBS IT Services
    22nd June 2011
  • 2. Consumerization of IT
    Securing the Enterprise Landscape
    Protecting Data - Not Devices
    Agenda
  • 3. The Compute Continuum
  • 4. Consumerization was ajoke, then a threat, now obvious.
    Workers expect greater access any time, any place on any device. They will either work with or against IT to make it happen.
    While cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers.
    Consumerization of IT
  • 5. IT needs to be prepared for the Compute Continuum:
    Provide and align on requirements and priorities.
    Abstract IT data and applications to function in diverse environments.
    Move to cloud based service offering over time.
    Establish a common development framework across devices.
    Better Be Prepared
  • 6. IT needs to be prepared for the Compute Continuum:
    Provide and align on requirements and priorities.
    Abstract IT data and applications to function in diverse environments.
    Move to cloud based service offering over time.
    Establish a common development framework across devices.
    Better Be Prepared
  • 7. Common Security Concept
    Blackberry
    • Only corporate container available
    • 8. Device = corporate container
    • 9. Comments
    • 10. Security requirement: Private and corporate data must be separated (especially on private devices)
    • 11. As long as no options available to separate private and corporate data on a Blackberry:Device = corporate container
    Corporate
    SandboxSolution
    • Private & corporate container available
    • 12. Sandbox = corporate container
    • 13. Deviceindependent
    Corp-orate
    Private
  • 14. Securing The Landscape
    Public available apps
    Custom made apps for DPDHL
    • Apps for professional aspects which are approved for installation to the smart devices’ corporate container
    • 15. End-2-End Process
    • 16. Definition: Corporate Approved Apps
    Approval process
    Order
    Distri-bution
    Mainte-nance
    License Mgmt
  • 17. 5 Tier Model – Protect Your Data
    Increasing access to data with enhanced security capabilities
  • 18. THANK YOU.
    Jeannot.Muller@dhl.com

×