Demystifying the Mobile Container - PART 2
Upcoming SlideShare
Loading in...5
×
 

Demystifying the Mobile Container - PART 2

on

  • 666 views

BYOD Security & Management: ...

BYOD Security & Management:
Mobile Containerization provides a way to separate work from play on mobile devices. In our previous webinar we reviewed the pros and cons of mobile containers for deploying hybrid apps, but mobile containers serve other useful purposes as well. In this webinar we'll discuss the utility of mobile containers for managing devices and securing data, especially relevant for BYOD environments.

Highlights:
- What is a mobile app "container?"
- What are the different uses for mobile app containers?
- How can you protect corporate data while respecting user's privacy on their own devices?
- What are the trade-offs in managing mobile apps and devices across the enterprise?

Statistics

Views

Total Views
666
Views on SlideShare
666
Embed Views
0

Actions

Likes
1
Downloads
27
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • On the positive side of the ledger, the enterprise mobility market matured (or exploded) in 2012. It came out of infancy and entered adolescence in certain respects. IT got much more involved – or was forced to get involved – which is great for Antenna as our core value has always resonated with the more technology-minded professionalsNative became sexy again, and enthusiasm for mobile web/HTML5/etc. became much more realistic as a result of a few tech juggernauts (e.g., Facebook) falling short of user expectations with their mobile web appsBut most importantly – what REALLY ignited this market – was the BYOD phenomenon. Unfortunately, Antenna and others of our MADP ilk were the immediate benefactors of this market tipping point. Instead, MDM players like A/W, Mobile Iron, Good, and others started printing money as IT groups began buying licenses en masse in a very knee-jerk manner for fear they would lose control (or possibly their jobs) if they didn’t get in front of this trend that had a life of its own.One the negative side of the ledger, while it’s hard to prove … anecdotally … the global economic crisis has certainly had in impact of buying patterns and investments in transformative technologies.But, what really affected us and caught us somewhat flat-footed was the wide use, adoption, implementation of free/open development toolsets. It put a spotlight on the fact that developers hold the keys in many respects and prefer to use the likes of Sencha, Jquery Mobile, PhoneGap to get to market quickly and inexpensively.
  • So if SECURITY is the main difference, what are companies doing to protect themselves? With all the talk about BYOD and everybody having a smartphone and everybody accessing company data from their personal devices there’s definitely opportunity for chaos and confusion and frustration. But IT departments and mobile software vendors and app developers have actually come up with some pretty clever solutions to the security challenge.This slide represents not just three different alternatives to mobile security, but almost a timeline of how security services have evolved and will probably continue to evolve.In the old days, like 5 or 6 years ago, people that use smart mobile devices for work probably got their device from their employer. And it was designated a company asset, like your laptop, and it was completely controlled by the IT department. So, you got your Windows Mobile device or your BlackBerry and, sure, you could make a personal phone call once in a while, but you didn’t have a lot of control over the software loaded on the device itself. And this gave IT a lot of control and peace of mind.But as BYOD became more popular and people started bringing their own smartphones and tablets to work, companies had to find a way to have control over some apps while not intruding on the apps that belong to the device owner, or employee. And so you see some creative solutions like separate spaces on the same device, or apps wrapped in a secure container.BlackBerry recently released BlackBerry 10 and one of the really compelling features is something called BlackBerry Balance ….
  • On the positive side of the ledger, the enterprise mobility market matured (or exploded) in 2012. It came out of infancy and entered adolescence in certain respects. IT got much more involved – or was forced to get involved – which is great for Antenna as our core value has always resonated with the more technology-minded professionalsNative became sexy again, and enthusiasm for mobile web/HTML5/etc. became much more realistic as a result of a few tech juggernauts (e.g., Facebook) falling short of user expectations with their mobile web appsBut most importantly – what REALLY ignited this market – was the BYOD phenomenon. Unfortunately, Antenna and others of our MADP ilk were the immediate benefactors of this market tipping point. Instead, MDM players like A/W, Mobile Iron, Good, and others started printing money as IT groups began buying licenses en masse in a very knee-jerk manner for fear they would lose control (or possibly their jobs) if they didn’t get in front of this trend that had a life of its own.One the negative side of the ledger, while it’s hard to prove … anecdotally … the global economic crisis has certainly had in impact of buying patterns and investments in transformative technologies.But, what really affected us and caught us somewhat flat-footed was the wide use, adoption, implementation of free/open development toolsets. It put a spotlight on the fact that developers hold the keys in many respects and prefer to use the likes of Sencha, Jquery Mobile, PhoneGap to get to market quickly and inexpensively.

Demystifying the Mobile Container - PART 2 Demystifying the Mobile Container - PART 2 Presentation Transcript

  • Demystifying the Mobile Container Part II: BYOD Security & Management © Copyright 2013 Antenna Software, Inc. All rights reserved. Presented by: Jim Somers Chief Marketing & Strategy Officer June 6, 2013 Confidential. Do not distribute.
  • WELCOME Our Agenda: 2 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. • What is a mobile app "container?" • What are the different types? • What do they actually do? • Why do we need them? • What are good examples? • Questions Wanna hear this webinar LIVE? Go to >> http://info.antennasoftware.com/MMWS-Library.html
  • WHAT WE DO AMPchroma helps you build, run, and manage all your mobile applications and content. ➦ Enabling you to get to market faster, have more flexibility, and better manage risk in this ever-changing mobile world. 3 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • ENTERPRISE-GRADE APP SAMPLES 44 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Ticketing app for train conductors Research library app Field Service app Mobile shopping app Field sales and distributors catalog appField Sales app
  • IT’S ALL VERY CONFUSING © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Container Sandbox Partition Hypervisor Persona Shell Separation Mode Wrapper Portal Walled Garden Hub Store 5
  • IT’S ALL VERY CONFUSING © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.6
  • DEVELOPMENT MANAGEMENT IT’S ALL VERY CONFUSING © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.7
  • MARKET SITUATION 8 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. • IT administrators want the security, management & control over their devices, users & apps MANAGEMENT (MDM/MAM) • It‟s where speed & usability … • … converge with management and control • Developers want to build apps quickly and deploy them to users as easily as possible. DEVELOPMENT (MEAP/MADP)
  • MARKET SITUATION 9 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. • IT administrators want the security, management & control over their devices, users & apps MANAGEMENT (MDM/MAM) • Developers want to build apps quickly and deploy them to users as easily as possible. DEVELOPMENT (MEAP/MADP) • But buyer beware! • Two solutions for 2 needs? • Or are they?
  • MOBILE DEVELOPMENT © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • THE HYBRID CLIENT © Copyright 2013 Antenna Software, Inc. All rights reserved. Device APIs Client Tier Native Container HTML5, CSS, Ja vaScript Web Content A native container allows developers to build apps that look, feel, and function like native apps, without building native apps. Confidential. Do not distribute. • HTML/CSS3 • JavaScript • JavaScript UI FW • Enterprise-grade • Reusability • Device Portability • Speed & Agility 11
  • TO LEARN MORE GO TO … 12 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. GO TO: http://bit.ly/Contain_This
  • MOBILE MANAGEMENT © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • THE OTHER CONTAINER Mobile containerization is the ability to partition, manage and secure data locally or virtually on a mobile device.* 14 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. * “Tech Overview of Mobile App Containers for Enterprise Data Management & Security”, P, Redman, Gartner, 1/24/13
  • WHY DO WE NEED THEM? Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. This is my very own device! * Source: Gartner
  • WHY DO WE NEED THEM? Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. This is my very own device! 70% of mobile professionals will conduct their work on personal smart devices by 2018.* * Source: Gartner
  • WHY DO WE NEED THEM? Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. This is my very own device! 70% of mobile professionals will conduct their work on personal smart devices by 2018.* 38% of companies plan to stop providing devices to workers by 2016 - rising to 50% by 2017.* * Source: Gartner
  • MDM CAPITALIZED ON THE TREND • Crowded market with over 100 vendors, globally • Estimated to be a $784M market today, growing to $1.6B by 2014 • 30% penetrated in North America • 65% revenue in NA; 17% in W. Europe; single digits ROW • 25% of sales in financial services, with MFG, H/C & Gov‟t right behind • Over 70% sales are <500 seats Mobile Device Management “Fun Facts” 18 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. * Source: Gartner “Magic Quadrant for Mobile Device Management Software” Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso, 5/23/13
  • TOO MUCH OF AN IRON FIST? Employees have started voicing serious concerns with MDM solutions – saying they‟re too intrusive and heavy-handed: • Why do you need access to the whole device? • Why are you telling me I can‟t use certain apps? • Who owns the data/IP if I leave? • Who do I call for support? 19 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • PLAY WORK ENTER THE CONTAINER 20 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. How can I protect the data in the apps my employees use for work … … separated and secure from the rest of their personal apps?
  • BEST OF BOTH WORLDS? © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. EMPLOYEE “I can use my own device for work and not feel like „Big Brother‟ is always watching me?” IT DEPT “I can have control over the company data being accessed from personally- owned devices?”
  • 1. Containers are effectively mobile apps that are loaded onto devices much like the typical OS-based installation process 2. When a user opens the container, they are instructed to go through an authentication process 3. Once authenticated, a virtual environment is launched whereby “approved” apps are accessible to the end user 4. IT administrators control the apps and content through a centralized management console 5. All apps and content used within the container are secured and the data is encrypted 6. All apps and content outside the container do not have access to the data store HOW THEY WORK 22 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • DIFFERENT SECURITY MODELS App App App Device Lock Down - Windows Mobile - BlackBerry <10 App App App App App App Separate Spaces - BlackBerry 10/Balance - Samsung Knox - AT&T Toggle - MDM players - MAM players - AMPchroma App App App App App App App Specific Security App App App 23 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • VENDOR LANDSCAPE MADP MAM Virtualization Security MDM Mobile app development platforms known mostly for WODA & some minimal MAM Mobile application management systems to create and manage enterprise app stores Extending the virtualization technology used to deliver desktop apps to mobile devices Security solutions create separate work & personal spaces on BYO devices Mobile device management platforms to address BYOD MOBILE ENTERPRISE 24 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • • Secure container that communicates with a client interface on the AMP Server • Management of multiple web apps via single native container (patented) • Enables real-time and offline capabilities • Built-in connectors and adapters provide easy integration to backend systems AMP CLIENT POWERED BY AMPCHROMA 25 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • AMP CLIENT POWERED BY AMPCHROMA 26 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. • Provision and deploy pre-authorized HTML5 apps within a single native client app • IT controls distribution and management of apps for employees • Marketing controls distribution of branded apps directly to consumers, bypassing app store approvals
  • 27 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. • Web console for remote control of apps, devices, users, and content • Role-based administration • Secure & control corporate- or personally- liable devices • Patented technology for automated remote device security MANAGER AMP MANAGER POWERED BY AMPCHROMA
  • AMPCHROMA 360° SECURITY & MANAGEMENT 28 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • NEXUS OF DEVELOPMENT & MANAGEMENT MDM BYOD Build Fast Open Flexible Manage Secure Controlled Compliant Container? 29 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • FROM THIS … © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Container Sandbox Partition Hypervisor Persona Shell Separation Mode Wrapper Portal Walled Garden Hub Store 30
  • Development Management … TO THIS © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Container 31 Containers provide developers with a fast, flexible and cost effective approach for building, deploying and updating cross- platform apps. They also isolate the company data from other components on a mobile device for greater security and control in an increasingly BYOD world.
  • Mobile Field Service: • Steris chose Hybrid – HTML5 inside secure native container • Users needed to view docs and capture signatures in order to speed-up and simplify the service order completion • Migrated from laptops to iPhone & Android • Integrated to Siebel & Kronos for time keeping, and Active Directory for SSO CUSTOMER EXAMPLE 32 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • © Copyright 2011 Antenna Software, Inc. All rights reserved.© Copyright 2012 Antenna Software, Inc. All rights reserved. STERIS USE CASE 33 iPhone & Android 1,500 usersSiebel & Kronos
  • CLOSING THOUGHTS • “Container” is a broad term and can mean different things to different people • They help developers get their apps built and deployed faster • They give IT the assurance that sensitive data will not commingle with personal data • There are lot‟s of different options in the marketplace, which makes it difficult to understand and appreciate their differences • When evaluating the providers consider what their legacy agenda/perspective is • Be sure to bring all parties to the table when selecting a container to make sure everyone‟s needs are being heard • Don‟t forget about the end user. Too much security and control can have an adverse affect on end user satisfaction and productivity. • The art is all this is finding the right balance of control vs. enablement • Find a solution that enables the business to move quickly, but not at the cost of data security 34 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • WHY ARE WE SO HAPPY? 75 of the F1000 brands rely on our platform every day, like Coke, Walmart, Xe rox, RBS and McGraw Hill. Gartner recognized us as a LEADER in their 2012 Magic Quadrant for Mobile App Development Platforms (MADP). You‟d be smiling too if you had over 200 million messages flowing through your servers each month. Dozens of carrier and ISV partners call our platform their own and take it to market under their brand. With our SAS70, SysTrust & FIPS140 certifications, we sleep well knowing our customers are secure. 35 © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • LIVE PROGRAM © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Wanna hear this webinar LIVE? Go to >> http://info.antennasoftware.com/MMWS-Library.html
  • FOLLOW ME AT … © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. @JimatAntenna www.linkedin.com/in/jimatantenna