• Like

Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ The Mobile Show Asia

  • 250 views
Uploaded on

Devon Winkworth, Snr. Principal Consultant for Layer 7, presented on the essentials for BYOD & Mobile Enablement during The Mobile Asia Show in Singapore. He discusses BYOD and the app explosion and …

Devon Winkworth, Snr. Principal Consultant for Layer 7, presented on the essentials for BYOD & Mobile Enablement during The Mobile Asia Show in Singapore. He discusses BYOD and the app explosion and factors driving BYOD Adoption, along with approaches to address challenges with BYOD.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
250
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
7
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Enterprise on the Go: Essentials for BYOD & Mobile Enablement
  • 2. Copyright © 2014 CA. All rights reserved. A Little bit about Me… Devon Winkworth
  • 3. Copyright © 2014 CA. All rights reserved. Agenda “Bring Your Own Device” • BYOD and the App Explosion • Factors Driving BYOD Adoption Challenges • What are the Challenges with BYOD? • Old thinking with New Technology Approaches • Take care of the device • Don’t forget about the application
  • 4. Copyright © 2014 CA. All rights reserved. BYOD: Bring your Own Device Courtesy of Click Software
  • 5. Copyright © 2014 CA. All rights reserved. BYOD: iPad @ Work – from IDG Connect “iPad for Business Survey 2012”
  • 6. Copyright © 2014 CA. All rights reserved. The App Explosion Courtesy of zendesk Courtesy of [x]cube Labs
  • 7. Copyright © 2014 CA. All rights reserved. Key Factors Driving Firms to Deploy BYOD Programs Source: Forrester Research, Inc. Key Strategies to Capture and Measure the Value of Consumerization of IT (July 2012) “Many employees expect to use their personally selected smartphones, tablets, laptops, and other devices from Apple, Google, Research In Motion (RIM), and other platform providers for work.”
  • 8. Copyright © 2014 CA. All rights reserved. Network Mobile App-to-Enterprise Service Integration Challenges Enterprise Services Data Services Mobile Devices Proliferation of mobile devices increases message volumes exponentially Service API’s not available in mobile- friendly formats & protocols (REST, JSON) Composite services need API’s from multiple providers, requiring federation Data privacy and integrity must be preserved end-to-end BYOD approach mixes personal and business use, blurring the security perimeter API’s must be reusable across multiple mobile and non-mobile platforms
  • 9. Copyright © 2014 CA. All rights reserved. New Technology, Old Thinking  We’ve had mobility for years now  We have effective solutions for these devices managing and securing the information on these devices  We have to look at the whole mobile security challenge differently  The danger we face today is that we try and graft old solutions onto this new technology  If there is anything that Apple has taught us is that you cannot think of them or treat them the same way  You can’t build apps for them and you can’t secure transactions to/from them in the same fundamental way
  • 10. Copyright © 2014 CA. All rights reserved. Who Owns your Mobile Strategy? Driven from Executive Suite The Question is not easily answered… The group that ends up wearing this of course is IT
  • 11. Copyright © 2014 CA. All rights reserved. Classic Security Solution What worked in the past… Is this the right solution for the new world of mobility? … and the answer is … Directory Identity & Access Management (IAM) VPN
  • 12. Copyright © 2014 CA. All rights reserved. What we have Today… Software that secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. Device Inventory Locate/Track Device Network/wifi Settings Backup Management Manage Synchronisation Manage Access to Cloud Synchronisation Device Encryption, Wipe, Data Fading Password Policy, Remote Lock Jailbreak Detection User Communication App Inventory Black List/White List App Store Management App Configuration Provisioning VPN Configuration Provisioning Roaming Policy Management
  • 13. Copyright © 2014 CA. All rights reserved. MDM may not be enough…
  • 14. Copyright © 2014 CA. All rights reserved. New Technology, New Thinking
  • 15. Copyright © 2014 CA. All rights reserved. New Challenges… I am…  A name  A Device  An App  From Location  In a Jurisdiction  At a moment in time API Client Developers API Server Developers InternalExternal
  • 16. Copyright © 2014 CA. All rights reserved. New Challenges… Firewall Enterprise Network Internal Server Directory
  • 17. Copyright © 2014 CA. All rights reserved. New Challenges… Silos App layer Persistence layer
  • 18. Copyright © 2014 CA. All rights reserved. Strategies Firewall Enterprise Network API Server API Client API Proxy Security Admin
  • 19. Copyright © 2014 CA. All rights reserved. Strategies Firewall Enterprise Network API Server API Client iPhone Developer API Portal API Proxy
  • 20. Copyright © 2014 CA. All rights reserved. Strategies Firewall Enterprise Network API Server API Proxy Security Admin  Do SSL right  Make OAuth easy  Manage sessions automatically  Configure by Policy not Code
  • 21. Copyright © 2014 CA. All rights reserved. Putting Theory into Practice – Customer Perspectives 37+ applications deployed to both iPad & iPhone Application focus is user experience • Simple applications do one thing well Mobile Device Management (MDM) part of the infrastructure  Security & Application Architecture Speeds Development • Employ Mobile Access Gateway • Utilise standards such as Web Services in mobile friendly way Employ Mobile Device Management (MDM) • Passcode requirements and remote data wipes Plan for the worst with numerous security layers • Utilise OAuth 2.0 for ease of use with REST and Federation to 3 Parties Employ Mobile Access Gateway • Integration with various Authentication Providers • Ability to cope with multiple security protocols Utilise simpler REST protocols over heavier SOAP
  • 22. Copyright © 2014 CA. All rights reserved. In Summary Employees are bringing mobile devices to work en masse… …and IT groups must accommodate them without compromising security and SLA’s Mobile Apps are being built to improve productivity and reduce cost… …existing enterprise services can be used to quickly and reliably enable these apps Enterprise API Management integrates Mobile Apps and Enterprise Services… …through the use of a Secure Mobile Access Gateway, an API Portal, and open standards
  • 23. Copyright © 2014 CA. All rights reserved. Thank You