Enterprise Mobile Apps: Beauty & The BeastBYOD, Enterprise Integration, and Beautiful Mobile AppsChris O’Connor, CEO & Co-...
Housekeeping Questions - Chat any questions you have and we’ll answer them at the end of this call                       ...
“Beauty”…Visually appealingHighly functionalUnclutteredIntuitiveSmoothPersonal
Beauty – The Mobile Enterprise Worldwide mobile trends ...  - “By 2015, more U.S. Internet users will access the Internet...
Why “Beautiful” Apps Matter - Mobile devices have become personal extensions Better Productivity - BYOD enables work on o...
“The Beast”…
“The Beast” – The Challenges of Mobile   - Identity management Security   - Application and data lifecycle (access → trans...
The Shedding of Tiers                Web Application     Presentation     Business Logic      Data Access                 ...
The Shedding of Tiers                Mobile Devices     Presentation     Business Logic      Data Access                  ...
The Shedding of Tiers                Mobile Devices     Presentation     Business Logic      Data Access                  ...
The Shedding of Tiers                 Mobile Devices      PresentationBusiness and Data Services       Data Access        ...
The Shedding of Tiers          Presentation                         Mobile DevicesBusiness and Data Services              ...
APIs: The New Perimeter BYOD       Presentation                           Mobile Devices             API  Business and Dat...
APIs: The New Perimeter BYOD       Presentation                           Mobile Devices             API  Business and Dat...
Beauty…
Beautiful Apps Are                     INTUITIVE
Beautiful Apps Are                     focused
Taptera Collateral Demo
Taptera Rooms Demo
Resulting In
Taming the Beast
Layer 7 Mobile Access Gateway A lightweight, low-latency mobile gateway for solving critical mobile challenges in the  fo...
Identity: Extending Enterprise Identity to Mobile Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON We...
Identity: Extending Enterprise Identity to Mobile Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON We...
Security: Mobile Application Firewalling Protect REST, SOAP and OData APIs against DoS and API attacks Proxy API streami...
Security: Mobile Application Firewalling Protect REST, SOAP and OData APIs against DoS and API attacks Proxy API streami...
Adaptation: Translate & Orchestrate Data & APIs Surface any legacy application or database as RESTful APIs Quickly map b...
Adaptation: Translate & Orchestrate Data & APIs Surface any legacy application or database as RESTful APIs Quickly map b...
Optimization: Handle Scale Cache calls to backend applications Recompose small backend calls into efficiently aggregated...
Optimization: Handle Scale Cache calls to backend applications Recompose small backend calls into efficiently aggregated...
Integration: Centralize Cloud Connectivity Proxy and manage app interactions with social networks Broker call-outs to cl...
Integration: Centralize Cloud Connectivity Proxy and manage app interactions with social networks Broker call-outs to cl...
Summary BYOD and Mobility are sweeping Enterprise IT Beautiful Apps will lead to greater productivity Taptera’s enterpr...
Q&A      Questions?
Upcoming SlideShare
Loading in …5
×

BYOD Enterprise Mobility: Beauty & the Beast

1,216 views
1,140 views

Published on

Employees are bringing their mobile devices into the workplace and increasing the demand for enterprises to provide applications that allow them to work on the go. Enterprises are also seeing the benefits of BYOD with increased productivity, reduced costs and higher job satisfaction. But how do you ensure that you're providing secure enterprise apps while maintaining ease of use? This webinar, featuring Layer 7 and Taptera, will look at how you can provide rapid and secure mobile access infrastructure, and enterprise mobile apps that are consistent with the popular consumer app experience employees are used to.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,216
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
30
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

BYOD Enterprise Mobility: Beauty & the Beast

  1. 1. Enterprise Mobile Apps: Beauty & The BeastBYOD, Enterprise Integration, and Beautiful Mobile AppsChris O’Connor, CEO & Co-founder, TapteraMatt McLarty, VP Client Solutions, Layer 7 Technologies
  2. 2. Housekeeping Questions - Chat any questions you have and we’ll answer them at the end of this call facebook.com/layer7 Twitter - Today’s event hashtag: - #L7webinar layer7.com/linkedin layer7.com/blogs - Follow us on Twitter: - @Layer7 - @Taptera - @MattMcLartyBC - @NowHearChris
  3. 3. “Beauty”…Visually appealingHighly functionalUnclutteredIntuitiveSmoothPersonal
  4. 4. Beauty – The Mobile Enterprise Worldwide mobile trends ... - “By 2015, more U.S. Internet users will access the Internet through mobile devices than through PCs or other wireline devices.” - “By 2015, the worlds mobile worker population will reach 1.3 billion, representing 37.2% of the total workforce.” Trends driving the growth of Mobile in Enterprise IT ... Source: IDC (September 2011, January 2012) - Consumerization, BYOD - Verticalization - New devices & device categories - Cloud-based mobile applications - Emerging M2M technologies “Mobility is poised to become the next major IT paradigm. This gravitational shift will bring an array of opportunities and challenges to the chief information officers in most enterprises.” Source: McKinsey (June 2012)
  5. 5. Why “Beautiful” Apps Matter - Mobile devices have become personal extensions Better Productivity - BYOD enables work on one’s favourite “toy” - An appealing, usable, functional app further incents usage Personal mobile devices—tablets, smartphones—are ubiquitous Greater Accessibility New form factor brings new capabilities—geo-location, presence, photo - Truly “always-on” - Speed and consumability compel usage - -
  6. 6. “The Beast”…
  7. 7. “The Beast” – The Challenges of Mobile - Identity management Security - Application and data lifecycle (access → transport → storage → removal) Deployment complexity - New mobile apps - Integration with existing applications and systems - Platform fragmentation Technology - Pace of change - Privacy issues Governance
  8. 8. The Shedding of Tiers Web Application Presentation Business Logic Data Access Relational Database
  9. 9. The Shedding of Tiers Mobile Devices Presentation Business Logic Data Access Big Data
  10. 10. The Shedding of Tiers Mobile Devices Presentation Business Logic Data Access Big Data
  11. 11. The Shedding of Tiers Mobile Devices PresentationBusiness and Data Services Data Access Big Data
  12. 12. The Shedding of Tiers Presentation Mobile DevicesBusiness and Data Services Big Data
  13. 13. APIs: The New Perimeter BYOD Presentation Mobile Devices API Business and Data Services Big Data
  14. 14. APIs: The New Perimeter BYOD Presentation Mobile Devices API Business and Data Services Big Data
  15. 15. Beauty…
  16. 16. Beautiful Apps Are INTUITIVE
  17. 17. Beautiful Apps Are focused
  18. 18. Taptera Collateral Demo
  19. 19. Taptera Rooms Demo
  20. 20. Resulting In
  21. 21. Taming the Beast
  22. 22. Layer 7 Mobile Access Gateway A lightweight, low-latency mobile gateway for solving critical mobile challenges in the following areas:
  23. 23. Identity: Extending Enterprise Identity to Mobile Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens Create granular access policies at user, app and device levels Build composite access policies combining geolocation, message content and other network attributes Simplify PKI-based certificate delivery and provisioning +
  24. 24. Identity: Extending Enterprise Identity to Mobile Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens Create granular access policies at user, app and device levels Build composite access policies combining geolocation, message content and other network attributes Simplify PKI-based certificate delivery and provisioning Firewall Mobile Devices & Apps + Protected Resource Authorization & Resource Server Identity Access Management
  25. 25. Security: Mobile Application Firewalling Protect REST, SOAP and OData APIs against DoS and API attacks Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging Enforce FIPS 140-2 grade data privacy and integrity Validate data exchanges, including all JSON, XML, header and parameter content
  26. 26. Security: Mobile Application Firewalling Protect REST, SOAP and OData APIs against DoS and API attacks Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging Enforce FIPS 140-2 grade data privacy and integrity Validate data exchanges, including all JSON, XML, header and parameter content Firewall Mobile Devices & Apps Hacker Protect against attacks: DOS, SQL Injection, XSS, … Enterprise Resources
  27. 27. Adaptation: Translate & Orchestrate Data & APIs Surface any legacy application or database as RESTful APIs Quickly map between data formats such as XML and JSON Recompose & virtualize APIs to specific mobile identities, apps and devices Orchestrate API mashups with configurable workflow
  28. 28. Adaptation: Translate & Orchestrate Data & APIs Surface any legacy application or database as RESTful APIs Quickly map between data formats such as XML and JSON Recompose & virtualize APIs to specific mobile identities, apps and devices Orchestrate API mashups with configurable workflow Firewall Mobile Devices & Apps Legacy Enterprise Applications & Databases
  29. 29. Optimization: Handle Scale Cache calls to backend applications Recompose small backend calls into efficiently aggregated mobile requests Compress traffic to minimize bandwidth costs and improve user experience Pre-fetch content for hypermedia-based API calls
  30. 30. Optimization: Handle Scale Cache calls to backend applications Recompose small backend calls into efficiently aggregated mobile requests Compress traffic to minimize bandwidth costs and improve user experience Pre-fetch content for hypermedia-based API calls Firewall Mobile Devices & Apps Enterprise Applications
  31. 31. Integration: Centralize Cloud Connectivity Proxy and manage app interactions with social networks Broker call-outs to cloud services like Salesforce.com Bridge connectivity to iPhone, Windows and Android notification services Integrate with legacy applications using ESB capabilities
  32. 32. Integration: Centralize Cloud Connectivity Proxy and manage app interactions with social networks Broker call-outs to cloud services like Salesforce.com Bridge connectivity to iPhone, Windows and Android notification services Integrate with legacy applications using ESB capabilities Firewall Cloud Services & Social Networks On-Premise Enterprise Applications End User
  33. 33. Summary BYOD and Mobility are sweeping Enterprise IT Beautiful Apps will lead to greater productivity Taptera’s enterprise apps are fast, beautiful and secure Simplifying mobile access to the enterprise helps to keep apps beautiful The Layer 7 Mobile Access Gateway solves key needs: - Identity - Security - Adaptation - Optimization - Integration
  34. 34. Q&A Questions?

×