SlideShare a Scribd company logo
1 of 23
Download to read offline
How Enterprises Go
Mobile: An Introduction to
MobileIT
Josh Sirota, Principal Architect, Office of the CTO,
MobileIron
“How do I distribute apps
and embrace BYOD?”
“How do I secure and
mobilize content?”
“How do I manage security,
identity, and privacy?”
“I need to move at consumer speed,
without sacrificing security and compliance”
“How do I manage the explosion
of operating systems?”
The Journey to
The Mobile First Enterprise
Users Enterprise IT
Adopt
Devices
BYOD
Email access
Multi-OS device security
The Journey to
The Mobile First Enterprise
Users Enterprise IT
Adopt
Devices
BYOD
Email access
Multi-OS device security
Deliver Apps
& Content
Transformation
New business processes
New user experiences
Mobile
First
Mobile First
The technology landscape
5
MDM: Traditionally the “command & control” system that configures, monitors
devices, provides inventorying, etc.
MAM: Provides an application store and the ability to extend MDM functions into
enterprise and commercially developed apps. Standalone options exist, but lack
of integration with MDM and devices makes for challenging implementations.
MIM / MCM: Enables access to content resources, either established enterprise
repositories (e.g. CIFS, SharePoint) or new, mobile-specific content repositories
(e.g. Box)
MEM - Mobile Enterprise Management:
Technology that allows for all aspects of an enterprise mobility deployment to be
managed from a single platform. Combines the best of MDM, MAM and MIM
Phase 1: Designing your
BYOD & Multi-OS Strategy
6
Navigating the hype
BYOD is becoming the norm
–  IDC: More personal devices than corporate devices sold for business use
–  Forrester: ~60% of companies have a BYOD initiative in place
–  MobileIron: 70% of customers have a BYOD initiative in place
Beware the buzzword
–  Hype hides complexity
–  Hype creates false expectations
–  Hype results in ill-formed initiatives and disillusionment
Driver of BYOD should be choice, not cost
BYOD != “Let users have whatever they want”
BYOD programs must be responsible not
restrictive
BYOD programs cannot damage the user experience
•  Diminish value to the enterprise
•  Limit user adoption
•  Limit user productivity
Building your BYOD Workflow
BYOD program components
Prepare
•  Establish Goals and
charter
•  Stakeholder
accountability - HR,
Legal, IT, LOB
•  Employee survey
•  BYOD capability
assessment
•  Trust model
•  Economic model
•  Payment model
•  Legal assessment
(including regional)
User experience is the litmus test for BYOD adoption and sustainability
Build
•  Staffing and resource
recommendation
•  Employee
communications
guidelines
•  Managed choice
device list
•  Device lifecycle
management guide
•  Security policy
•  Privacy policy
•  Guidelines for app
design and rollout
Rollout
•  Phased roll-out plan
•  Welcome
communications
•  IT and program
branding
•  FAQ
•  User agreement
•  User registration
instructions
•  Ongoing education
– policy, rationale,
compliance,
consequences
Sustain
•  Ongoing end-user
communication
•  Satisfaction survey
•  Program entitlement
•  Compliance
enforcement
•  Service desk
management
•  Service desk
troubleshooting
•  Technology
evolution
BYOD evolution
“Help-yourself-desk” will drive economics
Identity will become strategic glue across services
BYOEà Experience = Device + App + Connectivity
Mobile BYOD principles will apply to laptops/desktops
OS turbulence will continue as user preferences shift
Selecting your OS(es) of choice
•  Very consistent OS
distribution globally
•  Many enterprise &
prosumer apps
available
•  Robust, consistent
enterprise support;
•  Requires agreement
with Apple developer
programs
•  Limited hardware
selection & discounts
12
•  Reuse of Visual Studio
resources toward mobile
app development
•  MSFT support & svcs
•  Unique user interface
design
•  Support for MDM on
smartphones now.
Laptops, tablets coming
•  SCCM policies not
directly applicable
•  Few 3rd-party apps
•  Extremely
customizable
operating system
•  Wide variety of OS
variants in wild (41%
run Android <= 2.3)
•  Flexibility in app
development &
distribution
•  Wide variety of HW
•  Deep enterprise
support through
ODMs & software
Phase 2: Design & Build
Mobile Apps
13
I. Experience
•  Singular function … not comprehensive features
•  Fast cycles … 8 week dev, 9 month life, 3 platforms
•  High expectations … UX litmus test for adoption
Consumer apps for the employee
... not …
Business apps for the enterprise
II. Architecture
• Services architecture
• Content sources and access
• Lessons from the e-commerce experience
“If I had more time, I would have written a
shorter letter.”
III. Role of IT
API accessibility and support
UX and design best practices and support
Consumer-grade discovery experience
Plug ‘n play security (easy for developer, invisible to user)
Developer sourcing
Can IT provide value to the app developer?
Tools to drive and measure adoption
Getting the program right
Prepare
•  Voice of the user
•  App business case
template
•  Charter and
sponsorship
•  Stakeholder guide
•  Budget and resources
template
•  Privacy
considerations
•  Developer selection
guide
Build
•  Trusted design
principles
•  Platforms/OS decision
tree
•  Content
management best
practices
•  App signing and cert
provisioning guide
•  Cross-platform tools
and standards
•  Testing guidelines
•  Approval and
submission template
Rollout
•  Distribution best
practices
•  Payment model
•  Metrics guide
•  User
communications
and documents
•  Self-service
deployment guide
Sustain
•  Self-service support
model
•  App storefront
maintenance guide
•  App upgrade best
practices
•  Retirement template
(lifecycle)
Phase 3: Go Mobile First
21
22
Definition…
Mobile First organizations
embrace mobility as their primary
IT platform in order to transform
their businesses and increase their
competitiveness
Content of all types is
easily and securely
available on any device
CONTENT
End users choose their
devices
Security is invisible
to end users
User experience is the
#1 design criteria
USER EXPERIENCES
New apps are
developed and delivered
to mobile devices first
Core business
processes can be
performed on any
device
APPLICATIONS
In a Mobile First Company…
23

More Related Content

What's hot

5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
CIS13: Deliver Secure Apps with Great Experiences
CIS13: Deliver Secure Apps with Great ExperiencesCIS13: Deliver Secure Apps with Great Experiences
CIS13: Deliver Secure Apps with Great ExperiencesCloudIDSummit
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 
e-Discovery & Records Management
e-Discovery & Records Managemente-Discovery & Records Management
e-Discovery & Records ManagementNetwoven Inc.
 
From Usability to User Experience
From Usability to User Experience From Usability to User Experience
From Usability to User Experience U1 Group
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
PortHand Overview August 2013
PortHand Overview August 2013PortHand Overview August 2013
PortHand Overview August 2013PortHand
 
What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?Partnerpedia
 
Mobile Application Developer
Mobile Application DeveloperMobile Application Developer
Mobile Application DeveloperEr. Amreesh Kumar
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture StrategyGary Wong
 
MobileAppDev Handout#1
MobileAppDev Handout#1MobileAppDev Handout#1
MobileAppDev Handout#1trupti1976
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overviewDavid Scruggs
 
Enterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesEnterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesAlgarytm
 
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDMWSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDMWSO2
 
User Interface Design @iRajLal
User Interface Design @iRajLalUser Interface Design @iRajLal
User Interface Design @iRajLalRaj Lal
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...Michael Jacobsen
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobilitykhanrock247
 
2011 IBM Collaboration Solutions Directions and Strategy
2011 IBM Collaboration Solutions Directions and Strategy2011 IBM Collaboration Solutions Directions and Strategy
2011 IBM Collaboration Solutions Directions and StrategyAnna O'Neal
 

What's hot (20)

5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
CIS13: Deliver Secure Apps with Great Experiences
CIS13: Deliver Secure Apps with Great ExperiencesCIS13: Deliver Secure Apps with Great Experiences
CIS13: Deliver Secure Apps with Great Experiences
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
e-Discovery & Records Management
e-Discovery & Records Managemente-Discovery & Records Management
e-Discovery & Records Management
 
From Usability to User Experience
From Usability to User Experience From Usability to User Experience
From Usability to User Experience
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
PortHand Overview August 2013
PortHand Overview August 2013PortHand Overview August 2013
PortHand Overview August 2013
 
What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?
 
Mobile Application Developer
Mobile Application DeveloperMobile Application Developer
Mobile Application Developer
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Wp byod
Wp byodWp byod
Wp byod
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture Strategy
 
MobileAppDev Handout#1
MobileAppDev Handout#1MobileAppDev Handout#1
MobileAppDev Handout#1
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overview
 
Enterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunitesEnterprise mobility challenges and opportunites
Enterprise mobility challenges and opportunites
 
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDMWSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
 
User Interface Design @iRajLal
User Interface Design @iRajLalUser Interface Design @iRajLal
User Interface Design @iRajLal
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
2011 IBM Collaboration Solutions Directions and Strategy
2011 IBM Collaboration Solutions Directions and Strategy2011 IBM Collaboration Solutions Directions and Strategy
2011 IBM Collaboration Solutions Directions and Strategy
 

Viewers also liked

CIS13: Which Way Forward
CIS13: Which Way ForwardCIS13: Which Way Forward
CIS13: Which Way ForwardCloudIDSummit
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCloudIDSummit
 
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)CloudIDSummit
 
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCloudIDSummit
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCloudIDSummit
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCloudIDSummit
 
CIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCloudIDSummit
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCloudIDSummit
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CloudIDSummit
 
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CloudIDSummit
 
CIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of NextCIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of NextCloudIDSummit
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CloudIDSummit
 
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...CloudIDSummit
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101CloudIDSummit
 

Viewers also liked (15)

CIS13: Which Way Forward
CIS13: Which Way ForwardCIS13: Which Way Forward
CIS13: Which Way Forward
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering Identity
 
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
 
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity Standards
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
 
CIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization Standards
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?
 
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
 
CIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of NextCIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of Next
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
 
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101
 

Similar to CIS13: How Enterprises Go Mobile: An Introduction to MobileIT

API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile StrategyNitin Gaur
 
App Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile appsApp Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile appsVishal Jain
 
The Shortest Path to Value for Business Mobile Apps
The Shortest Path to Value for Business Mobile Apps The Shortest Path to Value for Business Mobile Apps
The Shortest Path to Value for Business Mobile Apps Catavolt, Inc.
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Application Portfolio Management Strategies that Accelerate Digital Transform...
Application Portfolio Management Strategies that Accelerate Digital Transform...Application Portfolio Management Strategies that Accelerate Digital Transform...
Application Portfolio Management Strategies that Accelerate Digital Transform...Mendix
 
Webinar app development & maintenance
Webinar app development & maintenanceWebinar app development & maintenance
Webinar app development & maintenanceService2Media
 
SRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesSRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesAmazon Web Services
 
Mobile application development
Mobile application developmentMobile application development
Mobile application developmentEric Cattoir
 
Using Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixUsing Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixIBM
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Sales mobile coe intellect apps internal
Sales mobile coe intellect apps internalSales mobile coe intellect apps internal
Sales mobile coe intellect apps internalKalimulla Shariff
 
Sales mobile coe intellect apps
Sales mobile coe intellect appsSales mobile coe intellect apps
Sales mobile coe intellect appsKalimulla Shariff
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategyAxway Appcelerator
 
IBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst ApplicationsIBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst ApplicationsLeigh Williamson
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1Roger Snook
 
Enterprise mobile strategy framework - 1st part
Enterprise mobile strategy framework  - 1st partEnterprise mobile strategy framework  - 1st part
Enterprise mobile strategy framework - 1st partAlgarytm
 
Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and programJinen Dedhia
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 

Similar to CIS13: How Enterprises Go Mobile: An Introduction to MobileIT (20)

API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile Strategy
 
App Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile appsApp Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile apps
 
The Shortest Path to Value for Business Mobile Apps
The Shortest Path to Value for Business Mobile Apps The Shortest Path to Value for Business Mobile Apps
The Shortest Path to Value for Business Mobile Apps
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Application Portfolio Management Strategies that Accelerate Digital Transform...
Application Portfolio Management Strategies that Accelerate Digital Transform...Application Portfolio Management Strategies that Accelerate Digital Transform...
Application Portfolio Management Strategies that Accelerate Digital Transform...
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 
Webinar app development & maintenance
Webinar app development & maintenanceWebinar app development & maintenance
Webinar app development & maintenance
 
SRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesSRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile Services
 
Mobile application development
Mobile application developmentMobile application development
Mobile application development
 
Using Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixUsing Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on Bluemix
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Sales mobile coe intellect apps internal
Sales mobile coe intellect apps internalSales mobile coe intellect apps internal
Sales mobile coe intellect apps internal
 
Sales mobile coe intellect apps
Sales mobile coe intellect appsSales mobile coe intellect apps
Sales mobile coe intellect apps
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
 
IBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst ApplicationsIBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst Applications
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
 
Enterprise mobile strategy framework - 1st part
Enterprise mobile strategy framework  - 1st partEnterprise mobile strategy framework  - 1st part
Enterprise mobile strategy framework - 1st part
 
Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and program
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

CIS13: How Enterprises Go Mobile: An Introduction to MobileIT

  • 1. How Enterprises Go Mobile: An Introduction to MobileIT Josh Sirota, Principal Architect, Office of the CTO, MobileIron
  • 2. “How do I distribute apps and embrace BYOD?” “How do I secure and mobilize content?” “How do I manage security, identity, and privacy?” “I need to move at consumer speed, without sacrificing security and compliance” “How do I manage the explosion of operating systems?”
  • 3. The Journey to The Mobile First Enterprise Users Enterprise IT Adopt Devices BYOD Email access Multi-OS device security
  • 4. The Journey to The Mobile First Enterprise Users Enterprise IT Adopt Devices BYOD Email access Multi-OS device security Deliver Apps & Content Transformation New business processes New user experiences Mobile First Mobile First
  • 5. The technology landscape 5 MDM: Traditionally the “command & control” system that configures, monitors devices, provides inventorying, etc. MAM: Provides an application store and the ability to extend MDM functions into enterprise and commercially developed apps. Standalone options exist, but lack of integration with MDM and devices makes for challenging implementations. MIM / MCM: Enables access to content resources, either established enterprise repositories (e.g. CIFS, SharePoint) or new, mobile-specific content repositories (e.g. Box) MEM - Mobile Enterprise Management: Technology that allows for all aspects of an enterprise mobility deployment to be managed from a single platform. Combines the best of MDM, MAM and MIM
  • 6. Phase 1: Designing your BYOD & Multi-OS Strategy 6
  • 7. Navigating the hype BYOD is becoming the norm –  IDC: More personal devices than corporate devices sold for business use –  Forrester: ~60% of companies have a BYOD initiative in place –  MobileIron: 70% of customers have a BYOD initiative in place Beware the buzzword –  Hype hides complexity –  Hype creates false expectations –  Hype results in ill-formed initiatives and disillusionment Driver of BYOD should be choice, not cost BYOD != “Let users have whatever they want”
  • 8. BYOD programs must be responsible not restrictive BYOD programs cannot damage the user experience •  Diminish value to the enterprise •  Limit user adoption •  Limit user productivity
  • 10. BYOD program components Prepare •  Establish Goals and charter •  Stakeholder accountability - HR, Legal, IT, LOB •  Employee survey •  BYOD capability assessment •  Trust model •  Economic model •  Payment model •  Legal assessment (including regional) User experience is the litmus test for BYOD adoption and sustainability Build •  Staffing and resource recommendation •  Employee communications guidelines •  Managed choice device list •  Device lifecycle management guide •  Security policy •  Privacy policy •  Guidelines for app design and rollout Rollout •  Phased roll-out plan •  Welcome communications •  IT and program branding •  FAQ •  User agreement •  User registration instructions •  Ongoing education – policy, rationale, compliance, consequences Sustain •  Ongoing end-user communication •  Satisfaction survey •  Program entitlement •  Compliance enforcement •  Service desk management •  Service desk troubleshooting •  Technology evolution
  • 11. BYOD evolution “Help-yourself-desk” will drive economics Identity will become strategic glue across services BYOEà Experience = Device + App + Connectivity Mobile BYOD principles will apply to laptops/desktops OS turbulence will continue as user preferences shift
  • 12. Selecting your OS(es) of choice •  Very consistent OS distribution globally •  Many enterprise & prosumer apps available •  Robust, consistent enterprise support; •  Requires agreement with Apple developer programs •  Limited hardware selection & discounts 12 •  Reuse of Visual Studio resources toward mobile app development •  MSFT support & svcs •  Unique user interface design •  Support for MDM on smartphones now. Laptops, tablets coming •  SCCM policies not directly applicable •  Few 3rd-party apps •  Extremely customizable operating system •  Wide variety of OS variants in wild (41% run Android <= 2.3) •  Flexibility in app development & distribution •  Wide variety of HW •  Deep enterprise support through ODMs & software
  • 13. Phase 2: Design & Build Mobile Apps 13
  • 14. I. Experience •  Singular function … not comprehensive features •  Fast cycles … 8 week dev, 9 month life, 3 platforms •  High expectations … UX litmus test for adoption Consumer apps for the employee ... not … Business apps for the enterprise
  • 15.
  • 16.
  • 17.
  • 18. II. Architecture • Services architecture • Content sources and access • Lessons from the e-commerce experience “If I had more time, I would have written a shorter letter.”
  • 19. III. Role of IT API accessibility and support UX and design best practices and support Consumer-grade discovery experience Plug ‘n play security (easy for developer, invisible to user) Developer sourcing Can IT provide value to the app developer? Tools to drive and measure adoption
  • 20. Getting the program right Prepare •  Voice of the user •  App business case template •  Charter and sponsorship •  Stakeholder guide •  Budget and resources template •  Privacy considerations •  Developer selection guide Build •  Trusted design principles •  Platforms/OS decision tree •  Content management best practices •  App signing and cert provisioning guide •  Cross-platform tools and standards •  Testing guidelines •  Approval and submission template Rollout •  Distribution best practices •  Payment model •  Metrics guide •  User communications and documents •  Self-service deployment guide Sustain •  Self-service support model •  App storefront maintenance guide •  App upgrade best practices •  Retirement template (lifecycle)
  • 21. Phase 3: Go Mobile First 21
  • 22. 22 Definition… Mobile First organizations embrace mobility as their primary IT platform in order to transform their businesses and increase their competitiveness Content of all types is easily and securely available on any device CONTENT End users choose their devices Security is invisible to end users User experience is the #1 design criteria USER EXPERIENCES New apps are developed and delivered to mobile devices first Core business processes can be performed on any device APPLICATIONS In a Mobile First Company…
  • 23. 23