SlideShare a Scribd company logo
1 of 1
Download to read offline
Secure Enterprise single sign-on Identity federation using Enterprise-secure Certificates
Active Directory Integration
Unified Mobile App Single Sign-on
Single Sign-on for On Premise Applications
Native App Support – No requirements for App Wrapping or API Integration
Optimized Log-in for all Devices and Operating Systems
Federated Identity
User/Group
Device Type
App Type
Managed or Unmanaged Device
Conditional Access
Optimize user experience and security with AirWatch Adaptive
Access that leverages device enrollment as an additional factor of
authentication (something you have) and enforcing local PIN screen
lock/unlock policy (something you know) for managed and
unmanaged devices.Federated SSO
AD Federation
Adaptive Access
Core
infrastructure
Public key
infrastructure
Directory services
Management
SSO Web Experience
Self-service catalog
Launcher
Allowing easier migrations and implementations to Office 365. This
allows users one touch mobile access to the Office 365 environment
without additional logins. Secures devices by encrypting devices using
AirWatch EMM Integration and further security provided by leveraging
AirWatch EMM for remote wipe of corporate data.
Office 365 and
On-premises Exchange
SaaS Apps Data
On-premises Application Data
Secure Data on Device
Why VMware Over Competing Solutions
Setup and Configure in under 60 Minutes*
Superior policy engine to improve user experience
Competing solutions set an authentication policy per application. VMware Adaptive Access can differentiate by
device type and network, optimizing the user experience for iOS, Android, OSX, and Windows while maximizing
security for untrusted or unmanaged devices
Eliminate app wrapping for mobile SSO
Other enterprise mobility management vendors require app-wrapping native mobile apps to be configured and
protected. VMware and AirWatch support the ACE protocol that eliminates the need for wrapping and enable
mobile SSO through the appropriate protocols based on device type eliminating the need to manage app lifecycle
OS neutrality and vendor relationships
Your mobility and identity management solution has to be optimized across every OS. VMware invests in
relationships with all of the device and OS vendors and provides leadership in standard bodies to protect our
customer’s investment and to reduce complexity
In the cloud or behind the firewall
VMware Identity Manager and AirWatch enterprise mobility management are offered as cloud services or as
packaged software you can install behind the firewall based on your requirements. On-premises connectors
provide a bridge between your directory and the cloud
Industrial-grade enterprise architecture
VMware Identity Manager was built from the ground up on a multi-tenant cloud architecture by the industry
pioneers in identity as a service. The services operate with state-of-the-art DevOps practices on vCloudAir,
the same infrastructure enterprises choose for mission critical apps and disaster recovery
Optimized for VMware NSX virtual networking
As traditional perimeter security fails to protect external apps and data and leaves the core exposed once the
perimeter is infiltrated, VMware NSX may be leveraged with VMware Identity Manager single sign-on and
AirWatch per-app VPN to isolate and policy-manage services deep within the datacenter
Links and Resources
www.vmware.com/products/identity-manager
Does your identity solution
have the eight must-haves?
Single sign-on
Directory integration
Multi-factor authentication
Policy management
Application provisioning
Cross-device catalog and launcher
Analytics / Reporting
Meets security & compliance requirements
Mobile SSO
Leverage device-based certificate for authentication
Doesn't require application changes for SSO (no wrapping or API)
Conditional access based on managed or unmanaged devices
Optimize login experience for each OS
Automates and streamlines onboarding and revocation
Supports any type of device and OS
Support any type of application
And does the solution have
these attributes?
Five Common Challenges Customers are Facing with Cloud
Mobile App Delivery
User expectations are rising every day
Consumer apps have raised the expectations of end users (and business decision makers) on what a good user
experience should be
Line of business leaders can purchase SaaS apps without IT
The adoption and deployment of SaaS can be done without IT assistance on purpose, proliferating new apps and
new risks of data loss
Once an organization is using three to five SaaS apps, management scale becomes a problem
A line of business might manage one or two apps, but soon, users are overwhelmed with different passwords and
the helpdesk gets overwhelmed— the enterprise goes from managing one identity to 2,3,4,5, or more
Network access is no longer an effective means of access control—and passwords may not be good enough
Revoking network access in the directory used to be enough. Now it’s only a part of the solution—and not all data
is equal. Sometimes you need stronger authentication than just a password
Many SaaS services have both web and native mobile experiences
There has been no effective way of combining mobile app and SaaS app identity management. Existing methods
require cumbersome codes and configuration that users have to navigate themselves
SSO Mobile Experience
Self-service catalog
Native integration
One-touch mobile app access
(no passwords or logins required)
Delivered Two Ways
Software as a service
Operates on vCloudAir in three regions (US, EMEA, and APAC)
Massively scalable multi-tenant environment
Three “9s” SLA based on redundant physical datacenters
Requires installation of an on-premises connector
Fastest way to receive new features and updates
On-premises software
Delivered as a virtual appliance
Internal database makes deployment simple
Built from the same release train as cloud version (Updates are distributed less often)
Simple to build out highly available environment
VMware Identity Manager
and AirWatch Cloud Mobile App Delivery

More Related Content

What's hot

Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Edge Pereira
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureEmirates Computers
 
Azure multi factor authentication - Global Azure bootcamp 2018 security
Azure multi factor authentication - Global Azure bootcamp 2018  securityAzure multi factor authentication - Global Azure bootcamp 2018  security
Azure multi factor authentication - Global Azure bootcamp 2018 securityJoTechies
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009Peter de Haas
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principlesMotty Ben Atia
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional accessTad Yoke
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseGerard Konan
 

What's hot (20)

Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Mct summit 2021
Mct summit 2021Mct summit 2021
Mct summit 2021
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
 
Iam
IamIam
Iam
 
Azure multi factor authentication - Global Azure bootcamp 2018 security
Azure multi factor authentication - Global Azure bootcamp 2018  securityAzure multi factor authentication - Global Azure bootcamp 2018  security
Azure multi factor authentication - Global Azure bootcamp 2018 security
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principles
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional access
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 

Viewers also liked

Next-Gen Security for SDDC Infographic
Next-Gen Security for SDDC InfographicNext-Gen Security for SDDC Infographic
Next-Gen Security for SDDC InfographicVMware Academy
 
Dell Technologies Infographic
Dell Technologies InfographicDell Technologies Infographic
Dell Technologies InfographicVMware Academy
 
Virtualization myths-infographic
Virtualization myths-infographicVirtualization myths-infographic
Virtualization myths-infographicVMware Academy
 
VMware Academy Center of Excellence
VMware Academy Center of ExcellenceVMware Academy Center of Excellence
VMware Academy Center of ExcellenceVMware Academy
 
Virtualization Journey
Virtualization JourneyVirtualization Journey
Virtualization JourneyVMware
 
VMware vCloud NFV Reference Architecture
 VMware vCloud NFV Reference Architecture VMware vCloud NFV Reference Architecture
VMware vCloud NFV Reference ArchitectureVMware Academy
 
Windows Server 2012 Hyper-V: A more complete virtualization platform
Windows Server 2012 Hyper-V: A more complete virtualization platformWindows Server 2012 Hyper-V: A more complete virtualization platform
Windows Server 2012 Hyper-V: A more complete virtualization platformMotty Ben Atia
 
Server Virtualization
Server VirtualizationServer Virtualization
Server VirtualizationSpiceworks
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware Academy
 

Viewers also liked (11)

Next-Gen Security for SDDC Infographic
Next-Gen Security for SDDC InfographicNext-Gen Security for SDDC Infographic
Next-Gen Security for SDDC Infographic
 
New Model for IT
New Model for IT New Model for IT
New Model for IT
 
Dell Technologies Infographic
Dell Technologies InfographicDell Technologies Infographic
Dell Technologies Infographic
 
V mware virt-study
V mware virt-studyV mware virt-study
V mware virt-study
 
Virtualization myths-infographic
Virtualization myths-infographicVirtualization myths-infographic
Virtualization myths-infographic
 
VMware Academy Center of Excellence
VMware Academy Center of ExcellenceVMware Academy Center of Excellence
VMware Academy Center of Excellence
 
Virtualization Journey
Virtualization JourneyVirtualization Journey
Virtualization Journey
 
VMware vCloud NFV Reference Architecture
 VMware vCloud NFV Reference Architecture VMware vCloud NFV Reference Architecture
VMware vCloud NFV Reference Architecture
 
Windows Server 2012 Hyper-V: A more complete virtualization platform
Windows Server 2012 Hyper-V: A more complete virtualization platformWindows Server 2012 Hyper-V: A more complete virtualization platform
Windows Server 2012 Hyper-V: A more complete virtualization platform
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
 

Similar to Identity Manager & AirWatch Cloud Mobile App - Infographic

3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0Huy Pham
 
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Private Cloud
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxHaekalAufar1
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPPaulo Freitas
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...RobinLilly5
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptxAshvin Dixit
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex EnterpriseLa Lakis
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)Luís Serra Libório
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...Scott Hoag
 
App cloud bdm days apac
App cloud bdm days apacApp cloud bdm days apac
App cloud bdm days apacChris Thomas
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpNicole Bray
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 

Similar to Identity Manager & AirWatch Cloud Mobile App - Infographic (20)

3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex Enterprise
 
Samsung SDS IAM & EMM
Samsung SDS IAM & EMMSamsung SDS IAM & EMM
Samsung SDS IAM & EMM
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
 
App cloud bdm days apac
App cloud bdm days apacApp cloud bdm days apac
App cloud bdm days apac
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 

More from VMware Academy

VMware IT Academy Agreement
VMware IT Academy AgreementVMware IT Academy Agreement
VMware IT Academy AgreementVMware Academy
 
VMware Network Virtualization Infographic
VMware Network Virtualization InfographicVMware Network Virtualization Infographic
VMware Network Virtualization InfographicVMware Academy
 
Vmw top5-reasons-infographic
Vmw top5-reasons-infographicVmw top5-reasons-infographic
Vmw top5-reasons-infographicVMware Academy
 
A New Strategy for Enterprise Storage
A New Strategy for Enterprise StorageA New Strategy for Enterprise Storage
A New Strategy for Enterprise StorageVMware Academy
 
VMWARE EVO:RAIL INFOGRAPHIC
VMWARE EVO:RAIL INFOGRAPHICVMWARE EVO:RAIL INFOGRAPHIC
VMWARE EVO:RAIL INFOGRAPHICVMware Academy
 
Navigating Virtual SAP HANA Myths
Navigating Virtual SAP HANA Myths Navigating Virtual SAP HANA Myths
Navigating Virtual SAP HANA Myths VMware Academy
 
VMware vSphere Virtual Volumes: Getting Started Guide
VMware vSphere Virtual Volumes: Getting Started GuideVMware vSphere Virtual Volumes: Getting Started Guide
VMware vSphere Virtual Volumes: Getting Started GuideVMware Academy
 

More from VMware Academy (7)

VMware IT Academy Agreement
VMware IT Academy AgreementVMware IT Academy Agreement
VMware IT Academy Agreement
 
VMware Network Virtualization Infographic
VMware Network Virtualization InfographicVMware Network Virtualization Infographic
VMware Network Virtualization Infographic
 
Vmw top5-reasons-infographic
Vmw top5-reasons-infographicVmw top5-reasons-infographic
Vmw top5-reasons-infographic
 
A New Strategy for Enterprise Storage
A New Strategy for Enterprise StorageA New Strategy for Enterprise Storage
A New Strategy for Enterprise Storage
 
VMWARE EVO:RAIL INFOGRAPHIC
VMWARE EVO:RAIL INFOGRAPHICVMWARE EVO:RAIL INFOGRAPHIC
VMWARE EVO:RAIL INFOGRAPHIC
 
Navigating Virtual SAP HANA Myths
Navigating Virtual SAP HANA Myths Navigating Virtual SAP HANA Myths
Navigating Virtual SAP HANA Myths
 
VMware vSphere Virtual Volumes: Getting Started Guide
VMware vSphere Virtual Volumes: Getting Started GuideVMware vSphere Virtual Volumes: Getting Started Guide
VMware vSphere Virtual Volumes: Getting Started Guide
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Identity Manager & AirWatch Cloud Mobile App - Infographic

  • 1. Secure Enterprise single sign-on Identity federation using Enterprise-secure Certificates Active Directory Integration Unified Mobile App Single Sign-on Single Sign-on for On Premise Applications Native App Support – No requirements for App Wrapping or API Integration Optimized Log-in for all Devices and Operating Systems Federated Identity User/Group Device Type App Type Managed or Unmanaged Device Conditional Access Optimize user experience and security with AirWatch Adaptive Access that leverages device enrollment as an additional factor of authentication (something you have) and enforcing local PIN screen lock/unlock policy (something you know) for managed and unmanaged devices.Federated SSO AD Federation Adaptive Access Core infrastructure Public key infrastructure Directory services Management SSO Web Experience Self-service catalog Launcher Allowing easier migrations and implementations to Office 365. This allows users one touch mobile access to the Office 365 environment without additional logins. Secures devices by encrypting devices using AirWatch EMM Integration and further security provided by leveraging AirWatch EMM for remote wipe of corporate data. Office 365 and On-premises Exchange SaaS Apps Data On-premises Application Data Secure Data on Device Why VMware Over Competing Solutions Setup and Configure in under 60 Minutes* Superior policy engine to improve user experience Competing solutions set an authentication policy per application. VMware Adaptive Access can differentiate by device type and network, optimizing the user experience for iOS, Android, OSX, and Windows while maximizing security for untrusted or unmanaged devices Eliminate app wrapping for mobile SSO Other enterprise mobility management vendors require app-wrapping native mobile apps to be configured and protected. VMware and AirWatch support the ACE protocol that eliminates the need for wrapping and enable mobile SSO through the appropriate protocols based on device type eliminating the need to manage app lifecycle OS neutrality and vendor relationships Your mobility and identity management solution has to be optimized across every OS. VMware invests in relationships with all of the device and OS vendors and provides leadership in standard bodies to protect our customer’s investment and to reduce complexity In the cloud or behind the firewall VMware Identity Manager and AirWatch enterprise mobility management are offered as cloud services or as packaged software you can install behind the firewall based on your requirements. On-premises connectors provide a bridge between your directory and the cloud Industrial-grade enterprise architecture VMware Identity Manager was built from the ground up on a multi-tenant cloud architecture by the industry pioneers in identity as a service. The services operate with state-of-the-art DevOps practices on vCloudAir, the same infrastructure enterprises choose for mission critical apps and disaster recovery Optimized for VMware NSX virtual networking As traditional perimeter security fails to protect external apps and data and leaves the core exposed once the perimeter is infiltrated, VMware NSX may be leveraged with VMware Identity Manager single sign-on and AirWatch per-app VPN to isolate and policy-manage services deep within the datacenter Links and Resources www.vmware.com/products/identity-manager Does your identity solution have the eight must-haves? Single sign-on Directory integration Multi-factor authentication Policy management Application provisioning Cross-device catalog and launcher Analytics / Reporting Meets security & compliance requirements Mobile SSO Leverage device-based certificate for authentication Doesn't require application changes for SSO (no wrapping or API) Conditional access based on managed or unmanaged devices Optimize login experience for each OS Automates and streamlines onboarding and revocation Supports any type of device and OS Support any type of application And does the solution have these attributes? Five Common Challenges Customers are Facing with Cloud Mobile App Delivery User expectations are rising every day Consumer apps have raised the expectations of end users (and business decision makers) on what a good user experience should be Line of business leaders can purchase SaaS apps without IT The adoption and deployment of SaaS can be done without IT assistance on purpose, proliferating new apps and new risks of data loss Once an organization is using three to five SaaS apps, management scale becomes a problem A line of business might manage one or two apps, but soon, users are overwhelmed with different passwords and the helpdesk gets overwhelmed— the enterprise goes from managing one identity to 2,3,4,5, or more Network access is no longer an effective means of access control—and passwords may not be good enough Revoking network access in the directory used to be enough. Now it’s only a part of the solution—and not all data is equal. Sometimes you need stronger authentication than just a password Many SaaS services have both web and native mobile experiences There has been no effective way of combining mobile app and SaaS app identity management. Existing methods require cumbersome codes and configuration that users have to navigate themselves SSO Mobile Experience Self-service catalog Native integration One-touch mobile app access (no passwords or logins required) Delivered Two Ways Software as a service Operates on vCloudAir in three regions (US, EMEA, and APAC) Massively scalable multi-tenant environment Three “9s” SLA based on redundant physical datacenters Requires installation of an on-premises connector Fastest way to receive new features and updates On-premises software Delivered as a virtual appliance Internal database makes deployment simple Built from the same release train as cloud version (Updates are distributed less often) Simple to build out highly available environment VMware Identity Manager and AirWatch Cloud Mobile App Delivery