SlideShare a Scribd company logo
1 of 9
Download to read offline
by Arun Kuriakose
What is AirWatch?
 Mobile Device Management
 BYOD
 Application, Email, and Browsing management
Financial Information
 $225 million in Series A funding
 Estimated revenue of $125-150 million in 2013
 Acquired by VMware for $1.54 billion
Company History
 Founded in 2003 by John Marshall and Allen Dabbiere
 Wandering WiFi
 In 2006 shifted focus to manage mobile security
 Secured Series A funding in 2013
 Acquired by VMware in January 2014
What’s Hot?
 Mobile Device Management
 Rise of smartphones and tablets
 Cloud-based mobile device management
 Bring your own device
Secret Sauce
 Bring your own device (BYOD)
 Ability to separate personal and business information
 Works with iOS, Android, Windows, Blackberry
Competition
 Citrix
 Good Technology
 MobileIron
 SAP
 BlackBerry
Prediction
 Gartner predicts in five years 65% of companies will
use MDM
 AirWatch is the market leader in MDM
 VMware acquisition
 EMC
Questions?

More Related Content

What's hot

What's hot (20)

4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
AdminStudio Suite Datasheet
AdminStudio Suite DatasheetAdminStudio Suite Datasheet
AdminStudio Suite Datasheet
 
Desktop Software Asset Management – Today and Tomorrow
Desktop Software Asset Management – Today and TomorrowDesktop Software Asset Management – Today and Tomorrow
Desktop Software Asset Management – Today and Tomorrow
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Webinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT ProcurementWebinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT Procurement
 
IBM Mobile foundation overview
IBM Mobile foundation overviewIBM Mobile foundation overview
IBM Mobile foundation overview
 
2015 Customer Choice Awards Infographic
2015 Customer Choice Awards Infographic2015 Customer Choice Awards Infographic
2015 Customer Choice Awards Infographic
 
Azure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas DovydaitisAzure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas Dovydaitis
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
Patterns for Monetizing the IoT
Patterns for Monetizing the IoTPatterns for Monetizing the IoT
Patterns for Monetizing the IoT
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance Security
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Webinar: How Greater Visibility of Software Assets is Saving Chicago Public ...
Webinar:  How Greater Visibility of Software Assets is Saving Chicago Public ...Webinar:  How Greater Visibility of Software Assets is Saving Chicago Public ...
Webinar: How Greater Visibility of Software Assets is Saving Chicago Public ...
 
Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debrief
 
Microsoft Azure solutions - Whitepaper
Microsoft Azure solutions - WhitepaperMicrosoft Azure solutions - Whitepaper
Microsoft Azure solutions - Whitepaper
 

Viewers also liked (20)

441(lpuiling)
441(lpuiling)441(lpuiling)
441(lpuiling)
 
Reddit company overview
Reddit company overviewReddit company overview
Reddit company overview
 
Evernote
EvernoteEvernote
Evernote
 
Valve
ValveValve
Valve
 
Company presentation EECS441W14 Bochun Zhang
Company presentation EECS441W14 Bochun ZhangCompany presentation EECS441W14 Bochun Zhang
Company presentation EECS441W14 Bochun Zhang
 
Company Report
Company ReportCompany Report
Company Report
 
Snapchat
SnapchatSnapchat
Snapchat
 
Runnable: Discover Everything Through Code
Runnable: Discover Everything Through CodeRunnable: Discover Everything Through Code
Runnable: Discover Everything Through Code
 
441 company report
441 company report441 company report
441 company report
 
Aol Inc.
Aol Inc.Aol Inc.
Aol Inc.
 
Alibaba presentation
Alibaba presentationAlibaba presentation
Alibaba presentation
 
Box Presentation Sumedha
Box Presentation SumedhaBox Presentation Sumedha
Box Presentation Sumedha
 
Parrosam Netflix Report
Parrosam Netflix ReportParrosam Netflix Report
Parrosam Netflix Report
 
TJ Bearse - Trello
TJ Bearse - TrelloTJ Bearse - Trello
TJ Bearse - Trello
 
441 persona presentation (1)
441 persona presentation (1)441 persona presentation (1)
441 persona presentation (1)
 
Duolingo (1)
Duolingo (1)Duolingo (1)
Duolingo (1)
 
Company presentation
Company presentationCompany presentation
Company presentation
 
Mitwong shapeways
Mitwong shapewaysMitwong shapeways
Mitwong shapeways
 
Company presentation
Company presentationCompany presentation
Company presentation
 
Company preso shaoqing
Company preso shaoqingCompany preso shaoqing
Company preso shaoqing
 

Similar to Company presentation

Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
calebbarlow
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
Bhavya Siddappa
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
Cleophas Kipruto
 
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2
 

Similar to Company presentation (20)

Fiberlink sales presentation steve
Fiberlink sales presentation steveFiberlink sales presentation steve
Fiberlink sales presentation steve
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes Mobile
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
WSO2Con US 2013 - Achieving Safe BYOD and Productive Apps with WSO2 Mobile De...
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 

Recently uploaded

ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Madan Karki
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
Kamal Acharya
 

Recently uploaded (20)

Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdf
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsx
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 

Company presentation