The iThings And The Cloud

520 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
520
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The iThings And The Cloud

  1. 1. The iThings And The Cloud<br />Consumerization of IT<br />Dr. Jeannot Muller,<br />VP, Head of Global Infrastructure Architecture,<br />DEUTSCHE POST DHL, GBS IT Services<br />22nd June 2011<br />
  2. 2. Consumerization of IT<br />Securing the Enterprise Landscape<br />Protecting Data - Not Devices<br />Agenda<br />
  3. 3. The Compute Continuum<br />
  4. 4. Consumerization was ajoke, then a threat, now obvious.<br />Workers expect greater access any time, any place on any device. They will either work with or against IT to make it happen.<br />While cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers.<br />Consumerization of IT<br />
  5. 5. IT needs to be prepared for the Compute Continuum:<br />Provide and align on requirements and priorities.<br />Abstract IT data and applications to function in diverse environments.<br />Move to cloud based service offering over time.<br />Establish a common development framework across devices.<br />Better Be Prepared<br />
  6. 6. IT needs to be prepared for the Compute Continuum:<br />Provide and align on requirements and priorities.<br />Abstract IT data and applications to function in diverse environments.<br />Move to cloud based service offering over time.<br />Establish a common development framework across devices.<br />Better Be Prepared<br />
  7. 7. Common Security Concept<br />Blackberry<br /><ul><li>Only corporate container available
  8. 8. Device = corporate container
  9. 9. Comments
  10. 10. Security requirement: Private and corporate data must be separated (especially on private devices)
  11. 11. As long as no options available to separate private and corporate data on a Blackberry:Device = corporate container</li></ul>Corporate<br />SandboxSolution<br /><ul><li>Private & corporate container available
  12. 12. Sandbox = corporate container
  13. 13. Deviceindependent</li></ul>Corp-orate<br />Private<br />
  14. 14. Securing The Landscape<br />Public available apps<br />Custom made apps for DPDHL<br /><ul><li>Apps for professional aspects which are approved for installation to the smart devices’ corporate container
  15. 15. End-2-End Process
  16. 16. Definition: Corporate Approved Apps</li></ul>Approval process<br />Order<br />Distri-bution<br />Mainte-nance<br />License Mgmt<br />
  17. 17. 5 Tier Model – Protect Your Data<br />Increasing access to data with enhanced security capabilities<br />
  18. 18. THANK YOU.<br />Jeannot.Muller@dhl.com<br />

×