SlideShare a Scribd company logo
1 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
Impact of Mobile computing on IT
Ashish Jain
Director, Product Management, VMware
@itickr
July 2013
2 Confidential
Mobile Devices are everywhere
3 Confidential
The Requirements we used to have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through Ownership
An application you own,
running on a server you own
People you employ
Using a network you
own to connect to…
Using software you own on a
Windows desktop you own
4 Confidential
What the world wants now…
Control & Governance is Becoming
More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn‟t grant
Serious compliance concerns
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows OSs
Employees, contractors
outsourcers, partners
citizens, students
5 Confidential
New Device Platforms New Apps New User Expectations
Three trends are forcing massive change on IT
New Device
Platforms
 A new way to work
 Not just Windows anymore
New User
Expectations
 Collaboration with partners,
contractors, and customers
 Productivity through better technology
New
Apps
 SaaS, mobile apps
 Diversity
New Apps New User ExpectationsNew Device Platforms
6 Confidential
Mobility is Changing Everything:
0
300
600
900
2009 2010 2011 2012
Smartphones and tablets PC shipments
of information workers use
three or more devices for
w o r k t o i n c r e a s e
p r o d u c t i v i t y
EXPLOSIVE
GROWTH
in shipments of
smartphones and tablets
Sources: IDC, BGR, Forrester
FLAT
pc shipments
New Device Platforms New Apps New User ExpectationsNew Device Platforms
BYOD & JIT
7 Confidential
The Changing Device Mix
148 141
202 240
128
352
722
1516
0
1000
2000
2012 2017
Smartphone
Tablet
Portable PC
Desktop PC
Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013
Connected Device Market by Product Category,
Shipments, 2012-2017 in Millions
8 Confidential
New Apps are Flooding the Enterprise
R a t i o o f m o b i l e a p p
development projects to native
P C p r o j e c t s i n 2 0 1 5
PACE OF TECHNOLOGY
ADOPTION IS
ACCELERATING
PC
100M USERS
20YEARS
INTERNET
100M USERS
10YEARS
MOBILE
100M USERS
5YEARS
% OS Neutral % Browser Specific % Windows
1996
CROSSOVER
POINT
Apps in the Enterprise
2011 2020
0%
100%
50%
New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms
Sources: Gartner, Internal VMware Analysis
App & Data Independence
9 Confidential
New User Expectations for Productivity are Driving IT to
Evolve
ENTERPRISE END USER COMPUTING
“88% of executives report
employees are using
their personal computing
technologies for
business purposes”
DEMAND ACCESS
FROM ANYWHERE
“9 out of 10 companies
report the use of
consumer technologies
in the workplace”
BETTER CONSUMER
TECHNOLOGIES
“74% of employees
use consumer
technologies due to
lack of compelling
alternatives from IT”
LACK OF CHOICES
FROM IT
New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations
Sources: IDC, Avanade
Innovate or Perish
10 Confidential
IT’s Objective for End User Computing Infrastructure
Deliver the right business apps and data to
user devices in a way that is efficient and
secure for IT and productive for the end user
11 Confidential
The Mobile Landscape
12 Confidential
OS
In million
of units
Market share
Android 497,1 68,8%
iOS 135,9 18,8%
Blackberry 32,5 4,5%
Symbian 23,9 3,3%
Windows Phone 17,9 2,5%
TOTAL 722,4 100,0%
52%
19%
14%
8%
2% 5%
Android iOS
Symbian Blackberry
Windows Phone Others
2012 Smartphones Global Trends
12
Smartphones worldwide shipment 2012
Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013
Source: TomiAhonen Almanac 2013
1.3B smartphones in use
Smartphones worldwide installed based
as of December 2012
13 Confidential
2013 Data – Android continues its momentum…
14 Confidential
OS Trends
15 Confidential
Smartphones Trends in Key Markets
North America
Population:354M
Nb of Smartphones:210M
Shipment 2012
Android 71M
iOS 49M
Blackberry 5M
Windows 3M
Western Europe
Population:406M
Nb of Smartphones:260M
Shipment 2012
Android 69M
iOS 26M
Blackberry 9M
Symbian 4M
Windows 5M
Mature Asia/Pacific
Population:82M
Nb of Smartphones:60M
Shipment 2012
Android 28M
iOS 14M
Blackberry 1M
Symbian 3M
Others 3M
Greater China
Population:1540M
Nb of Smartphones:283M
Shipment 2012
Android 79M
iOS 31M
Windows 2M
Bada 1M
Symbian 0,5M
16 Confidential
Android Landscape
 Widely popular in developing countries
• Lots of choice – screen size, price, capabilities, etc.
 Not much traction in enterprise segment
• Security
• Perception is that Android is not secure
• Google Play is „wild wild west‟
• Enterprise features (eg: MDM) weak
• Fragmentation
• No two devices are the same in terms of capabilities or UI
• Hard for IT to support diverse environment
• Lack of control
• OS upgrades are controlled by carrier/OEM
• Security patches not pushed out in a timely manner
 OEMs starting to add capabilities
17 Confidential
Android Fragmentation
18 Confidential
Android Fragmentation
19 Confidential
iOS Landscape
 Popular in North America, Western Europe and other richer
geographical pockets
• Price rules them out in many developing countries
 In tune with enterprise opportunity and have great traction
• Increasing support for enterprise features in every hw and sw release
• Security
• Perception is that iOS is more secure than Android
• App Store is curated
• Strong enterprise features (encryption, MDM, etc.)
• Fragmentation
• Different screen sizes but not capabilities so perception is that there is no fragmention
in the Apple world
20 Confidential
iOS Landscape
21 Confidential
BlackBerry Landscape
 Was good standard in enterprise market
• Device Encryption
• Remote Wiping for lost/stolen
• Force password
• Provision secure Email, VPN, Wifi
 Missed BYOD trend completely and lost traction
 BB 10 is decent
• BlackBerry Balance – built in dual persona solution
• Small market share and not growing
 BB shops that didn’t already switch will likely stay with BB
 Most customers already started switching to a more strategic
platform
• Don‟t view BB as strategic anymore
• Migrating to iOS or Android or both
22 Confidential
Windows Landscape
 Windows Phone and Windows 8 are still early
• Windows Phone – more consumer oriented
• Windows Tablet seems to be more enterprise friendly and will likely get more
traction that Windows phones in 2014
 MSFT has deep pockets and will likely become the third dominant
mobile platform
• Distant third….
23 Confidential
Mobile App Distribution
24 Confidential
50 Billion (iOS) vs. 48B (Android)
25 Confidential
Consumer Apps published to “public stores”
Sources: Nielsen, May 16, 2012, VMware Customer Research.
Amazon appstore
+ Other Stores
26 Confidential
App Distribution options
 iOS App Distribution
• The Apple iOS App Store
• Ad hoc developer distribution
• Enterprise distribution
• The Apple Volume Purchase Program
• The Apple Custom B2B
 Android App Distribution
• Google Play
• Non-market resources
27 Confidential
Device & Application Management
28 Confidential
Anatomy of a Smartphone/Tablet
• Handheld Computer/Processor
• Communication Components
• Modem Chips
• Antenna
• Bluetooth
• WiFi
• Input/Output & Sensors
• Display
• Touchscreen
• Microphone/Speaker
• Cameras
• GPS
• Compass
• Accelerometer
• NFC
• USB
29 Confidential
Building iOS and Android Applications
 In order to construct a mobile app, need a “front end” – the bits
that run on the device / “the app”
 A disconnected app is typically not very interesting…so, we also
need to build a “back end” to support the app
Front End Back End
30 Confidential
Solving Mobility
Remote Windows desktop / applications
Web apps / HTML 5
Virtualized OS
31 Confidential
Current Approach Requires Managing the Whole Device
MobileDeviceManagement
Device
Apps &
Data
Corporate
Apps &
Data
What actually needs to be managed
by the enterprise
32 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
We still have ways to go…
33 Confidential
Thank You!

More Related Content

What's hot

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
CA API Management
 
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays
 
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Fredrik Rönnlund
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
kirgy
 
Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it. Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it.
Julien Lesaicherre
 
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind
SugarCRM
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
n|u - The Open Security Community
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
CA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
Trustwave
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
Mahima Anand Sharma
 
Financial services rely on APIs
Financial services rely on APIsFinancial services rely on APIs
Financial services rely on APIs
Rogue Wave Software
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham Beheshti
WithTheBest
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
Nordic APIs
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
CA API Management
 
I os7 infographic_gw
I os7 infographic_gwI os7 infographic_gw
I os7 infographic_gw
Gregg Wheeler
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
News in
News inNews in
News in
newsin
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
Sinch
 
Current Landscape of Connected Car APIs
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIs
Liz Slocum
 

What's hot (20)

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
 
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
 
Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it. Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it.
 
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Financial services rely on APIs
Financial services rely on APIsFinancial services rely on APIs
Financial services rely on APIs
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham Beheshti
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
I os7 infographic_gw
I os7 infographic_gwI os7 infographic_gw
I os7 infographic_gw
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
News in
News inNews in
News in
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
 
Current Landscape of Connected Car APIs
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIs
 

Similar to MDM/MAM/MIM Workshop - CIS 2013

CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
CloudIDSummit
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
solarisyourep
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014
IMC Institute
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
CA API Management
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
itnewsafrica
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
Troy C. Fulton
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Jeremy Siewert
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
Blueboxer2014
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
The mobile ecosystem
The mobile ecosystemThe mobile ecosystem
The mobile ecosystem
Melis Rimer
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile Ecosystem
Yagmur Anish
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
Kareem ElSayyed
 
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
VMware
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014
The Judge Group
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
Yuvaraj Ilangovan
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
WSO2
 

Similar to MDM/MAM/MIM Workshop - CIS 2013 (20)

CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
The mobile ecosystem
The mobile ecosystemThe mobile ecosystem
The mobile ecosystem
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile Ecosystem
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 

More from Ashish Jain

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User Experience
Ashish Jain
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPal
Ashish Jain
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal
Ashish Jain
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPal
Ashish Jain
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPal
Ashish Jain
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal Identity
Ashish Jain
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010
Ashish Jain
 
Open Id Summit
Open Id SummitOpen Id Summit
Open Id Summit
Ashish Jain
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled water
Ashish Jain
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security Issues
Ashish Jain
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
Ashish Jain
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
Ashish Jain
 
Concordia
ConcordiaConcordia
Concordia
Ashish Jain
 

More from Ashish Jain (13)

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User Experience
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPal
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPal
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPal
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal Identity
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010
 
Open Id Summit
Open Id SummitOpen Id Summit
Open Id Summit
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled water
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security Issues
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Concordia
ConcordiaConcordia
Concordia
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

MDM/MAM/MIM Workshop - CIS 2013

  • 1. 1 Confidential © 2013 VMware Inc. All rights reserved Confidential Impact of Mobile computing on IT Ashish Jain Director, Product Management, VMware @itickr July 2013
  • 3. 3 Confidential The Requirements we used to have… Change is hard and highly managed Software implemented from the center out Difficult to adjust to users needs Control Through Ownership An application you own, running on a server you own People you employ Using a network you own to connect to… Using software you own on a Windows desktop you own
  • 4. 4 Confidential What the world wants now… Control & Governance is Becoming More Challenging Inability to track, control or secure information assets Can not remove access you didn‟t grant Serious compliance concerns Apps live in many clouds and are easily procured without IT Always connected, via 3G, 4G and public or personal wifi Non-owned devices and multiple non-Windows OSs Employees, contractors outsourcers, partners citizens, students
  • 5. 5 Confidential New Device Platforms New Apps New User Expectations Three trends are forcing massive change on IT New Device Platforms  A new way to work  Not just Windows anymore New User Expectations  Collaboration with partners, contractors, and customers  Productivity through better technology New Apps  SaaS, mobile apps  Diversity New Apps New User ExpectationsNew Device Platforms
  • 6. 6 Confidential Mobility is Changing Everything: 0 300 600 900 2009 2010 2011 2012 Smartphones and tablets PC shipments of information workers use three or more devices for w o r k t o i n c r e a s e p r o d u c t i v i t y EXPLOSIVE GROWTH in shipments of smartphones and tablets Sources: IDC, BGR, Forrester FLAT pc shipments New Device Platforms New Apps New User ExpectationsNew Device Platforms BYOD & JIT
  • 7. 7 Confidential The Changing Device Mix 148 141 202 240 128 352 722 1516 0 1000 2000 2012 2017 Smartphone Tablet Portable PC Desktop PC Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013 Connected Device Market by Product Category, Shipments, 2012-2017 in Millions
  • 8. 8 Confidential New Apps are Flooding the Enterprise R a t i o o f m o b i l e a p p development projects to native P C p r o j e c t s i n 2 0 1 5 PACE OF TECHNOLOGY ADOPTION IS ACCELERATING PC 100M USERS 20YEARS INTERNET 100M USERS 10YEARS MOBILE 100M USERS 5YEARS % OS Neutral % Browser Specific % Windows 1996 CROSSOVER POINT Apps in the Enterprise 2011 2020 0% 100% 50% New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms Sources: Gartner, Internal VMware Analysis App & Data Independence
  • 9. 9 Confidential New User Expectations for Productivity are Driving IT to Evolve ENTERPRISE END USER COMPUTING “88% of executives report employees are using their personal computing technologies for business purposes” DEMAND ACCESS FROM ANYWHERE “9 out of 10 companies report the use of consumer technologies in the workplace” BETTER CONSUMER TECHNOLOGIES “74% of employees use consumer technologies due to lack of compelling alternatives from IT” LACK OF CHOICES FROM IT New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations Sources: IDC, Avanade Innovate or Perish
  • 10. 10 Confidential IT’s Objective for End User Computing Infrastructure Deliver the right business apps and data to user devices in a way that is efficient and secure for IT and productive for the end user
  • 12. 12 Confidential OS In million of units Market share Android 497,1 68,8% iOS 135,9 18,8% Blackberry 32,5 4,5% Symbian 23,9 3,3% Windows Phone 17,9 2,5% TOTAL 722,4 100,0% 52% 19% 14% 8% 2% 5% Android iOS Symbian Blackberry Windows Phone Others 2012 Smartphones Global Trends 12 Smartphones worldwide shipment 2012 Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013 Source: TomiAhonen Almanac 2013 1.3B smartphones in use Smartphones worldwide installed based as of December 2012
  • 13. 13 Confidential 2013 Data – Android continues its momentum…
  • 15. 15 Confidential Smartphones Trends in Key Markets North America Population:354M Nb of Smartphones:210M Shipment 2012 Android 71M iOS 49M Blackberry 5M Windows 3M Western Europe Population:406M Nb of Smartphones:260M Shipment 2012 Android 69M iOS 26M Blackberry 9M Symbian 4M Windows 5M Mature Asia/Pacific Population:82M Nb of Smartphones:60M Shipment 2012 Android 28M iOS 14M Blackberry 1M Symbian 3M Others 3M Greater China Population:1540M Nb of Smartphones:283M Shipment 2012 Android 79M iOS 31M Windows 2M Bada 1M Symbian 0,5M
  • 16. 16 Confidential Android Landscape  Widely popular in developing countries • Lots of choice – screen size, price, capabilities, etc.  Not much traction in enterprise segment • Security • Perception is that Android is not secure • Google Play is „wild wild west‟ • Enterprise features (eg: MDM) weak • Fragmentation • No two devices are the same in terms of capabilities or UI • Hard for IT to support diverse environment • Lack of control • OS upgrades are controlled by carrier/OEM • Security patches not pushed out in a timely manner  OEMs starting to add capabilities
  • 19. 19 Confidential iOS Landscape  Popular in North America, Western Europe and other richer geographical pockets • Price rules them out in many developing countries  In tune with enterprise opportunity and have great traction • Increasing support for enterprise features in every hw and sw release • Security • Perception is that iOS is more secure than Android • App Store is curated • Strong enterprise features (encryption, MDM, etc.) • Fragmentation • Different screen sizes but not capabilities so perception is that there is no fragmention in the Apple world
  • 21. 21 Confidential BlackBerry Landscape  Was good standard in enterprise market • Device Encryption • Remote Wiping for lost/stolen • Force password • Provision secure Email, VPN, Wifi  Missed BYOD trend completely and lost traction  BB 10 is decent • BlackBerry Balance – built in dual persona solution • Small market share and not growing  BB shops that didn’t already switch will likely stay with BB  Most customers already started switching to a more strategic platform • Don‟t view BB as strategic anymore • Migrating to iOS or Android or both
  • 22. 22 Confidential Windows Landscape  Windows Phone and Windows 8 are still early • Windows Phone – more consumer oriented • Windows Tablet seems to be more enterprise friendly and will likely get more traction that Windows phones in 2014  MSFT has deep pockets and will likely become the third dominant mobile platform • Distant third….
  • 24. 24 Confidential 50 Billion (iOS) vs. 48B (Android)
  • 25. 25 Confidential Consumer Apps published to “public stores” Sources: Nielsen, May 16, 2012, VMware Customer Research. Amazon appstore + Other Stores
  • 26. 26 Confidential App Distribution options  iOS App Distribution • The Apple iOS App Store • Ad hoc developer distribution • Enterprise distribution • The Apple Volume Purchase Program • The Apple Custom B2B  Android App Distribution • Google Play • Non-market resources
  • 27. 27 Confidential Device & Application Management
  • 28. 28 Confidential Anatomy of a Smartphone/Tablet • Handheld Computer/Processor • Communication Components • Modem Chips • Antenna • Bluetooth • WiFi • Input/Output & Sensors • Display • Touchscreen • Microphone/Speaker • Cameras • GPS • Compass • Accelerometer • NFC • USB
  • 29. 29 Confidential Building iOS and Android Applications  In order to construct a mobile app, need a “front end” – the bits that run on the device / “the app”  A disconnected app is typically not very interesting…so, we also need to build a “back end” to support the app Front End Back End
  • 30. 30 Confidential Solving Mobility Remote Windows desktop / applications Web apps / HTML 5 Virtualized OS
  • 31. 31 Confidential Current Approach Requires Managing the Whole Device MobileDeviceManagement Device Apps & Data Corporate Apps & Data What actually needs to be managed by the enterprise
  • 32. 32 Confidential © 2013 VMware Inc. All rights reserved Confidential We still have ways to go…

Editor's Notes

  1.  
  2. Sources:US numbers: http://www.comscore.com/fre/Insights/Press_Releases/2013/5/comScore_Reports_March_2013_U.S._Smartphone_Subscriber_Market_Share
  3. http://blog.nielsen.com/nielsenwire/?p=31891