SlideShare a Scribd company logo
1 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
Impact of Mobile computing on IT
Ashish Jain
Director, Product Management, VMware
@itickr
July 2013
2 Confidential
Mobile Devices are everywhere
3 Confidential
The Requirements we used to have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through Ownership
An application you own,
running on a server you own
People you employ
Using a network you
own to connect to…
Using software you own on a
Windows desktop you own
4 Confidential
What the world wants now…
Control & Governance is Becoming
More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn’t grant
Serious compliance concerns
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows OSs
Employees, contractors
outsourcers, partners
citizens, students
5 Confidential
New Device Platforms New Apps New User Expectations
Three trends are forcing massive change on IT
New Device
Platforms
§ A new way to work
§ Not just Windows anymore
New User
Expectations
§ Collaboration with partners,
contractors, and customers
§ Productivity through better technology
New
Apps
§ SaaS, mobile apps
§ Diversity
New Apps New User ExpectationsNew Device Platforms
6 Confidential
Mobility is Changing Everything:
0
300
600
900
2009 2010 2011 2012
Smartphones and tablets PC shipments
of information workers use
three or more devices for
w o r k t o i n c r e a s e
p r o d u c t i v i t y
EXPLOSIVE
GROWTH
in shipments of
smartphones and tablets
Sources: IDC, BGR, Forrester
FLAT
pc shipments
New Device Platforms New Apps New User ExpectationsNew Device Platforms
BYOD & JIT
7 Confidential
The Changing Device Mix
148 141
202 240
128
352
722
1516
0
1000
2000
2012 2017
Smartphone
Tablet
Portable PC
Desktop PC
Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013
Connected Device Market by Product Category,
Shipments, 2012-2017 in Millions
8 Confidential
New Apps are Flooding the Enterprise
R a t i o o f m o b i l e a p p
development projects to native
P C p r o j e c t s i n 2 0 1 5
PACE OF TECHNOLOGY
ADOPTION IS
ACCELERATING
PC
100M USERS
20YEARS
INTERNET
100M USERS
10YEARS
MOBILE
100M USERS
5YEARS
% OS Neutral % Browser Specific % Windows
1996
CROSSOVER
POINT
Apps in the Enterprise
2011 2020
0%
100%
50%
New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms
Sources: Gartner, Internal VMware Analysis
App & Data Independence
9 Confidential
New User Expectations for Productivity are Driving IT to
Evolve
ENTERPRISE END USER COMPUTING
“88% of executives report
employees are using
their personal computing
technologies for
business purposes”
DEMAND ACCESS
FROM ANYWHERE
“9 out of 10 companies
report the use of
consumer technologies
in the workplace”
BETTER CONSUMER
TECHNOLOGIES
“74% of employees use
consumer
technologies due to
lack of compelling
alternatives from IT”
LACK OF CHOICES
FROM IT
New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations
Sources: IDC, Avanade
Innovate or Perish
10 Confidential
IT’s Objective for End User Computing Infrastructure
Deliver the right business apps and data to
user devices in a way that is efficient and
secure for IT and productive for the end user
11 Confidential
The Mobile Landscape
12 Confidential
OS	
  
In million
of units	
  
Market share	
  
Android	
   497,1	
   68,8%	
  
iOS	
   135,9	
   18,8%	
  
Blackberry	
   32,5	
   4,5%	
  
Symbian	
   23,9	
   3,3%	
  
Windows Phone	
   17,9	
   2,5%	
  
TOTAL	
   722,4	
   100,0%	
  
52%
19%
14%
8%
2% 5%
Android iOS
Symbian Blackberry
Windows Phone Others
2012 Smartphones Global Trends
12
Smartphones worldwide shipment 2012
Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013
Source: TomiAhonen Almanac 2013
1.3B smartphones in use
Smartphones worldwide installed based
as of December 2012
13 Confidential
2013 Data – Android continues its momentum…
14 Confidential
OS Trends
15 Confidential
Smartphones Trends in Key Markets
North America
§ Population:354M
§ Nb of Smartphones:210M
Shipment 2012
Android 71M
iOS 49M
Blackberry 5M
Windows 3M
Western Europe
§ Population:406M
§ Nb of Smartphones:260M
Shipment 2012
Android 69M	
  
iOS 26M	
  
Blackberry 9M	
  
Symbian 4M	
  
Windows 5M	
  
Mature Asia/Pacific
§ Population:82M
§ Nb of Smartphones:60M
Shipment 2012
Android 28M	
  
iOS 14M	
  
Blackberry 1M	
  
Symbian 3M	
  
Others 3M	
  
Greater China
§ Population:1540M
§ Nb of Smartphones:283M
Shipment 2012
Android 79M	
  
iOS 31M	
  
Windows 2M	
  
Bada 1M	
  
Symbian 0,5M	
  
16 Confidential
Android Landscape
§  Widely popular in developing countries
•  Lots of choice – screen size, price, capabilities, etc.
§  Not much traction in enterprise segment
•  Security
•  Perception is that Android is not secure
•  Google Play is ‘wild wild west’
•  Enterprise features (eg: MDM) weak
•  Fragmentation
•  No two devices are the same in terms of capabilities or UI
•  Hard for IT to support diverse environment
•  Lack of control
•  OS upgrades are controlled by carrier/OEM
•  Security patches not pushed out in a timely manner
§  OEMs starting to add capabilities
17 Confidential
Android Fragmentation
18 Confidential
Android Fragmentation
19 Confidential
iOS Landscape
§  Popular in North America, Western Europe and other richer
geographical pockets
•  Price rules them out in many developing countries
§  In tune with enterprise opportunity and have great traction
•  Increasing support for enterprise features in every hw and sw release
•  Security
•  Perception is that iOS is more secure than Android
•  App Store is curated
•  Strong enterprise features (encryption, MDM, etc.)
•  Fragmentation
•  Different screen sizes but not capabilities so perception is that there is no fragmention
in the Apple world
20 Confidential
iOS Landscape
21 Confidential
BlackBerry Landscape
§  Was good standard in enterprise market
•  Device Encryption
•  Remote Wiping for lost/stolen
•  Force password
•  Provision secure Email, VPN, Wifi
§  Missed BYOD trend completely and lost traction
§  BB 10 is decent
•  BlackBerry Balance – built in dual persona solution
•  Small market share and not growing
§  BB shops that didn’t already switch will likely stay with BB
§  Most customers already started switching to a more strategic
platform
•  Don’t view BB as strategic anymore
•  Migrating to iOS or Android or both
22 Confidential
Windows Landscape
§  Windows Phone and Windows 8 are still early
•  Windows Phone – more consumer oriented
•  Windows Tablet seems to be more enterprise friendly and will likely get more
traction that Windows phones in 2014
§  MSFT has deep pockets and will likely become the third dominant
mobile platform
•  Distant third….
23 Confidential
Mobile App Distribution
24 Confidential
50 Billion (iOS) vs. 48B (Android)
25 Confidential
Consumer Apps published to “public stores”
Sources: Nielsen, May 16, 2012, VMware Customer Research.
Amazon appstore
+ Other Stores
26 Confidential
App Distribution options
§ iOS App Distribution
• The Apple iOS App Store
• Ad hoc developer distribution
• Enterprise distribution
• The Apple Volume Purchase Program
• The Apple Custom B2B
§ Android App Distribution
• Google Play
• Non-market resources
27 Confidential
Device & Application Management
28 Confidential
Anatomy of a Smartphone/Tablet
•  Handheld Computer/Processor
•  Communication Components
•  Modem Chips
•  Antenna
•  Bluetooth
•  WiFi
•  Input/Output & Sensors
•  Display
•  Touchscreen
•  Microphone/Speaker
•  Cameras
•  GPS
•  Compass
•  Accelerometer
•  NFC
•  USB
29 Confidential
Building iOS and Android Applications
§  In order to construct a mobile app, need a “front end” – the bits
that run on the device / “the app”
§  A disconnected app is typically not very interesting…so, we also
need to build a “back end” to support the app
Front End Back End
30 Confidential
Solving Mobility
§ Remote Windows desktop / applications
§ Web apps / HTML 5
§ Virtualized OS
31 Confidential
Current Approach Requires Managing the Whole Device
MobileDeviceManagement
Device
Apps &
Data
Corporate
Apps &
Data
What actually needs to be managed
by the enterprise
32 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
We still have ways to go…
33 Confidential
Thank You!
34 Confidential
Range of Options for Device & App Control
Exchange ActiveSync
Email Calendar Contacts
Native (iOS & Android)
35 Confidential
Complex ActiveSync compatibility matrix
36 Confidential
Complex ActiveSync compatibility matrix (cont.)
37 Confidential
Range of Options for Device & App Control
Exchange ActiveSync
Email Calendar Contacts
Native (iOS & Android)
Secure
Documents
Container
Single App
Container
Native Apps
OS Vendor Policy Container
HTML 5 Apps/
WebClips
Blackberry Balance,
Samsung Knox
MDM Solutions
38 Confidential
Sample Apple iOS Device Control
39 Confidential
Range of Options for Device & App Control
Exchange ActiveSync
Email Calendar Contacts
Native (iOS & Android)
Secure
Documents
Container
Single App
Container
Native Apps
OS Vendor Policy Container
HTML 5 Apps/
WebClips
Blackberry Balance,
Samsung Knox
MDM Solutions
Mobile App
Management

More Related Content

What's hot

Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
Simon Lock
 
India's Mobile Phone Market
India's Mobile Phone MarketIndia's Mobile Phone Market
India's Mobile Phone Market
Ipsos Business Consulting
 
Positioning Platforms for Smartphones
Positioning Platforms for SmartphonesPositioning Platforms for Smartphones
Positioning Platforms for SmartphonesMandar Ghanekar
 
Marketing plan micromax
Marketing plan   micromaxMarketing plan   micromax
Marketing plan micromax
munish241
 
ORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIAORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIA
Anju Dony
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - Nokia
Pankaj Saharan
 
Taking Your Website Mobile
Taking Your Website MobileTaking Your Website Mobile
Taking Your Website Mobile
nijsitecore
 
Letter to Shareholders2002
Letter to Shareholders2002Letter to Shareholders2002
Letter to Shareholders2002earnirgsreports
 
Failure of nokia
Failure of nokiaFailure of nokia
Failure of nokia
Karan Chaudhary
 
Swot Analysis of Nokia
Swot Analysis of NokiaSwot Analysis of Nokia
Swot Analysis of Nokia
Aayush Kar
 
Smartphone
SmartphoneSmartphone
Smartphone
balqees91
 
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputsMobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Greenwich Consulting
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter MovesLaurent Viviez
 
Tablet Market Opportunities
Tablet Market OpportunitiesTablet Market Opportunities
Tablet Market OpportunitiesWinston Choe
 
XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014Madhur Singhal
 
Xiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand MarketXiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand Marketvy1230
 
customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...
Adil Hussain
 

What's hot (20)

Nokia
NokiaNokia
Nokia
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
 
India's Mobile Phone Market
India's Mobile Phone MarketIndia's Mobile Phone Market
India's Mobile Phone Market
 
Positioning Platforms for Smartphones
Positioning Platforms for SmartphonesPositioning Platforms for Smartphones
Positioning Platforms for Smartphones
 
Marketing plan micromax
Marketing plan   micromaxMarketing plan   micromax
Marketing plan micromax
 
ORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIAORGANIZATIONAL CHANGE: A STUDY ON NOKIA
ORGANIZATIONAL CHANGE: A STUDY ON NOKIA
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - Nokia
 
Taking Your Website Mobile
Taking Your Website MobileTaking Your Website Mobile
Taking Your Website Mobile
 
Letter to Shareholders2002
Letter to Shareholders2002Letter to Shareholders2002
Letter to Shareholders2002
 
Failure of nokia
Failure of nokiaFailure of nokia
Failure of nokia
 
Swot Analysis of Nokia
Swot Analysis of NokiaSwot Analysis of Nokia
Swot Analysis of Nokia
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputsMobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
Mobile World Congress 2013 - Greenwich Consulting Coverage - Key outputs
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter Moves
 
Brand dossier on nokia
Brand dossier on nokiaBrand dossier on nokia
Brand dossier on nokia
 
Tablet Market Opportunities
Tablet Market OpportunitiesTablet Market Opportunities
Tablet Market Opportunities
 
XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014XIOAMI Global- India Market Entry 2014
XIOAMI Global- India Market Entry 2014
 
Nokia
NokiaNokia
Nokia
 
Xiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand MarketXiaomi Phones - Entry into Thailand Market
Xiaomi Phones - Entry into Thailand Market
 
customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...customer Buying perception towards mobile phones with special reference to Mo...
customer Buying perception towards mobile phones with special reference to Mo...
 

Similar to CIS13: Impact of Mobile Computing on IT

MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013Ashish Jain
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014
The Judge Group
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014IMC Institute
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc erasolarisyourep
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
CA API Management
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
Troy C. Fulton
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
Sarwan Singh
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Top 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile WorkforceTop 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile Workforce
Mindgrub Technologies
 
Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013
Pablo Vittori
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
Kareem ElSayyed
 

Similar to CIS13: Impact of Mobile Computing on IT (20)

MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Top 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile WorkforceTop 5 Apps to Facilitate Mobile Workforce
Top 5 Apps to Facilitate Mobile Workforce
 
Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013Globant Mobile Future - Android UADE FIT 2013
Globant Mobile Future - Android UADE FIT 2013
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

CIS13: Impact of Mobile Computing on IT

  • 1. 1 Confidential © 2013 VMware Inc. All rights reserved Confidential Impact of Mobile computing on IT Ashish Jain Director, Product Management, VMware @itickr July 2013
  • 3. 3 Confidential The Requirements we used to have… Change is hard and highly managed Software implemented from the center out Difficult to adjust to users needs Control Through Ownership An application you own, running on a server you own People you employ Using a network you own to connect to… Using software you own on a Windows desktop you own
  • 4. 4 Confidential What the world wants now… Control & Governance is Becoming More Challenging Inability to track, control or secure information assets Can not remove access you didn’t grant Serious compliance concerns Apps live in many clouds and are easily procured without IT Always connected, via 3G, 4G and public or personal wifi Non-owned devices and multiple non-Windows OSs Employees, contractors outsourcers, partners citizens, students
  • 5. 5 Confidential New Device Platforms New Apps New User Expectations Three trends are forcing massive change on IT New Device Platforms § A new way to work § Not just Windows anymore New User Expectations § Collaboration with partners, contractors, and customers § Productivity through better technology New Apps § SaaS, mobile apps § Diversity New Apps New User ExpectationsNew Device Platforms
  • 6. 6 Confidential Mobility is Changing Everything: 0 300 600 900 2009 2010 2011 2012 Smartphones and tablets PC shipments of information workers use three or more devices for w o r k t o i n c r e a s e p r o d u c t i v i t y EXPLOSIVE GROWTH in shipments of smartphones and tablets Sources: IDC, BGR, Forrester FLAT pc shipments New Device Platforms New Apps New User ExpectationsNew Device Platforms BYOD & JIT
  • 7. 7 Confidential The Changing Device Mix 148 141 202 240 128 352 722 1516 0 1000 2000 2012 2017 Smartphone Tablet Portable PC Desktop PC Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013 Connected Device Market by Product Category, Shipments, 2012-2017 in Millions
  • 8. 8 Confidential New Apps are Flooding the Enterprise R a t i o o f m o b i l e a p p development projects to native P C p r o j e c t s i n 2 0 1 5 PACE OF TECHNOLOGY ADOPTION IS ACCELERATING PC 100M USERS 20YEARS INTERNET 100M USERS 10YEARS MOBILE 100M USERS 5YEARS % OS Neutral % Browser Specific % Windows 1996 CROSSOVER POINT Apps in the Enterprise 2011 2020 0% 100% 50% New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms Sources: Gartner, Internal VMware Analysis App & Data Independence
  • 9. 9 Confidential New User Expectations for Productivity are Driving IT to Evolve ENTERPRISE END USER COMPUTING “88% of executives report employees are using their personal computing technologies for business purposes” DEMAND ACCESS FROM ANYWHERE “9 out of 10 companies report the use of consumer technologies in the workplace” BETTER CONSUMER TECHNOLOGIES “74% of employees use consumer technologies due to lack of compelling alternatives from IT” LACK OF CHOICES FROM IT New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations Sources: IDC, Avanade Innovate or Perish
  • 10. 10 Confidential IT’s Objective for End User Computing Infrastructure Deliver the right business apps and data to user devices in a way that is efficient and secure for IT and productive for the end user
  • 12. 12 Confidential OS   In million of units   Market share   Android   497,1   68,8%   iOS   135,9   18,8%   Blackberry   32,5   4,5%   Symbian   23,9   3,3%   Windows Phone   17,9   2,5%   TOTAL   722,4   100,0%   52% 19% 14% 8% 2% 5% Android iOS Symbian Blackberry Windows Phone Others 2012 Smartphones Global Trends 12 Smartphones worldwide shipment 2012 Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013 Source: TomiAhonen Almanac 2013 1.3B smartphones in use Smartphones worldwide installed based as of December 2012
  • 13. 13 Confidential 2013 Data – Android continues its momentum…
  • 15. 15 Confidential Smartphones Trends in Key Markets North America § Population:354M § Nb of Smartphones:210M Shipment 2012 Android 71M iOS 49M Blackberry 5M Windows 3M Western Europe § Population:406M § Nb of Smartphones:260M Shipment 2012 Android 69M   iOS 26M   Blackberry 9M   Symbian 4M   Windows 5M   Mature Asia/Pacific § Population:82M § Nb of Smartphones:60M Shipment 2012 Android 28M   iOS 14M   Blackberry 1M   Symbian 3M   Others 3M   Greater China § Population:1540M § Nb of Smartphones:283M Shipment 2012 Android 79M   iOS 31M   Windows 2M   Bada 1M   Symbian 0,5M  
  • 16. 16 Confidential Android Landscape §  Widely popular in developing countries •  Lots of choice – screen size, price, capabilities, etc. §  Not much traction in enterprise segment •  Security •  Perception is that Android is not secure •  Google Play is ‘wild wild west’ •  Enterprise features (eg: MDM) weak •  Fragmentation •  No two devices are the same in terms of capabilities or UI •  Hard for IT to support diverse environment •  Lack of control •  OS upgrades are controlled by carrier/OEM •  Security patches not pushed out in a timely manner §  OEMs starting to add capabilities
  • 19. 19 Confidential iOS Landscape §  Popular in North America, Western Europe and other richer geographical pockets •  Price rules them out in many developing countries §  In tune with enterprise opportunity and have great traction •  Increasing support for enterprise features in every hw and sw release •  Security •  Perception is that iOS is more secure than Android •  App Store is curated •  Strong enterprise features (encryption, MDM, etc.) •  Fragmentation •  Different screen sizes but not capabilities so perception is that there is no fragmention in the Apple world
  • 21. 21 Confidential BlackBerry Landscape §  Was good standard in enterprise market •  Device Encryption •  Remote Wiping for lost/stolen •  Force password •  Provision secure Email, VPN, Wifi §  Missed BYOD trend completely and lost traction §  BB 10 is decent •  BlackBerry Balance – built in dual persona solution •  Small market share and not growing §  BB shops that didn’t already switch will likely stay with BB §  Most customers already started switching to a more strategic platform •  Don’t view BB as strategic anymore •  Migrating to iOS or Android or both
  • 22. 22 Confidential Windows Landscape §  Windows Phone and Windows 8 are still early •  Windows Phone – more consumer oriented •  Windows Tablet seems to be more enterprise friendly and will likely get more traction that Windows phones in 2014 §  MSFT has deep pockets and will likely become the third dominant mobile platform •  Distant third….
  • 24. 24 Confidential 50 Billion (iOS) vs. 48B (Android)
  • 25. 25 Confidential Consumer Apps published to “public stores” Sources: Nielsen, May 16, 2012, VMware Customer Research. Amazon appstore + Other Stores
  • 26. 26 Confidential App Distribution options § iOS App Distribution • The Apple iOS App Store • Ad hoc developer distribution • Enterprise distribution • The Apple Volume Purchase Program • The Apple Custom B2B § Android App Distribution • Google Play • Non-market resources
  • 27. 27 Confidential Device & Application Management
  • 28. 28 Confidential Anatomy of a Smartphone/Tablet •  Handheld Computer/Processor •  Communication Components •  Modem Chips •  Antenna •  Bluetooth •  WiFi •  Input/Output & Sensors •  Display •  Touchscreen •  Microphone/Speaker •  Cameras •  GPS •  Compass •  Accelerometer •  NFC •  USB
  • 29. 29 Confidential Building iOS and Android Applications §  In order to construct a mobile app, need a “front end” – the bits that run on the device / “the app” §  A disconnected app is typically not very interesting…so, we also need to build a “back end” to support the app Front End Back End
  • 30. 30 Confidential Solving Mobility § Remote Windows desktop / applications § Web apps / HTML 5 § Virtualized OS
  • 31. 31 Confidential Current Approach Requires Managing the Whole Device MobileDeviceManagement Device Apps & Data Corporate Apps & Data What actually needs to be managed by the enterprise
  • 32. 32 Confidential © 2013 VMware Inc. All rights reserved Confidential We still have ways to go…
  • 34. 34 Confidential Range of Options for Device & App Control Exchange ActiveSync Email Calendar Contacts Native (iOS & Android)
  • 35. 35 Confidential Complex ActiveSync compatibility matrix
  • 36. 36 Confidential Complex ActiveSync compatibility matrix (cont.)
  • 37. 37 Confidential Range of Options for Device & App Control Exchange ActiveSync Email Calendar Contacts Native (iOS & Android) Secure Documents Container Single App Container Native Apps OS Vendor Policy Container HTML 5 Apps/ WebClips Blackberry Balance, Samsung Knox MDM Solutions
  • 38. 38 Confidential Sample Apple iOS Device Control
  • 39. 39 Confidential Range of Options for Device & App Control Exchange ActiveSync Email Calendar Contacts Native (iOS & Android) Secure Documents Container Single App Container Native Apps OS Vendor Policy Container HTML 5 Apps/ WebClips Blackberry Balance, Samsung Knox MDM Solutions Mobile App Management