SlideShare a Scribd company logo
From Liability to Asset:
How to Better Secure Enterprise Mobile Deployments
Jesus Rodriguez
CEO, KidoZen
From Liability to Asset:
How to Better Secure Enterprise Mobile Deployments
Jesus Rodriguez
CEO, KidoZen
About Me
• Hackerpreneur
• Co-Founder KidoZen
• Advisor to software companies (Microsoft,Oracle….)
• Board member
• Investor
• Speaker & author
• http://jrodthoughts.com
• http://weblogs.asp.net/gsusx
• https://twitter.com/jrdothoughts
About KidoZen
COMPANY
 Enterprise MobileApp Platform (PaaS)
 Headquarters: Miami, FL
 Development Center: BuenosAires, Argentina
 Privately Held
 Series A of $5 Million: November 2013,Third PointVentures
WHAT WE PROVIDE
 Enterprise Mobile Backend-as-a-Service API
 Mobile SDKs
 Mobile Enterprise Application Center
 HTML 5 Hosting
 Mobile DataVirtualization
 Mobile Data Management
 Mobile Analytics
 Mobile App Prototyper
CUSTOMERS
HIGHLIGHTS
• Large Number of Enterprise APIs
• Public, Private, Hybrid Cloud &
On-Premise
• Access and Manage Enterprise Data
Sources byApplying Security Policies at
the Data Level for Mobility
Management
• 100+ Global 1000 Customers
• Pricing starts at $5k/10M API Calls/10K
Users/200GB Store per Month
25 partners in 50 countries
Canada
United States
AustraliaSouth Africa
Taiwan
Philippines
Argentin
a
Egypt
Kuwait
Saudi Arabia
UAE
Mexico
India
Malaysia
Singapore
Indonesia
China
Europe
Austria
Belgium
Czech Republic
France
Germany
Hungary
Ireland
Italy
Luxembourg
Netherlands
Norway
Portugal
Slovakia
Spain
Sweden
Switzerland
United Kingdom
Russia
Geographic Coverage
Today’s Agenda
• Security in the enterprise mobile world
• Building blocks of an enterprise mobile security architecture
• How KidoZen does it
Security remains one of the
biggest challenges of enterprise
mobile solutions
What does security mean in the
mobile context?
5 Building Blocks of Enterprise Mobile Security
1. User authentication
2. User federation
3. Mobile app protection
4. API security
5. Data security
User Authentication
Authenticate mobile app users
against a corporate identity provider
The Challenge
Authentication Models
• Active authentication
• WS-Trust
• Passive authentication
• WS-Federation Passive Profile
• SAML2
• OAuth
• Integration with corporate identity providers
• Federation with corporate identity providers
• Support for passive authentication protocols
• Support for active authentication protocols
• Support for various security token formats
How KidoZen Does it
Identity Federation
Enable single sign-on and federation
between mobile apps and corporate
identity providers
The Challenge
Federation Models
• Implement federation protocols
• WS-Federation
• SAML2
• Implement token exchange and single sign-on models
How KidoZen Does it
• KidoZen Identity Federation Gateway
• Support for various identity providers
• Token exchange and mapping rules
Mobile API Protection
Securing mobile APIs based on
corporate identity assets
The Challenge
Mobile API Security
• Enable access control rules at the API level
• Enable access control policies based on user identity tokens
How KidoZen Does it
• API and Connectors security settings
• Access control engine based on identity token claims
Mobile Data Protection
Protect and secure the business data
assets used by mobile applications
The Challenge
Mobile Data Security
• Define the data used by a mobile application
• Provide access control policies at the data level
How KidoZen Does it
• KidoZen mobile data virtualization offers a model to
“virtualize” the data sources used by a mobile solution
• KidoZen mobile data management offers a way to secure
“virtualized data sources” using access control policies
Mobile App Protection
Provide access control policies
against the different mobile
applications in an enterprise
The Challenge
Mobile App Management
• Enable a central app store
• Integrate the app store with a corporate identity provider
• Provide access control policies at the mobile app level
How KidoZen Does it
• KidoZen’s enterprise app center provides a central application
store for enterprise mobile solutions
• The enterprise app center provides access control policies
based on enterprise identity providers such as MicrosoftActive
Directory
Other Enterprise Mobile Security Capabilities
• Device protection
• Malware detection
• Usage audit
Summary
• Security is one of the most important elements of enterprise
mobile architecture
• The are 5 fundamental building blocks to enterprise mobile
security
• User authentication
• Identity Federation
• API protection
• Data protection
• App management
• KidoZen provides a complete mobile identity management suite as
part of its enterprise mobile platform
Thanks
Jesus Rodriguez:
jr@kidozen.com
http://twitter.com/#!/jrodthoughts
http://jrodthoughts.com/
www.kidozen.com

More Related Content

What's hot

apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays
 
Blockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge AuthenticationBlockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge Authentication
dsapps
 
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
ForgeRock
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
dsapps
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
ForgeRock
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
Microservices security CSA meetup ppt 10_21_2015_v2-2
Microservices security CSA meetup ppt 10_21_2015_v2-2Microservices security CSA meetup ppt 10_21_2015_v2-2
Microservices security CSA meetup ppt 10_21_2015_v2-2
Vishwas Manral
 
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
Priyanka Aash
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
O365Con18 - Big Data - Sasha Fredrich
O365Con18 - Big Data - Sasha FredrichO365Con18 - Big Data - Sasha Fredrich
O365Con18 - Big Data - Sasha Fredrich
NCCOMMS
 
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
Drew Koenig
 
João Faria - Syone - OSL19
João Faria - Syone - OSL19João Faria - Syone - OSL19
João Faria - Syone - OSL19
marketingsyone
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
marketingsyone
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
 
INTERFACE, by apidays - Connecting APIs to the Blockchain, Mason Burkhalter,...
INTERFACE, by apidays  - Connecting APIs to the Blockchain, Mason Burkhalter,...INTERFACE, by apidays  - Connecting APIs to the Blockchain, Mason Burkhalter,...
INTERFACE, by apidays - Connecting APIs to the Blockchain, Mason Burkhalter,...
apidays
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
Bitglass
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
 

What's hot (20)

apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
 
Blockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge AuthenticationBlockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge Authentication
 
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
Microservices security CSA meetup ppt 10_21_2015_v2-2
Microservices security CSA meetup ppt 10_21_2015_v2-2Microservices security CSA meetup ppt 10_21_2015_v2-2
Microservices security CSA meetup ppt 10_21_2015_v2-2
 
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based app...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
O365Con18 - Big Data - Sasha Fredrich
O365Con18 - Big Data - Sasha FredrichO365Con18 - Big Data - Sasha Fredrich
O365Con18 - Big Data - Sasha Fredrich
 
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
João Faria - Syone - OSL19
João Faria - Syone - OSL19João Faria - Syone - OSL19
João Faria - Syone - OSL19
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
INTERFACE, by apidays - Connecting APIs to the Blockchain, Mason Burkhalter,...
INTERFACE, by apidays  - Connecting APIs to the Blockchain, Mason Burkhalter,...INTERFACE, by apidays  - Connecting APIs to the Blockchain, Mason Burkhalter,...
INTERFACE, by apidays - Connecting APIs to the Blockchain, Mason Burkhalter,...
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 

Similar to From Liability to Asset: How to Better Secure Enterprise Mobile Deployments

Mobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint ServerMobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint Serverkidozen
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Datakidozen
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 
Integration in the Enterprise Mobile World
Integration in the Enterprise Mobile WorldIntegration in the Enterprise Mobile World
Integration in the Enterprise Mobile Worldkidozen
 
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
Building Enterprise Ready Mobile Apps: A Developer Deep DiveBuilding Enterprise Ready Mobile Apps: A Developer Deep Dive
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
kidozen
 
API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile Strategy
Nitin Gaur
 
Mobile First Middleware
Mobile First MiddlewareMobile First Middleware
Mobile First Middleware
Jesus Rodriguez
 
Introducing the Mobile-First Middleware
Introducing the Mobile-First Middleware Introducing the Mobile-First Middleware
Introducing the Mobile-First Middleware
Jesus Rodriguez
 
KidoZen Enterprise-Ready Mobile App Infrastructure
KidoZen Enterprise-Ready Mobile App InfrastructureKidoZen Enterprise-Ready Mobile App Infrastructure
KidoZen Enterprise-Ready Mobile App Infrastructure
kidozen
 
Red Hat Mobile
Red Hat MobileRed Hat Mobile
Red Hat Mobile
Red Hat
 
Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014
Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014
Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014
Ben Elliott
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
gule mariam
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
Will Adams
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Ajay Chebbi
 
New Enterprisre Capabilities in Telerik Platform
New Enterprisre Capabilities in Telerik PlatformNew Enterprisre Capabilities in Telerik Platform
New Enterprisre Capabilities in Telerik Platform
Lohith Goudagere Nagaraj
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility kidozen
 
Salesforce Mobile Developer Week
Salesforce Mobile Developer WeekSalesforce Mobile Developer Week
Salesforce Mobile Developer Week
John Stevenson
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
 

Similar to From Liability to Asset: How to Better Secure Enterprise Mobile Deployments (20)

Mobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint ServerMobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint Server
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Data
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 
Integration in the Enterprise Mobile World
Integration in the Enterprise Mobile WorldIntegration in the Enterprise Mobile World
Integration in the Enterprise Mobile World
 
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
Building Enterprise Ready Mobile Apps: A Developer Deep DiveBuilding Enterprise Ready Mobile Apps: A Developer Deep Dive
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
 
API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile Strategy
 
Mobile First Middleware
Mobile First MiddlewareMobile First Middleware
Mobile First Middleware
 
Introducing the Mobile-First Middleware
Introducing the Mobile-First Middleware Introducing the Mobile-First Middleware
Introducing the Mobile-First Middleware
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
KidoZen Enterprise-Ready Mobile App Infrastructure
KidoZen Enterprise-Ready Mobile App InfrastructureKidoZen Enterprise-Ready Mobile App Infrastructure
KidoZen Enterprise-Ready Mobile App Infrastructure
 
Red Hat Mobile
Red Hat MobileRed Hat Mobile
Red Hat Mobile
 
Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014
Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014
Super Mobility Week - MobileCON - What's next for enterprise mobility 09112014
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
New Enterprisre Capabilities in Telerik Platform
New Enterprisre Capabilities in Telerik PlatformNew Enterprisre Capabilities in Telerik Platform
New Enterprisre Capabilities in Telerik Platform
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility
 
Salesforce Mobile Developer Week
Salesforce Mobile Developer WeekSalesforce Mobile Developer Week
Salesforce Mobile Developer Week
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 

More from kidozen

IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
kidozen
 
KidoZen Mastering Unit Testing in Xamarin
KidoZen Mastering Unit Testing in Xamarin KidoZen Mastering Unit Testing in Xamarin
KidoZen Mastering Unit Testing in Xamarin
kidozen
 
5 Trends that Will Shape The Future of the Mobile Enterprise
5 Trends that Will Shape The Future of the Mobile Enterprise5 Trends that Will Shape The Future of the Mobile Enterprise
5 Trends that Will Shape The Future of the Mobile Enterprisekidozen
 
What's Next for Enterprise Mobility
What's Next for Enterprise MobilityWhat's Next for Enterprise Mobility
What's Next for Enterprise Mobilitykidozen
 
Introducing the mHealth Platform as a Service
Introducing the mHealth Platform as a ServiceIntroducing the mHealth Platform as a Service
Introducing the mHealth Platform as a Servicekidozen
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)kidozen
 
Challenges in enterprise mobility development 2
Challenges in enterprise mobility development 2Challenges in enterprise mobility development 2
Challenges in enterprise mobility development 2kidozen
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Datakidozen
 
Mobilizing Microsoft SharePoint Server: An MBaaS PErspective
Mobilizing Microsoft SharePoint Server: An MBaaS PErspectiveMobilizing Microsoft SharePoint Server: An MBaaS PErspective
Mobilizing Microsoft SharePoint Server: An MBaaS PErspectivekidozen
 
M baa s as the new enterprise middleware
M baa s as the new enterprise middlewareM baa s as the new enterprise middleware
M baa s as the new enterprise middlewarekidozen
 
Kidozen Mobile First Cloud-Presentation
Kidozen Mobile First Cloud-PresentationKidozen Mobile First Cloud-Presentation
Kidozen Mobile First Cloud-Presentationkidozen
 
Whitepaper KidoZen vs-konyone
Whitepaper KidoZen vs-konyoneWhitepaper KidoZen vs-konyone
Whitepaper KidoZen vs-konyonekidozen
 
Whitepaper KidoZen overview
Whitepaper KidoZen  overviewWhitepaper KidoZen  overview
Whitepaper KidoZen overviewkidozen
 
Introducing the Mobile-First Cloud
Introducing the Mobile-First CloudIntroducing the Mobile-First Cloud
Introducing the Mobile-First Cloudkidozen
 

More from kidozen (14)

IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 
KidoZen Mastering Unit Testing in Xamarin
KidoZen Mastering Unit Testing in Xamarin KidoZen Mastering Unit Testing in Xamarin
KidoZen Mastering Unit Testing in Xamarin
 
5 Trends that Will Shape The Future of the Mobile Enterprise
5 Trends that Will Shape The Future of the Mobile Enterprise5 Trends that Will Shape The Future of the Mobile Enterprise
5 Trends that Will Shape The Future of the Mobile Enterprise
 
What's Next for Enterprise Mobility
What's Next for Enterprise MobilityWhat's Next for Enterprise Mobility
What's Next for Enterprise Mobility
 
Introducing the mHealth Platform as a Service
Introducing the mHealth Platform as a ServiceIntroducing the mHealth Platform as a Service
Introducing the mHealth Platform as a Service
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)
 
Challenges in enterprise mobility development 2
Challenges in enterprise mobility development 2Challenges in enterprise mobility development 2
Challenges in enterprise mobility development 2
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Data
 
Mobilizing Microsoft SharePoint Server: An MBaaS PErspective
Mobilizing Microsoft SharePoint Server: An MBaaS PErspectiveMobilizing Microsoft SharePoint Server: An MBaaS PErspective
Mobilizing Microsoft SharePoint Server: An MBaaS PErspective
 
M baa s as the new enterprise middleware
M baa s as the new enterprise middlewareM baa s as the new enterprise middleware
M baa s as the new enterprise middleware
 
Kidozen Mobile First Cloud-Presentation
Kidozen Mobile First Cloud-PresentationKidozen Mobile First Cloud-Presentation
Kidozen Mobile First Cloud-Presentation
 
Whitepaper KidoZen vs-konyone
Whitepaper KidoZen vs-konyoneWhitepaper KidoZen vs-konyone
Whitepaper KidoZen vs-konyone
 
Whitepaper KidoZen overview
Whitepaper KidoZen  overviewWhitepaper KidoZen  overview
Whitepaper KidoZen overview
 
Introducing the Mobile-First Cloud
Introducing the Mobile-First CloudIntroducing the Mobile-First Cloud
Introducing the Mobile-First Cloud
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

From Liability to Asset: How to Better Secure Enterprise Mobile Deployments

  • 1. From Liability to Asset: How to Better Secure Enterprise Mobile Deployments Jesus Rodriguez CEO, KidoZen From Liability to Asset: How to Better Secure Enterprise Mobile Deployments Jesus Rodriguez CEO, KidoZen
  • 2. About Me • Hackerpreneur • Co-Founder KidoZen • Advisor to software companies (Microsoft,Oracle….) • Board member • Investor • Speaker & author • http://jrodthoughts.com • http://weblogs.asp.net/gsusx • https://twitter.com/jrdothoughts
  • 3. About KidoZen COMPANY  Enterprise MobileApp Platform (PaaS)  Headquarters: Miami, FL  Development Center: BuenosAires, Argentina  Privately Held  Series A of $5 Million: November 2013,Third PointVentures WHAT WE PROVIDE  Enterprise Mobile Backend-as-a-Service API  Mobile SDKs  Mobile Enterprise Application Center  HTML 5 Hosting  Mobile DataVirtualization  Mobile Data Management  Mobile Analytics  Mobile App Prototyper CUSTOMERS HIGHLIGHTS • Large Number of Enterprise APIs • Public, Private, Hybrid Cloud & On-Premise • Access and Manage Enterprise Data Sources byApplying Security Policies at the Data Level for Mobility Management • 100+ Global 1000 Customers • Pricing starts at $5k/10M API Calls/10K Users/200GB Store per Month
  • 4. 25 partners in 50 countries Canada United States AustraliaSouth Africa Taiwan Philippines Argentin a Egypt Kuwait Saudi Arabia UAE Mexico India Malaysia Singapore Indonesia China Europe Austria Belgium Czech Republic France Germany Hungary Ireland Italy Luxembourg Netherlands Norway Portugal Slovakia Spain Sweden Switzerland United Kingdom Russia Geographic Coverage
  • 5. Today’s Agenda • Security in the enterprise mobile world • Building blocks of an enterprise mobile security architecture • How KidoZen does it
  • 6. Security remains one of the biggest challenges of enterprise mobile solutions
  • 7. What does security mean in the mobile context?
  • 8. 5 Building Blocks of Enterprise Mobile Security 1. User authentication 2. User federation 3. Mobile app protection 4. API security 5. Data security
  • 10. Authenticate mobile app users against a corporate identity provider The Challenge
  • 11. Authentication Models • Active authentication • WS-Trust • Passive authentication • WS-Federation Passive Profile • SAML2 • OAuth • Integration with corporate identity providers
  • 12. • Federation with corporate identity providers • Support for passive authentication protocols • Support for active authentication protocols • Support for various security token formats How KidoZen Does it
  • 14. Enable single sign-on and federation between mobile apps and corporate identity providers The Challenge
  • 15. Federation Models • Implement federation protocols • WS-Federation • SAML2 • Implement token exchange and single sign-on models
  • 16. How KidoZen Does it • KidoZen Identity Federation Gateway • Support for various identity providers • Token exchange and mapping rules
  • 18. Securing mobile APIs based on corporate identity assets The Challenge
  • 19. Mobile API Security • Enable access control rules at the API level • Enable access control policies based on user identity tokens
  • 20. How KidoZen Does it • API and Connectors security settings • Access control engine based on identity token claims
  • 22. Protect and secure the business data assets used by mobile applications The Challenge
  • 23. Mobile Data Security • Define the data used by a mobile application • Provide access control policies at the data level
  • 24. How KidoZen Does it • KidoZen mobile data virtualization offers a model to “virtualize” the data sources used by a mobile solution • KidoZen mobile data management offers a way to secure “virtualized data sources” using access control policies
  • 26. Provide access control policies against the different mobile applications in an enterprise The Challenge
  • 27. Mobile App Management • Enable a central app store • Integrate the app store with a corporate identity provider • Provide access control policies at the mobile app level
  • 28. How KidoZen Does it • KidoZen’s enterprise app center provides a central application store for enterprise mobile solutions • The enterprise app center provides access control policies based on enterprise identity providers such as MicrosoftActive Directory
  • 29. Other Enterprise Mobile Security Capabilities • Device protection • Malware detection • Usage audit
  • 30. Summary • Security is one of the most important elements of enterprise mobile architecture • The are 5 fundamental building blocks to enterprise mobile security • User authentication • Identity Federation • API protection • Data protection • App management • KidoZen provides a complete mobile identity management suite as part of its enterprise mobile platform