SlideShare a Scribd company logo
Mobile Devices in the Enterprise:
   What IT Needs to Know




            Ashish Jain
            Director, Product Management, VMware
            @itickr
About VMware
 Company Overview
   –   $3.77 billion in 2011 revenues
   –   >$4.5 billion in cash and equivalents
   –   ~12,000 employees worldwide
   –   5th largest infrastructure software
       company in the world
 Proven in the Trenches
   –   300,000+ VMware customers
   –   100% of Fortune 100
   –   100% of Fortune Global 100
   –   99% of Fortune 1000
   –   97% of Fortune Global 500
 Partner Network
   – 2,200+ Technology & Consulting Partners
   – 25,000 Channel Partners
   – 59,000 VMware Certified Professionals
The Shifting Landscape
                                             Work Style




                              Applications




                    Devices



Delivery Methods
The Shifting Landscape


Devices                 Applications
Smart Phone Stats
Smart Phone Stats
Transition to the Post-PC Era Has Already Begun

        Installed base of enterprise applications

                                        2011




                                                    Source: Gartner, 2011
Demo

-   Access PPT via Windows PC
-   Access native app/cloud storage via iPad
-   Access a Virtual desktop via iPad
-   Access via streaming over HTML 5
Today’s Work Device
Challenges
 Joint ownership: Who owns the device? Liability ?
 Privacy: Does IT gets to monitor all activity?
 Lost Device: What happens if lose the device? Or I
  sell?
 Job change: What happens when I leave the
  company? Can IT wipe everything?
 Data Leakage: I copy data locally? USB drive?
  Malicious apps?
 Cost: Does it cost more to support BYOD?
 …
IT Response
“If you access business resources from a device,
you give us the right to manage, lock and even
wipe that device, even if you end up losing
personal data and apps as a result”
< Waiting for slide from Mark Diodati >
Solutions

 Data Loss Prevention (DLP)

 Mobile Device Management (MDM)

 Mobile App Management (MAM)
Data Loss Prevention (DLP)

Text analysis, Metatagging, monitoring, blocking
via Gateway server, or native mobile app or
baking content management into apps
Mobile Device Management

On-device encryption, PIN enforcement, Remote
lock, Remote wipe, Support VPN, Restrict
Wireless, Disable Camera, Stop Email
forwarding, Prevent iCloud backup, Cert Auth …
Smart Phones Market Share
iOS




    src - http://blog.amadeusconsulting.com/wp-content/uploads/2012/05/audiobooksiosdistribution.png


Version       Release        %
              Date
iOS 3.x       June, 2009     1%

iOS 4.x       June 2010      15%

iOS 5.x       June 2011      83%
Android’s Fragmentation Issue

Version    Name          Release    %
                         Date

2.2        Froyo         May 2010   17.3%

2.3.x      Gingerbread   Dec 2010   64%

3.X        Honeycomb     Feb 2011   2.4%

4.X        Ice Cream     Oct 2011   10.9%
           Sandwitch
Mobile App Management (MAM)

Enterprise app store, distribution, app policies, app
blacklists, Wrapping , Secure Container, SDK, Licensing,
Billing, Internal app storage, Bulk purchase…
Security and Identity
SSO Flow (Browser only)

         IdP                      RP
     3



AD

               SAML
                      4   2
                              1
SSO Flow (with mobile app)

          IdP                      RP
     4



AD                                      AS, RS

                SAML
                       5   3       6
                                        OAuth
                                   2




                                   Mobile
                               1
                                    App
SSO Flow (challenges)

                                                                      RP
                   IdP                                           RP
        4



  AD                                                                       AS, RS

                                    SAML
                                                5   3            6
                                                                           OAuth
                                                                 2


 Authentication per Mobile App. No Authn State on Device
 No invalidation of access token during AD deprovisioning
 No clean up of offline/cached data on device                   Mobile
                                                             1
                                                                  App
SSO Flow (challenges)

            IdP                           RP
     4



AD                                             AS, RS

                       SAML
                              5   3       6

            ?                             2
                                               OAuth



         Native IdP
                                          Mobile
            AS                        1
                                           App
Thanks

More Related Content

What's hot

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
CA API Management
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
CA API Management
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
Nordic APIs
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Hitachi ID Systems, Inc.
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
kirgy
 
Using the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceUsing the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & Finance
Hitesh Sahu
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android Aapplications
Roshan Thomas
 
Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019
Anne Smith
 
MCSDataSheet
MCSDataSheetMCSDataSheet
MCSDataSheet
Bilal Khan
 
Mobile_app_security
Mobile_app_securityMobile_app_security
Mobile_app_security
Hassan El Hadary
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
CA API Management
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
Nordic APIs
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
Srivatsan Srinivasan
 
Android Cloud To Device Messaging
Android Cloud To Device MessagingAndroid Cloud To Device Messaging
Android Cloud To Device Messaging
Fernando Cejas
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
Ankit Giri
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)
Nordic APIs
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
CA API Management
 
Android app installation-dropbox
Android app installation-dropboxAndroid app installation-dropbox
Android app installation-dropbox
Maxpromotion
 

What's hot (20)

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
 
Using the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceUsing the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & Finance
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android Aapplications
 
Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019
 
MCSDataSheet
MCSDataSheetMCSDataSheet
MCSDataSheet
 
Mobile_app_security
Mobile_app_securityMobile_app_security
Mobile_app_security
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Android Cloud To Device Messaging
Android Cloud To Device MessagingAndroid Cloud To Device Messaging
Android Cloud To Device Messaging
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
 
Android app installation-dropbox
Android app installation-dropboxAndroid app installation-dropbox
Android app installation-dropbox
 

Similar to Mobile Devices in the Enterprise: What IT needs to know

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
Heinrich Seeger
 
Re Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and AppsRe Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and Apps
WSO2
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
owaspindia
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
Kris Wagner
 
The Enterprise Goes Mobile
The Enterprise Goes MobileThe Enterprise Goes Mobile
The Enterprise Goes Mobile
Connected-Blog
 
Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San Francisco
CA API Management
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
Mike Chang
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
Deirdre Curran
 
Ipad Application Development Casestudy
Ipad Application Development CasestudyIpad Application Development Casestudy
Ipad Application Development Casestudy
dheerajkureel
 
Mobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to releaseMobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to release
intunity
 
Workshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsWorkshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile Applications
RABS
 
SAP Runs SAP Mobile
SAP Runs SAP MobileSAP Runs SAP Mobile
SAP Runs SAP Mobile
Vitaliy Rudnytskiy
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2
 
StefanoFiorini
StefanoFioriniStefanoFiorini
StefanoFiorini
Stefano Fiorini
 
Triangle Node Meetup : APIs in Minutes with Node.js
Triangle Node Meetup :  APIs in Minutes with Node.jsTriangle Node Meetup :  APIs in Minutes with Node.js
Triangle Node Meetup : APIs in Minutes with Node.js
Shubhra Kar
 
SunSmart Global Profile
SunSmart Global ProfileSunSmart Global Profile
SunSmart Global Profile
Sundar Rajan
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
Herve Danzelaud
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
nerb13
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
Apperian
 

Similar to Mobile Devices in the Enterprise: What IT needs to know (20)

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
 
Re Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and AppsRe Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and Apps
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
The Enterprise Goes Mobile
The Enterprise Goes MobileThe Enterprise Goes Mobile
The Enterprise Goes Mobile
 
Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San Francisco
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
 
Ipad Application Development Casestudy
Ipad Application Development CasestudyIpad Application Development Casestudy
Ipad Application Development Casestudy
 
Mobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to releaseMobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to release
 
Workshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsWorkshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile Applications
 
SAP Runs SAP Mobile
SAP Runs SAP MobileSAP Runs SAP Mobile
SAP Runs SAP Mobile
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
StefanoFiorini
StefanoFioriniStefanoFiorini
StefanoFiorini
 
Triangle Node Meetup : APIs in Minutes with Node.js
Triangle Node Meetup :  APIs in Minutes with Node.jsTriangle Node Meetup :  APIs in Minutes with Node.js
Triangle Node Meetup : APIs in Minutes with Node.js
 
SunSmart Global Profile
SunSmart Global ProfileSunSmart Global Profile
SunSmart Global Profile
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 

More from Ashish Jain

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User Experience
Ashish Jain
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPal
Ashish Jain
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal
Ashish Jain
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPal
Ashish Jain
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPal
Ashish Jain
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal Identity
Ashish Jain
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010
Ashish Jain
 
Open Id Summit
Open Id SummitOpen Id Summit
Open Id Summit
Ashish Jain
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled water
Ashish Jain
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security Issues
Ashish Jain
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
Ashish Jain
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
Ashish Jain
 
Concordia
ConcordiaConcordia
Concordia
Ashish Jain
 

More from Ashish Jain (13)

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User Experience
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPal
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPal
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPal
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal Identity
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010
 
Open Id Summit
Open Id SummitOpen Id Summit
Open Id Summit
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled water
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security Issues
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Concordia
ConcordiaConcordia
Concordia
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Mobile Devices in the Enterprise: What IT needs to know

  • 1. Mobile Devices in the Enterprise: What IT Needs to Know Ashish Jain Director, Product Management, VMware @itickr
  • 2. About VMware  Company Overview – $3.77 billion in 2011 revenues – >$4.5 billion in cash and equivalents – ~12,000 employees worldwide – 5th largest infrastructure software company in the world  Proven in the Trenches – 300,000+ VMware customers – 100% of Fortune 100 – 100% of Fortune Global 100 – 99% of Fortune 1000 – 97% of Fortune Global 500  Partner Network – 2,200+ Technology & Consulting Partners – 25,000 Channel Partners – 59,000 VMware Certified Professionals
  • 3. The Shifting Landscape Work Style Applications Devices Delivery Methods
  • 7. Transition to the Post-PC Era Has Already Begun Installed base of enterprise applications 2011 Source: Gartner, 2011
  • 8. Demo - Access PPT via Windows PC - Access native app/cloud storage via iPad - Access a Virtual desktop via iPad - Access via streaming over HTML 5
  • 10. Challenges  Joint ownership: Who owns the device? Liability ?  Privacy: Does IT gets to monitor all activity?  Lost Device: What happens if lose the device? Or I sell?  Job change: What happens when I leave the company? Can IT wipe everything?  Data Leakage: I copy data locally? USB drive? Malicious apps?  Cost: Does it cost more to support BYOD?  …
  • 11. IT Response “If you access business resources from a device, you give us the right to manage, lock and even wipe that device, even if you end up losing personal data and apps as a result”
  • 12. < Waiting for slide from Mark Diodati >
  • 13. Solutions  Data Loss Prevention (DLP)  Mobile Device Management (MDM)  Mobile App Management (MAM)
  • 14. Data Loss Prevention (DLP) Text analysis, Metatagging, monitoring, blocking via Gateway server, or native mobile app or baking content management into apps
  • 15. Mobile Device Management On-device encryption, PIN enforcement, Remote lock, Remote wipe, Support VPN, Restrict Wireless, Disable Camera, Stop Email forwarding, Prevent iCloud backup, Cert Auth …
  • 17. iOS src - http://blog.amadeusconsulting.com/wp-content/uploads/2012/05/audiobooksiosdistribution.png Version Release % Date iOS 3.x June, 2009 1% iOS 4.x June 2010 15% iOS 5.x June 2011 83%
  • 18. Android’s Fragmentation Issue Version Name Release % Date 2.2 Froyo May 2010 17.3% 2.3.x Gingerbread Dec 2010 64% 3.X Honeycomb Feb 2011 2.4% 4.X Ice Cream Oct 2011 10.9% Sandwitch
  • 19. Mobile App Management (MAM) Enterprise app store, distribution, app policies, app blacklists, Wrapping , Secure Container, SDK, Licensing, Billing, Internal app storage, Bulk purchase…
  • 21. SSO Flow (Browser only) IdP RP 3 AD SAML 4 2 1
  • 22. SSO Flow (with mobile app) IdP RP 4 AD AS, RS SAML 5 3 6 OAuth 2 Mobile 1 App
  • 23. SSO Flow (challenges) RP IdP RP 4 AD AS, RS SAML 5 3 6 OAuth 2  Authentication per Mobile App. No Authn State on Device  No invalidation of access token during AD deprovisioning  No clean up of offline/cached data on device Mobile 1 App
  • 24. SSO Flow (challenges) IdP RP 4 AD AS, RS SAML 5 3 6 ? 2 OAuth Native IdP Mobile AS 1 App

Editor's Notes

  1. We are uniquely qualified to support customers’ journey to the new era of IT, given our clear leadership in virtualization – the foundation for cloud computing architectures. Through innovation, and by challenging the status quo, VMware has become central to the IT transformation wave taking place in small to large global enterprises, fueling continual growth and investment in further product development.
  2. We are facing considerable change in this new era:New virtual and cloud sourced infrastructure modelsNew device form factors to support mobility, with enhanced user experiences born from consumer technologyLeading to a new class of mobile and SaaS applicationsSupporting more real-time, collaborative work styles
  3. We are facing considerable change in this new era:New virtual and cloud sourced infrastructure modelsNew device form factors to support mobility, with enhanced user experiences born from consumer technologyLeading to a new class of mobile and SaaS applicationsSupporting more real-time, collaborative work styles