SlideShare a Scribd company logo
Bento Box Bliss of EMM

Ruben Spruijt,

CTO @

PQR – rsp@pqr.nl - @rspruijt
5
.
Aanpak is sleutel tot succes

Analyseren

Adviseren

Ontwerpen

Leveren

Bouwen

Migreren

Beheren
‘Who owns ..?’
IT: This is
the Device

Choose
Your Own
(CYO)

Bring Your
Own (BYO)

Buy Your
Own

On Your
Own

Self-reliant / Self - supporting
“Here is your
device”

“Choose your
own device”

“Bring your
Freedom
own device”

“Buy your
own device”

“On your own”

Limited hardware
choice, strict
policies

Choice of hardware
in catalog, limited
policies

Pick own
hardware, paid by
employer and
limited policies

Freedom in
Hardware, OS etc.
Almost no
restrictions

Freedom in
Hardware, OS etc.
No restrictions
“BYOD is the new

normal, BYOD is not for
everyone or every
situation“.
“Managing expectations
is

key in the paradigm shift called
CoIT “.
“It isn’t about Apple,

Google,Microsoft, devices or
apps,
It’s about

Me!”

Business Consumer
42
45
Mobile Application Delivery, Windows via SH






No redeveloping of ‘classic’ applications
Data centralized
No Offline capabilities
User Experience and costs
“App refactoring tools helpful, not common to use”



“Best choice when you run out of options”
Mobile Application Delivery, HTML5 - Web
Web architected apps are Network, browser and OS independent
Most web apps aren’t HTML5 apps
Most web apps aren’t designed / optimized for Mobile platforms
HTML5, User Interface optimized for mobile platforms, Offline support
Limited by browser on Mobile Platform
Not all features supported by the browser








47
Mobile Application Delivery, Rich Mobile
Consumer App Store focused
Application Isolation ‘By Design’ | iOS, Android, BlackBerry, WP
Delivery Business Apps on mobile platforms via SDK or App Wrapping





Management features hooked in on Application Level
SDK: In-house applications; develop and compile > re-distribute
App wrapping; unsigned binaries
Add management capabilities on App level







48

VPN support, Device policies, Encryption, Kill switch
It’s about Business AppZzzZ
Workspace Aggregation







Aggregate Apps: SaaS, Web, Windows (Hosted), Mobile Apps
Access to Data
Identity; Federated, SSO
Policy driven
Interacts with AppStore
Interacts with Connection Broker




On-premises or SaaS
Citrix, VMware, FrameHawk, Centrix

51
52
Mobile Device Management

`
Provisioning

Security

Monitoring and Reporting

Support
Who owns the device?!
Locked Down Device (LDD)

Company Owned Personally Enabled (COPE)

Bring Your Own Device (BYOD)

56
Challenge:
Not all features are available on all platforms

57
Source: http://ow.ly/l5ka3
Not all features are available on all platforms
iOS

59

Android

Windows Mobile
Mobile Application Management

Application



Focus =



Secure data/information by controlling access to the application



Apply policies on the application
Selective wipe of data stored with the application

Containerization of applications







63

App-wrapping
Software Development Kits (SDK)
No standards!
“It is not about (managing) the
device or application but
about data“.
VS
EMM
EMM Smackdown, Quick reference - FOCUS

68
How to make a decision (easy)
71
10 points for MobileIT Strategy
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
74

What do you want to achieve? | Focus
Do you need to manage something? | Assets
Focus on Device, Application, Data Management? | Data
Who owns the device? Who owns the data? | Owner
What is the Application Delivery Strategy? | Apps
Anyx7 (?) | Choices
Are there compliancy and regulations? | Rules
Who is owner of MobileIT strategy? | Accountable
What is the Mobile IT team?! | TeamWork
Understand Enterprise Mobility vision, vendors, solutions | Solutions
“Focus on strategy first,
features later!“
One more thing …..
Experience Center
Tell me and I'll forget,
"
Show me and I remember,
Involve me and I'll understand"
Thanks!
Ruben Spruijt

CTO
rsp@pqr.nl
@rspruijt

More Related Content

What's hot

A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
Ivanti
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
C/D/H Technology Consultants
 
BYOD
BYODBYOD
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis
 
Building Your Business Continuity Plan
Building Your Business Continuity PlanBuilding Your Business Continuity Plan
Building Your Business Continuity Plan
Ivanti
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
NetIQ
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Ivanti
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
Chief Optimist
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
Troy C. Fulton
 
Byod
ByodByod
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
FaithWestdorp
 
When Architecture Meets Data
When Architecture Meets DataWhen Architecture Meets Data
When Architecture Meets Data
Eoin Woods
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
centralohioissa
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge Gateways
Dell EMC World
 
Byod in corporate networks - www.omegapoint.us
Byod in corporate networks - www.omegapoint.usByod in corporate networks - www.omegapoint.us
Byod in corporate networks - www.omegapoint.us
Peter Swedin
 

What's hot (20)

A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD
BYODBYOD
BYOD
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Building Your Business Continuity Plan
Building Your Business Continuity PlanBuilding Your Business Continuity Plan
Building Your Business Continuity Plan
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
Byod
ByodByod
Byod
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
When Architecture Meets Data
When Architecture Meets DataWhen Architecture Meets Data
When Architecture Meets Data
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge Gateways
 
Byod in corporate networks - www.omegapoint.us
Byod in corporate networks - www.omegapoint.usByod in corporate networks - www.omegapoint.us
Byod in corporate networks - www.omegapoint.us
 

Viewers also liked

Japanese bentoboxes
Japanese bentoboxesJapanese bentoboxes
Japanese bentoboxesNancy Walkup
 
Bento Box
Bento BoxBento Box
Bento Box
Bstrauma
 
Phthalates
PhthalatesPhthalates
Phthalates
Ain Nadzri
 
Het goede het slechte en het lelijke van vendor lock-in door Gershon Janssen
Het goede het slechte en het lelijke van vendor lock-in door Gershon JanssenHet goede het slechte en het lelijke van vendor lock-in door Gershon Janssen
Het goede het slechte en het lelijke van vendor lock-in door Gershon Janssen
Ngi-NGN, platform voor ict professionals
 
Winnen met webservices, door Henri Koppen
Winnen met webservices, door Henri KoppenWinnen met webservices, door Henri Koppen
Winnen met webservices, door Henri Koppen
Ngi-NGN, platform voor ict professionals
 
Waarvoor kan ik PKI gebruiken?
Waarvoor kan ik PKI gebruiken?Waarvoor kan ik PKI gebruiken?
Waarvoor kan ik PKI gebruiken?
Ngi-NGN, platform voor ict professionals
 
Hybride clouds door bart veldhuis
Hybride clouds door bart veldhuis Hybride clouds door bart veldhuis
Hybride clouds door bart veldhuis
Ngi-NGN, platform voor ict professionals
 
Hoe bouw ik een PKI omgeving?
Hoe bouw ik een PKI omgeving?Hoe bouw ik een PKI omgeving?
Hoe bouw ik een PKI omgeving?
Ngi-NGN, platform voor ict professionals
 
Desired state configuration with Powershell
Desired state configuration with PowershellDesired state configuration with Powershell
Desired state configuration with Powershell
Ngi-NGN, platform voor ict professionals
 
Identity Management in de Cloud, door Martijn Bellaard
Identity Management in de Cloud, door Martijn BellaardIdentity Management in de Cloud, door Martijn Bellaard
Identity Management in de Cloud, door Martijn Bellaard
Ngi-NGN, platform voor ict professionals
 
Enterprise File Sharing Systems
Enterprise File Sharing SystemsEnterprise File Sharing Systems
Enterprise File Sharing Systems
Ngi-NGN, platform voor ict professionals
 
Presentatie Erwin derksen over Sovjet IT
Presentatie Erwin derksen over Sovjet IT Presentatie Erwin derksen over Sovjet IT
Presentatie Erwin derksen over Sovjet IT
Ngi-NGN, platform voor ict professionals
 
Applied 40S March 5, 2009
Applied 40S March 5, 2009Applied 40S March 5, 2009
Applied 40S March 5, 2009
Darren Kuropatwa
 
Direct access
Direct access Direct access
Test per gara
Test per garaTest per gara
Test per gara
Dritan Halimi
 
Pyetje me pergjigje nga informatika
Pyetje me  pergjigje nga  informatikaPyetje me  pergjigje nga  informatika
Pyetje me pergjigje nga informatika
Dritan Halimi
 
Exchange Online in de bestaande organisatie
Exchange Online in de bestaande organisatieExchange Online in de bestaande organisatie
Exchange Online in de bestaande organisatie
Ngi-NGN, platform voor ict professionals
 
Integratie Exchange met Lync
Integratie Exchange met LyncIntegratie Exchange met Lync
Integratie Exchange met Lync
Ngi-NGN, platform voor ict professionals
 

Viewers also liked (20)

New
NewNew
New
 
Japanese bentoboxes
Japanese bentoboxesJapanese bentoboxes
Japanese bentoboxes
 
Bento Box
Bento BoxBento Box
Bento Box
 
Phthalates
PhthalatesPhthalates
Phthalates
 
Het goede het slechte en het lelijke van vendor lock-in door Gershon Janssen
Het goede het slechte en het lelijke van vendor lock-in door Gershon JanssenHet goede het slechte en het lelijke van vendor lock-in door Gershon Janssen
Het goede het slechte en het lelijke van vendor lock-in door Gershon Janssen
 
Winnen met webservices, door Henri Koppen
Winnen met webservices, door Henri KoppenWinnen met webservices, door Henri Koppen
Winnen met webservices, door Henri Koppen
 
Waarvoor kan ik PKI gebruiken?
Waarvoor kan ik PKI gebruiken?Waarvoor kan ik PKI gebruiken?
Waarvoor kan ik PKI gebruiken?
 
Hybride clouds door bart veldhuis
Hybride clouds door bart veldhuis Hybride clouds door bart veldhuis
Hybride clouds door bart veldhuis
 
2013 ngn 1e webinar google apps
2013 ngn 1e webinar google apps2013 ngn 1e webinar google apps
2013 ngn 1e webinar google apps
 
Hoe bouw ik een PKI omgeving?
Hoe bouw ik een PKI omgeving?Hoe bouw ik een PKI omgeving?
Hoe bouw ik een PKI omgeving?
 
Desired state configuration with Powershell
Desired state configuration with PowershellDesired state configuration with Powershell
Desired state configuration with Powershell
 
Identity Management in de Cloud, door Martijn Bellaard
Identity Management in de Cloud, door Martijn BellaardIdentity Management in de Cloud, door Martijn Bellaard
Identity Management in de Cloud, door Martijn Bellaard
 
Enterprise File Sharing Systems
Enterprise File Sharing SystemsEnterprise File Sharing Systems
Enterprise File Sharing Systems
 
Presentatie Erwin derksen over Sovjet IT
Presentatie Erwin derksen over Sovjet IT Presentatie Erwin derksen over Sovjet IT
Presentatie Erwin derksen over Sovjet IT
 
Applied 40S March 5, 2009
Applied 40S March 5, 2009Applied 40S March 5, 2009
Applied 40S March 5, 2009
 
Direct access
Direct access Direct access
Direct access
 
Test per gara
Test per garaTest per gara
Test per gara
 
Pyetje me pergjigje nga informatika
Pyetje me  pergjigje nga  informatikaPyetje me  pergjigje nga  informatika
Pyetje me pergjigje nga informatika
 
Exchange Online in de bestaande organisatie
Exchange Online in de bestaande organisatieExchange Online in de bestaande organisatie
Exchange Online in de bestaande organisatie
 
Integratie Exchange met Lync
Integratie Exchange met LyncIntegratie Exchange met Lync
Integratie Exchange met Lync
 

Similar to The Bento Box of Enterprise Mobility

Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
JumpCloud
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Lookout
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
OracleIDM
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
Mike Brannon
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
Parag Deodhar
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
Barcoding, Inc.
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
DMIMarketing
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
Alex Stamos
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
Debbie Richards
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
Tim Youm
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
Rashid Khatmey
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
Diego Alberto Tamayo
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
Arlette Measures
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 

Similar to The Bento Box of Enterprise Mobility (20)

Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 

More from Ngi-NGN, platform voor ict professionals

Paid vs Free Cloud door Asim Jahan (Jahan Information Security)
Paid vs Free Cloud door Asim Jahan (Jahan Information Security)Paid vs Free Cloud door Asim Jahan (Jahan Information Security)
Paid vs Free Cloud door Asim Jahan (Jahan Information Security)
Ngi-NGN, platform voor ict professionals
 
Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)
Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)
Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)
Ngi-NGN, platform voor ict professionals
 
Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)
Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)
Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)
Ngi-NGN, platform voor ict professionals
 
From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization
Ngi-NGN, platform voor ict professionals
 
Portret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet Noppers
Portret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet NoppersPortret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet Noppers
Portret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet Noppers
Ngi-NGN, platform voor ict professionals
 

More from Ngi-NGN, platform voor ict professionals (6)

Paid vs Free Cloud door Asim Jahan (Jahan Information Security)
Paid vs Free Cloud door Asim Jahan (Jahan Information Security)Paid vs Free Cloud door Asim Jahan (Jahan Information Security)
Paid vs Free Cloud door Asim Jahan (Jahan Information Security)
 
Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)
Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)
Werkvoorziening van de IT afdeling en de cloud door Leon van den Bogaert (CTAC)
 
Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)
Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)
Vertrouwen in de cloud, hoe maak je dat hard? Door Michiel Steltman (DHPA)
 
From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization
 
2013 ngn 2e webinar google apps beheer
2013 ngn 2e webinar google apps beheer2013 ngn 2e webinar google apps beheer
2013 ngn 2e webinar google apps beheer
 
Portret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet Noppers
Portret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet NoppersPortret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet Noppers
Portret van Netwerk Gebruikersgroep Nederland (NGN) lid Piet Noppers
 

Recently uploaded

The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

The Bento Box of Enterprise Mobility

  • 1. Bento Box Bliss of EMM Ruben Spruijt, CTO @ PQR – rsp@pqr.nl - @rspruijt
  • 2.
  • 3.
  • 4.
  • 5. 5
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. .
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Aanpak is sleutel tot succes Analyseren Adviseren Ontwerpen Leveren Bouwen Migreren Beheren
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. ‘Who owns ..?’ IT: This is the Device Choose Your Own (CYO) Bring Your Own (BYO) Buy Your Own On Your Own Self-reliant / Self - supporting “Here is your device” “Choose your own device” “Bring your Freedom own device” “Buy your own device” “On your own” Limited hardware choice, strict policies Choice of hardware in catalog, limited policies Pick own hardware, paid by employer and limited policies Freedom in Hardware, OS etc. Almost no restrictions Freedom in Hardware, OS etc. No restrictions
  • 32. “BYOD is the new normal, BYOD is not for everyone or every situation“.
  • 33. “Managing expectations is key in the paradigm shift called CoIT “.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. “It isn’t about Apple, Google,Microsoft, devices or apps, It’s about Me!” Business Consumer
  • 41.
  • 42. 42
  • 43.
  • 44.
  • 45. 45
  • 46. Mobile Application Delivery, Windows via SH      No redeveloping of ‘classic’ applications Data centralized No Offline capabilities User Experience and costs “App refactoring tools helpful, not common to use”  “Best choice when you run out of options”
  • 47. Mobile Application Delivery, HTML5 - Web Web architected apps are Network, browser and OS independent Most web apps aren’t HTML5 apps Most web apps aren’t designed / optimized for Mobile platforms HTML5, User Interface optimized for mobile platforms, Offline support Limited by browser on Mobile Platform Not all features supported by the browser       47
  • 48. Mobile Application Delivery, Rich Mobile Consumer App Store focused Application Isolation ‘By Design’ | iOS, Android, BlackBerry, WP Delivery Business Apps on mobile platforms via SDK or App Wrapping    Management features hooked in on Application Level SDK: In-house applications; develop and compile > re-distribute App wrapping; unsigned binaries Add management capabilities on App level      48 VPN support, Device policies, Encryption, Kill switch
  • 50.
  • 51. Workspace Aggregation       Aggregate Apps: SaaS, Web, Windows (Hosted), Mobile Apps Access to Data Identity; Federated, SSO Policy driven Interacts with AppStore Interacts with Connection Broker   On-premises or SaaS Citrix, VMware, FrameHawk, Centrix 51
  • 52. 52
  • 53.
  • 54.
  • 56. Who owns the device?! Locked Down Device (LDD) Company Owned Personally Enabled (COPE) Bring Your Own Device (BYOD) 56
  • 57. Challenge: Not all features are available on all platforms 57
  • 59. Not all features are available on all platforms iOS 59 Android Windows Mobile
  • 60.
  • 61.
  • 62.
  • 63. Mobile Application Management Application  Focus =  Secure data/information by controlling access to the application   Apply policies on the application Selective wipe of data stored with the application Containerization of applications     63 App-wrapping Software Development Kits (SDK) No standards!
  • 64.
  • 65. “It is not about (managing) the device or application but about data“.
  • 66. VS
  • 67. EMM
  • 68. EMM Smackdown, Quick reference - FOCUS 68
  • 69.
  • 70. How to make a decision (easy)
  • 71. 71
  • 72.
  • 73.
  • 74. 10 points for MobileIT Strategy 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 74 What do you want to achieve? | Focus Do you need to manage something? | Assets Focus on Device, Application, Data Management? | Data Who owns the device? Who owns the data? | Owner What is the Application Delivery Strategy? | Apps Anyx7 (?) | Choices Are there compliancy and regulations? | Rules Who is owner of MobileIT strategy? | Accountable What is the Mobile IT team?! | TeamWork Understand Enterprise Mobility vision, vendors, solutions | Solutions
  • 75. “Focus on strategy first, features later!“
  • 76. One more thing …..
  • 78. Tell me and I'll forget, " Show me and I remember, Involve me and I'll understand"
  • 79.
  • 80.