SlideShare a Scribd company logo
1 of 28
Download to read offline
Android for Work
by George McKinney @georgemck
Google Developer Group Los Angeles
September 29, 2016
Goal: Provide an Overview
of Android for Work
About Me
Android / BlackBerry Developer
G Suite (Google Apps) Admin
Adobe PhoneGap User Group Manager
@georgemck
Linkedin.com/in/georgemckinney
Trainer at AcademyX based in SF Bay Area
Founder/Developer at Zukini Mobile
What about Security?
How Serious is the threat?
Android™ is the world's most popular mobile platform, with an 85% share of the
market. It's no surprise then that Android is also the target for 98% of all mobile
malware. User adoption and security threats are both considerations that IT
administrators and business leaders need to address.
What are the Consequences?
1. Corporate Espionage costs the U.S. Billions of $$$
2. Political Fallout due to leaks
3. Personal data siphoned and abused
What can Business do about it?
1. Use common best practices for personal security
2. Find an EMM provider
What is Enterprise Mobility Management?
Enterprise mobility management (EMM) is the set of processes and
technology in place to manage the increasing proliferation of mobile devices
and fragmented device operating systems (OS) to ensure the safety and
security of business information.
Source: Frost & Sullivan, 2015.
What is Android for Work?
Android for Work is a program for supporting enterprise use of Android, which consists of product features in Android, Google Play for
Work, and other productivity tools. Android for Work is primarily exposed via APIs that enterprise mobility management (EMM)
providers and enterprise application developers can use to deliver a secure, productive, and rich mobile experience to their customers’
employees.
Solutions built on Android for Work include these benefits:
Data security—Business data is separated in a work profile and protected device-wide on work-managed devices. IT can apply
data leakage prevention policies.
Apps security—Work apps are deployed through Google Play for Work. IT can prevent installation of apps from unknown
sources and apply app configurations.
Device security—Android for Work devices are protected with disk encryption, lockscreen, remote attestation services, and
hardware-backed keystore when available.
G Suite customers can use Android for Work work features through their choice of EMM provider, either Google Mobile Management
or a third-party EMM provider. Customers who don’t have G Suite use a third-party EMM provider.
EMM providers are companies that offer advanced IT solutions for mobile device management (MDM), mobile application
management, mobile expense management, and more. Google provides APIs for third-party EMM providers to build Android for Work
solutions.
● SECURITY
● APPLICATIONS
● DEVICES
● MANAGEMENT
● PRODUCTIVITY
● NOUGAT
https://www.google.com/work/android/features
Android for Work requirements
In order to set up Android for Work on your device, your organization must first sign up for Android for Work and choose an enterprise mobility
management (EMM) provider. In addition, check the device requirements below.
Devices with Android 5.0 Lollipop and later that have work profile support.
If you're using your personal device, you need a Google Account with Google Play installed.
If Google is your EMM provider, you need to install G Suite Device Policy. If your organization is using a third-party EMM provider, they'll
require you to install a device policy controller application.
Android for Work Devices
ENTERPRISE MOBILITY PARTNERS (partial list)
https://www.google.com/work/android/partners
Android for Work Apps
BES 12 EMM
Good Secure EMM Suites by BlackBerry
Protect your business data and increase
workforce productivity with a complete
Enterprise Mobility Management (EMM)
solution. BlackBerry delivers the world’s most
secure, comprehensive mobile solution to
address this new imperative, with support for
devices running iOS, Android™, Windows®
10, Mac OS® X and BlackBerry®. Supported
BlackBerry smartphones include those
powered by both Android OS and by
BlackBerry® 10.
Recommendations for Consumers
● Get a phone from an Android for Work device partner
○ Preferably a phone launched with Marshallow or
Nougat
● Invest in security software (Lookout, AVG, DTEK)
● Install the monthly device updates
● Get familiar with what to do in case you lose your
phone
BlackBerry DTEK App
Questions and Comments

More Related Content

What's hot

Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Getting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMGetting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMWSO2
 
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerSamsung Business USA
 
Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerWSO2
 
Building Mobile Apps With jQuery For Any Device In The Cloud
Building Mobile Apps With jQuery For Any Device In The Cloud Building Mobile Apps With jQuery For Any Device In The Cloud
Building Mobile Apps With jQuery For Any Device In The Cloud Max Katz
 
Why to invest in mobile app development services
Why to invest in mobile app development servicesWhy to invest in mobile app development services
Why to invest in mobile app development servicesastoria0128
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Choosing the Right OS for Mobile App
Choosing the Right OS for Mobile AppChoosing the Right OS for Mobile App
Choosing the Right OS for Mobile AppCopper Mobile, Inc.
 
CS Mobile - Lyckad Mobilstrategi
CS Mobile - Lyckad MobilstrategiCS Mobile - Lyckad Mobilstrategi
CS Mobile - Lyckad MobilstrategiIBM Sverige
 
Mobile App development service by GirnarSoft
Mobile App development service by GirnarSoftMobile App development service by GirnarSoft
Mobile App development service by GirnarSoftKomal Agarwal
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager WSO2
 
What Apple's iOS 5 Means for Marketers
What Apple's iOS 5 Means for MarketersWhat Apple's iOS 5 Means for Marketers
What Apple's iOS 5 Means for MarketersBen Gaddis
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013Dealmaker Media
 
Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager WSO2
 

What's hot (20)

Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Getting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMGetting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMM
 
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business Enabler
 
Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility Manager
 
Building Mobile Apps With jQuery For Any Device In The Cloud
Building Mobile Apps With jQuery For Any Device In The Cloud Building Mobile Apps With jQuery For Any Device In The Cloud
Building Mobile Apps With jQuery For Any Device In The Cloud
 
Why to invest in mobile app development services
Why to invest in mobile app development servicesWhy to invest in mobile app development services
Why to invest in mobile app development services
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Choosing the Right OS for Mobile App
Choosing the Right OS for Mobile AppChoosing the Right OS for Mobile App
Choosing the Right OS for Mobile App
 
CS Mobile - Lyckad Mobilstrategi
CS Mobile - Lyckad MobilstrategiCS Mobile - Lyckad Mobilstrategi
CS Mobile - Lyckad Mobilstrategi
 
Mobile App development service by GirnarSoft
Mobile App development service by GirnarSoftMobile App development service by GirnarSoft
Mobile App development service by GirnarSoft
 
The KNOX Story
The KNOX StoryThe KNOX Story
The KNOX Story
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager
 
What Apple's iOS 5 Means for Marketers
What Apple's iOS 5 Means for MarketersWhat Apple's iOS 5 Means for Marketers
What Apple's iOS 5 Means for Marketers
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013
 
Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager
 
android
androidandroid
android
 
Meet windows10
Meet windows10Meet windows10
Meet windows10
 

Viewers also liked

Android forwork
Android forworkAndroid forwork
Android forworkKen Yee
 
Configuring android for_work
Configuring android for_workConfiguring android for_work
Configuring android for_workCentrify Support
 
What's new in Android N at Google I/O extended in Fukuoka
What's new in Android N at Google I/O extended in FukuokaWhat's new in Android N at Google I/O extended in Fukuoka
What's new in Android N at Google I/O extended in FukuokaYuki Anzai
 
What’s new in aNdroid [Google I/O Extended Bangkok 2016]
What’s new in aNdroid [Google I/O Extended Bangkok 2016]What’s new in aNdroid [Google I/O Extended Bangkok 2016]
What’s new in aNdroid [Google I/O Extended Bangkok 2016]Sittiphol Phanvilai
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security modelPragati Rai
 
Nougat 7.0 seminar
Nougat 7.0 seminarNougat 7.0 seminar
Nougat 7.0 seminarVen Esh
 
Android Automation Testing with Selendroid
Android Automation Testing with SelendroidAndroid Automation Testing with Selendroid
Android Automation Testing with SelendroidVikas Thange
 

Viewers also liked (9)

Google vs Apple
Google vs AppleGoogle vs Apple
Google vs Apple
 
Android forwork
Android forworkAndroid forwork
Android forwork
 
Configuring android for_work
Configuring android for_workConfiguring android for_work
Configuring android for_work
 
What's new in Android N at Google I/O extended in Fukuoka
What's new in Android N at Google I/O extended in FukuokaWhat's new in Android N at Google I/O extended in Fukuoka
What's new in Android N at Google I/O extended in Fukuoka
 
What’s new in aNdroid [Google I/O Extended Bangkok 2016]
What’s new in aNdroid [Google I/O Extended Bangkok 2016]What’s new in aNdroid [Google I/O Extended Bangkok 2016]
What’s new in aNdroid [Google I/O Extended Bangkok 2016]
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Nougat 7.0 seminar
Nougat 7.0 seminarNougat 7.0 seminar
Nougat 7.0 seminar
 
Android Automation Testing with Selendroid
Android Automation Testing with SelendroidAndroid Automation Testing with Selendroid
Android Automation Testing with Selendroid
 
Digitel office 365
Digitel office 365Digitel office 365
Digitel office 365
 

Similar to Android for Work Security and Management

Android Enterprise
Android EnterpriseAndroid Enterprise
Android EnterpriseHexnode
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche AGILLY
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Mobile Protection Application Development
Mobile Protection Application Development Mobile Protection Application Development
Mobile Protection Application Development Sigma Infosolutions, LLC
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Android_for_Work
Android_for_WorkAndroid_for_Work
Android_for_WorkSaba Sabrin
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleMicrosoft
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesJorge Gil Peña
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODAGILLY
 
MobilizeUrApps - Android Application Development
MobilizeUrApps - Android Application DevelopmentMobilizeUrApps - Android Application Development
MobilizeUrApps - Android Application Developmentmobilizeurapps
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 

Similar to Android for Work Security and Management (20)

Android Enterprise
Android EnterpriseAndroid Enterprise
Android Enterprise
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Mobile Protection Application Development
Mobile Protection Application Development Mobile Protection Application Development
Mobile Protection Application Development
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Android_for_Work
Android_for_WorkAndroid_for_Work
Android_for_Work
 
Android Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar PachauriAndroid Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar Pachauri
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alle
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
MobilizeUrApps - Android Application Development
MobilizeUrApps - Android Application DevelopmentMobilizeUrApps - Android Application Development
MobilizeUrApps - Android Application Development
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Android for Work Security and Management

  • 1. Android for Work by George McKinney @georgemck Google Developer Group Los Angeles September 29, 2016
  • 2. Goal: Provide an Overview of Android for Work
  • 3. About Me Android / BlackBerry Developer G Suite (Google Apps) Admin Adobe PhoneGap User Group Manager @georgemck Linkedin.com/in/georgemckinney Trainer at AcademyX based in SF Bay Area Founder/Developer at Zukini Mobile
  • 4.
  • 5.
  • 6. What about Security? How Serious is the threat? Android™ is the world's most popular mobile platform, with an 85% share of the market. It's no surprise then that Android is also the target for 98% of all mobile malware. User adoption and security threats are both considerations that IT administrators and business leaders need to address.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. What are the Consequences? 1. Corporate Espionage costs the U.S. Billions of $$$ 2. Political Fallout due to leaks 3. Personal data siphoned and abused
  • 12.
  • 13.
  • 14. What can Business do about it? 1. Use common best practices for personal security 2. Find an EMM provider
  • 15. What is Enterprise Mobility Management? Enterprise mobility management (EMM) is the set of processes and technology in place to manage the increasing proliferation of mobile devices and fragmented device operating systems (OS) to ensure the safety and security of business information. Source: Frost & Sullivan, 2015.
  • 16. What is Android for Work? Android for Work is a program for supporting enterprise use of Android, which consists of product features in Android, Google Play for Work, and other productivity tools. Android for Work is primarily exposed via APIs that enterprise mobility management (EMM) providers and enterprise application developers can use to deliver a secure, productive, and rich mobile experience to their customers’ employees. Solutions built on Android for Work include these benefits: Data security—Business data is separated in a work profile and protected device-wide on work-managed devices. IT can apply data leakage prevention policies. Apps security—Work apps are deployed through Google Play for Work. IT can prevent installation of apps from unknown sources and apply app configurations. Device security—Android for Work devices are protected with disk encryption, lockscreen, remote attestation services, and hardware-backed keystore when available. G Suite customers can use Android for Work work features through their choice of EMM provider, either Google Mobile Management or a third-party EMM provider. Customers who don’t have G Suite use a third-party EMM provider. EMM providers are companies that offer advanced IT solutions for mobile device management (MDM), mobile application management, mobile expense management, and more. Google provides APIs for third-party EMM providers to build Android for Work solutions.
  • 17. ● SECURITY ● APPLICATIONS ● DEVICES ● MANAGEMENT ● PRODUCTIVITY ● NOUGAT https://www.google.com/work/android/features
  • 18. Android for Work requirements In order to set up Android for Work on your device, your organization must first sign up for Android for Work and choose an enterprise mobility management (EMM) provider. In addition, check the device requirements below. Devices with Android 5.0 Lollipop and later that have work profile support. If you're using your personal device, you need a Google Account with Google Play installed. If Google is your EMM provider, you need to install G Suite Device Policy. If your organization is using a third-party EMM provider, they'll require you to install a device policy controller application.
  • 19. Android for Work Devices
  • 20. ENTERPRISE MOBILITY PARTNERS (partial list) https://www.google.com/work/android/partners
  • 23.
  • 24. Good Secure EMM Suites by BlackBerry Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS® X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
  • 25. Recommendations for Consumers ● Get a phone from an Android for Work device partner ○ Preferably a phone launched with Marshallow or Nougat ● Invest in security software (Lookout, AVG, DTEK) ● Install the monthly device updates ● Get familiar with what to do in case you lose your phone
  • 27.