SlideShare a Scribd company logo
© 2014 VMware Inc. All rights reserved.
Three Keys to Building a
Secure Mobile Infrastructure in
Government Environments
Ben Goodman
Lead Evangelist,
End User Computing
IT’s Objective for End User Computing
Infrastructure
Deliver the right business apps and
data to
user devices in a way that is
efficient and secure for IT and
productive for the end user
The Landscape…
The world is changing rapidly.
The Requirements We Used to Have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through OwnershipPeople you employ
Using a network you
own to connect to…
Using software you
own on a Windows
desktop you own
An application you
own, running on a
server you own
What the World Wants Now…
Control & Governance is Becoming
More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn’t grant
Serious compliance
concerns
Apps live in many
clouds and are easily
procured without IT
Always connected,
via
3G, 4G and public or
personal wifi
Non-owned devices
and multiple non-
Windows OSs
Employees,
contractors
outsourcers, partners
citizens, students
IT Management Processes are Not Optimized For
Change
Ownership
Devices
Connection
Apps
PAST
90%
Windows Apps2
Ethernet
IT
Owned
1
Desktop
TODAY
50%
Non-Windows
Apps2
3G/4G
33%
Industry
average
BYOD
adoption1
10%
of Enterprises
are completely
mobile and
laptop4
FUTURE
4:1
Ratio of Mobile
apps to Windows
Apps3
Public/
Always
On
60%
of Enterprises will
be completely
mobile and
laptop4
85%
of Enterprises
with BYOD
programs1
STAGE IT IS
OPTIMIZED FOR
All citations are from Gartner, Inc. and are used with permission
Rate of Change is Accelerating
No DowntimeWorkspaceNew Access
Points
On-Demand ServicesApplication ChoiceData, Data and more
Data
Explosive Growth of Mobile
Mobile worker population will reach
1.3 Billionin 2015
Source: IDC Worldwide Mobile Worker Population 2011-2015
Forecast
Tablets are forecasted to reach 665
Millionin 2016
Source: Gartner Forecast: Media Tablets by Operating System,
Worldwide 2010-2016, 1Q12 Update
Smartphones forecasted to reach 1.279
Billion in 2016
Source: Gartner Forecast: Mobile Devices by Operating System,
Worldwide, 2009-2016, 1Q12 Update
67% of people
reported they are using
their personal device at
work
IT Has to Manage a Much More Diverse End-User Landscape
Personal DevicesCorporate Devices
Diverse Apps
Diverse
Platform
Data
Everywhere
Diverse
Devices
Mobile
There are Two Reasons to Invest
Sources: IDC, Forrester
REDUCE RISK AND COST GAIN AN EDGE
COST
Too many apps,
too many devices
Diversity = Complexity = Cost
PRODUCTIVITY
Mobile users are 20% more
productive than non-mobile workers
Access = Increased Output
SECURITY
Only 5% of devices use
mobile security
Low Adoption = Increased Risk
COLLABORATION
Communicate with at-home workers,
contractors, customers and partners
Collaboration = Performance
COMPLIANCE
Are consumer
technologies compliant?
Policy Violations = Increased Risk
SATISFACTION
Differentiate and
retain top talent
Satisfaction = Retention
How Do You Address Changing Landscape?
…and provide all your end-users with services at the speed of life?
… while leveraging your existing investments?
… with the same amount of resources?
… and with a clear path to the future?
The Three Keys…
What should be at the center of every
mobility program?
Don’t Get Stuck with Limiting Approaches
Secure mobile computing requires a long-term strategy for managing and
enabling a mobile environment. Consequently, agencies should avoid
these limiting responses to BYOD and other mobile trends:
Buy a Point Solution Does not scale, increases cost
Creates a management mess
Lock It Down Unhappy workforce
IT is viewed the “bad guy”
Ignore It Poor IT Control
Security and compliance risk
Manage Data and Applications
• Virtualization and cloud technologies now make it possible for agencies
to transform their assets into centralized services that employees can
access anytime, anywhere, and from any device.
• Enterprise Application catalogs give you a single place to manage
applications of all types. This is even more important in a mobile,
cross-platform world.
• Enterprise File Synchronization and Sharing technology and Mobile
Content Management technology make it easier for users to access
their data from anywhere. They can securely and easily share
documents with co-workers or others they collaborate with.
Strengthen & Simplify Security
• Leverage strong and multi-factor authentication.
• Consider isolating the networks on which mobile devices authenticate
to enhance security and ensure users only access agency data and
applications if authorized.
• Ensure that you have auditing and tracking capabilities for mobile
platforms equal to or greater than PC platforms.
• Ensure that devices are properly patched and limit OS versions that
you support
• Consider use of VDI. With a virtual desktop infrastructure (VDI), an
agency’s data and applications can be managed securely by IT staff
and then brokered and delivered to users according to agency policies
How to Optimize Delivery of EUC Services
Manage
users, not
devices
Embrace
co-ownership
Architect for
change and
continual
improvement
Prioritize
end user
experience
Treat mobile
as a first-
class citizen
How VMware
Delivers…
Building a Virtual Workspace
End-User Computing Vision
Desktop Laptop Tablet Phone Machine
Mission: Secure Virtual Workspace for Work at Speed of Life
PCs, Laptops
Thin Clients
Tablets,
Smartphones
Desktop
Management
and Delivery
Multi-Device
Workspace
(Mobile)
Introducing the Virtual Workspace
One login | One experience | Any device
Central Point of Control
Entitlements
Access Policies
Reporting
About AirWatch
• Leaders in mobile security, mobile device,
application
and content management across multiple
platforms
• Strong leadership team, headquartered in Atlanta,
ex-Manhattan Associates execs, built with no
outside capital
• Provides mobility solutions to 10,000+ global
customers
• Largest Enterprise Mobile Management & Security
provider with 1,600+ employees, largest R&D
team in category
Mission: Simplify Enterprise MobilityTM
10,000
customers
150
countries
16
languages
1,600
employees
AirWatch Solution Overview
What Blackberry Enterprise Server did for Blackberry devices, AirWatch does for today’s iOS, Android,
Windows and other platforms
Framework: Security, Multi-tenancy, Scalability, Privacy, Access-Control, Self-
Service, Telecom Expense
Enterprise Mobility Management Platform
Mobile Device
Management
Mobile
Application
Management
Mobile
Content
Management
Mobile Email
Management
Thank You
For more information, please visit
www.vmware.com/go/GovernmentMobility

More Related Content

What's hot

Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
Roadmap for Desktop Support's Future
Roadmap for Desktop Support's FutureRoadmap for Desktop Support's Future
Roadmap for Desktop Support's Future
San Francisco Bay Area
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User Computing
James Charter
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
DImension Data
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Info-Tech Research Group
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
Chris Pepin
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
Insight UK
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
Leena N
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
Waterstons Ltd
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
MobileWorxs
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
Ivanti
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
CompTIA
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
InnoTech
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
Bala G
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
Uni Systems S.M.S.A.
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 

What's hot (20)

Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Roadmap for Desktop Support's Future
Roadmap for Desktop Support's FutureRoadmap for Desktop Support's Future
Roadmap for Desktop Support's Future
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User Computing
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 

Viewers also liked

OECD GOV Open government data
OECD GOV Open government dataOECD GOV Open government data
OECD GOV Open government dataadamlerouge
 
The importance of a mobile government
The importance of a mobile governmentThe importance of a mobile government
The importance of a mobile government
Capgemini
 
Mobile Governance Applications
Mobile Governance ApplicationsMobile Governance Applications
Mobile Governance Applications
achalkumar
 
Zia Government Solutions from Paper to Mobile
Zia Government Solutions from Paper to MobileZia Government Solutions from Paper to Mobile
Zia Government Solutions from Paper to Mobile
Zia Consulting
 
ICT, Knowledge-based Society and Innovation 2.0
ICT, Knowledge-based Society and Innovation 2.0ICT, Knowledge-based Society and Innovation 2.0
ICT, Knowledge-based Society and Innovation 2.0
songgang
 
OECD GOV Observatory for Public Sector Innovation
OECD GOV Observatory for Public Sector InnovationOECD GOV Observatory for Public Sector Innovation
OECD GOV Observatory for Public Sector Innovationadamlerouge
 
Mobile Seva: Bringing Citizens and Government Together Through Mobiles, India
Mobile Seva: Bringing Citizens and Government Together Through Mobiles, IndiaMobile Seva: Bringing Citizens and Government Together Through Mobiles, India
Mobile Seva: Bringing Citizens and Government Together Through Mobiles, India
UNDP India
 
Google Apps for Government - GovLoop LIVE CHAT
Google Apps for Government - GovLoop LIVE CHATGoogle Apps for Government - GovLoop LIVE CHAT
Google Apps for Government - GovLoop LIVE CHATGovLoop
 
Transcending e-Government: a Case of Mobile Government in Beijing
Transcending e-Government: a Case of Mobile Government in BeijingTranscending e-Government: a Case of Mobile Government in Beijing
Transcending e-Government: a Case of Mobile Government in Beijing
songgang
 
Government on the move: trends in mobile technology and how government can ge...
Government on the move: trends in mobile technology and how government can ge...Government on the move: trends in mobile technology and how government can ge...
Government on the move: trends in mobile technology and how government can ge...
eGovernment Resource Centre
 
M-Government
M-GovernmentM-Government
M-Government
SysNet Integrators
 
m-government & android application development
m-government & android application developmentm-government & android application development
m-government & android application development
Arif Huda
 
MOBILE SOLUTIONS GUIDE FOR GOVERNMENT
MOBILE SOLUTIONS GUIDE FOR GOVERNMENTMOBILE SOLUTIONS GUIDE FOR GOVERNMENT
MOBILE SOLUTIONS GUIDE FOR GOVERNMENT
NGINX at F5
 
Open Data Strategies & Mobile Government (GCC Perspective)
Open Data Strategies & Mobile Government (GCC Perspective)Open Data Strategies & Mobile Government (GCC Perspective)
Open Data Strategies & Mobile Government (GCC Perspective)
Dr Usman Zafar
 
Empowering citizens and local government with mobile data
Empowering citizens and local government with mobile dataEmpowering citizens and local government with mobile data
Empowering citizens and local government with mobile data
Tim Willoughby
 
The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)
Mike Kujawski
 
HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...
HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...
HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...
Rendani Nevhulaudzi
 
M government - A Strategic Approach to developing mobility in e-services
M government - A Strategic Approach to developing mobility in e-servicesM government - A Strategic Approach to developing mobility in e-services
M government - A Strategic Approach to developing mobility in e-services
Ahmed Buhazza
 
Mobile Governance Policy, Government of India
Mobile Governance Policy, Government of IndiaMobile Governance Policy, Government of India
Mobile Governance Policy, Government of IndiaVikas Kanungo
 
Government 2.1 - "Mobile Government Services" by OGCIO
Government 2.1 - "Mobile Government Services" by OGCIOGovernment 2.1 - "Mobile Government Services" by OGCIO
Government 2.1 - "Mobile Government Services" by OGCIO
HKITF
 

Viewers also liked (20)

OECD GOV Open government data
OECD GOV Open government dataOECD GOV Open government data
OECD GOV Open government data
 
The importance of a mobile government
The importance of a mobile governmentThe importance of a mobile government
The importance of a mobile government
 
Mobile Governance Applications
Mobile Governance ApplicationsMobile Governance Applications
Mobile Governance Applications
 
Zia Government Solutions from Paper to Mobile
Zia Government Solutions from Paper to MobileZia Government Solutions from Paper to Mobile
Zia Government Solutions from Paper to Mobile
 
ICT, Knowledge-based Society and Innovation 2.0
ICT, Knowledge-based Society and Innovation 2.0ICT, Knowledge-based Society and Innovation 2.0
ICT, Knowledge-based Society and Innovation 2.0
 
OECD GOV Observatory for Public Sector Innovation
OECD GOV Observatory for Public Sector InnovationOECD GOV Observatory for Public Sector Innovation
OECD GOV Observatory for Public Sector Innovation
 
Mobile Seva: Bringing Citizens and Government Together Through Mobiles, India
Mobile Seva: Bringing Citizens and Government Together Through Mobiles, IndiaMobile Seva: Bringing Citizens and Government Together Through Mobiles, India
Mobile Seva: Bringing Citizens and Government Together Through Mobiles, India
 
Google Apps for Government - GovLoop LIVE CHAT
Google Apps for Government - GovLoop LIVE CHATGoogle Apps for Government - GovLoop LIVE CHAT
Google Apps for Government - GovLoop LIVE CHAT
 
Transcending e-Government: a Case of Mobile Government in Beijing
Transcending e-Government: a Case of Mobile Government in BeijingTranscending e-Government: a Case of Mobile Government in Beijing
Transcending e-Government: a Case of Mobile Government in Beijing
 
Government on the move: trends in mobile technology and how government can ge...
Government on the move: trends in mobile technology and how government can ge...Government on the move: trends in mobile technology and how government can ge...
Government on the move: trends in mobile technology and how government can ge...
 
M-Government
M-GovernmentM-Government
M-Government
 
m-government & android application development
m-government & android application developmentm-government & android application development
m-government & android application development
 
MOBILE SOLUTIONS GUIDE FOR GOVERNMENT
MOBILE SOLUTIONS GUIDE FOR GOVERNMENTMOBILE SOLUTIONS GUIDE FOR GOVERNMENT
MOBILE SOLUTIONS GUIDE FOR GOVERNMENT
 
Open Data Strategies & Mobile Government (GCC Perspective)
Open Data Strategies & Mobile Government (GCC Perspective)Open Data Strategies & Mobile Government (GCC Perspective)
Open Data Strategies & Mobile Government (GCC Perspective)
 
Empowering citizens and local government with mobile data
Empowering citizens and local government with mobile dataEmpowering citizens and local government with mobile data
Empowering citizens and local government with mobile data
 
The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)
 
HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...
HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...
HOW IS MOBILE IMPACTING ON GOVERNMENT CORPORATE COMMUNICATIONS AND SERVICE DE...
 
M government - A Strategic Approach to developing mobility in e-services
M government - A Strategic Approach to developing mobility in e-servicesM government - A Strategic Approach to developing mobility in e-services
M government - A Strategic Approach to developing mobility in e-services
 
Mobile Governance Policy, Government of India
Mobile Governance Policy, Government of IndiaMobile Governance Policy, Government of India
Mobile Governance Policy, Government of India
 
Government 2.1 - "Mobile Government Services" by OGCIO
Government 2.1 - "Mobile Government Services" by OGCIOGovernment 2.1 - "Mobile Government Services" by OGCIO
Government 2.1 - "Mobile Government Services" by OGCIO
 

Similar to Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
solarisyourep
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
Robert Kleinschmidt
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
Citrix
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
VMware
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
Kimber Spradlin
 
Designing and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDesigning and Developing Custom Mobile Applications
Designing and Developing Custom Mobile Applications
Dunn Solutions Group
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
Radhakrishnan Govindan
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
Uni Systems S.M.S.A.
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
IBM Danmark
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
Will Adams
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
Citrix
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Alex Zaltsman
 
New work style in modern enterprise
New work style in modern enterprise New work style in modern enterprise
New work style in modern enterprise ebuc
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
GWAVA
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
Citrix
 

Similar to Three Keys to Building a Secure Mobile Infrastructure in Government Environments (20)

Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Designing and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDesigning and Developing Custom Mobile Applications
Designing and Developing Custom Mobile Applications
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
New work style in modern enterprise
New work style in modern enterprise New work style in modern enterprise
New work style in modern enterprise
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 

More from VMware

vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
VMware
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
VMware
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
VMware
 
What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3
VMware
 
How Secure Is Your Business?
How Secure Is Your Business?How Secure Is Your Business?
How Secure Is Your Business?
VMware
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
VMware
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMware
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
VMware
 
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent OperationsvRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
VMware
 
Running and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierRunning and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got Easier
VMware
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
VMware
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
VMware
 
Infographic: Supercharge your Networking Career
Infographic: Supercharge your Networking CareerInfographic: Supercharge your Networking Career
Infographic: Supercharge your Networking Career
VMware
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
VMware
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
VMware
 
4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation
VMware
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service Provider
VMware
 
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
VMware
 
Virtualization Journey
Virtualization JourneyVirtualization Journey
Virtualization Journey
VMware
 
7 Reasons to Consider VMware Virtual SAN
7 Reasons to Consider VMware Virtual SAN 7 Reasons to Consider VMware Virtual SAN
7 Reasons to Consider VMware Virtual SAN
VMware
 

More from VMware (20)

vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3What's New in vRealize Business for Cloud 7.3
What's New in vRealize Business for Cloud 7.3
 
How Secure Is Your Business?
How Secure Is Your Business?How Secure Is Your Business?
How Secure Is Your Business?
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent OperationsvRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
vRealize Operations 6.4: Supercharge your SDDC Intelligent Operations
 
Running and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierRunning and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got Easier
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
Infographic: Supercharge your Networking Career
Infographic: Supercharge your Networking CareerInfographic: Supercharge your Networking Career
Infographic: Supercharge your Networking Career
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service Provider
 
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
 
Virtualization Journey
Virtualization JourneyVirtualization Journey
Virtualization Journey
 
7 Reasons to Consider VMware Virtual SAN
7 Reasons to Consider VMware Virtual SAN 7 Reasons to Consider VMware Virtual SAN
7 Reasons to Consider VMware Virtual SAN
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Three Keys to Building a Secure Mobile Infrastructure in Government Environments

  • 1. © 2014 VMware Inc. All rights reserved. Three Keys to Building a Secure Mobile Infrastructure in Government Environments Ben Goodman Lead Evangelist, End User Computing
  • 2. IT’s Objective for End User Computing Infrastructure Deliver the right business apps and data to user devices in a way that is efficient and secure for IT and productive for the end user
  • 3. The Landscape… The world is changing rapidly.
  • 4. The Requirements We Used to Have… Change is hard and highly managed Software implemented from the center out Difficult to adjust to users needs Control Through OwnershipPeople you employ Using a network you own to connect to… Using software you own on a Windows desktop you own An application you own, running on a server you own
  • 5. What the World Wants Now… Control & Governance is Becoming More Challenging Inability to track, control or secure information assets Can not remove access you didn’t grant Serious compliance concerns Apps live in many clouds and are easily procured without IT Always connected, via 3G, 4G and public or personal wifi Non-owned devices and multiple non- Windows OSs Employees, contractors outsourcers, partners citizens, students
  • 6. IT Management Processes are Not Optimized For Change Ownership Devices Connection Apps PAST 90% Windows Apps2 Ethernet IT Owned 1 Desktop TODAY 50% Non-Windows Apps2 3G/4G 33% Industry average BYOD adoption1 10% of Enterprises are completely mobile and laptop4 FUTURE 4:1 Ratio of Mobile apps to Windows Apps3 Public/ Always On 60% of Enterprises will be completely mobile and laptop4 85% of Enterprises with BYOD programs1 STAGE IT IS OPTIMIZED FOR All citations are from Gartner, Inc. and are used with permission
  • 7. Rate of Change is Accelerating No DowntimeWorkspaceNew Access Points On-Demand ServicesApplication ChoiceData, Data and more Data
  • 8. Explosive Growth of Mobile Mobile worker population will reach 1.3 Billionin 2015 Source: IDC Worldwide Mobile Worker Population 2011-2015 Forecast Tablets are forecasted to reach 665 Millionin 2016 Source: Gartner Forecast: Media Tablets by Operating System, Worldwide 2010-2016, 1Q12 Update Smartphones forecasted to reach 1.279 Billion in 2016 Source: Gartner Forecast: Mobile Devices by Operating System, Worldwide, 2009-2016, 1Q12 Update 67% of people reported they are using their personal device at work
  • 9. IT Has to Manage a Much More Diverse End-User Landscape Personal DevicesCorporate Devices Diverse Apps Diverse Platform Data Everywhere Diverse Devices Mobile
  • 10. There are Two Reasons to Invest Sources: IDC, Forrester REDUCE RISK AND COST GAIN AN EDGE COST Too many apps, too many devices Diversity = Complexity = Cost PRODUCTIVITY Mobile users are 20% more productive than non-mobile workers Access = Increased Output SECURITY Only 5% of devices use mobile security Low Adoption = Increased Risk COLLABORATION Communicate with at-home workers, contractors, customers and partners Collaboration = Performance COMPLIANCE Are consumer technologies compliant? Policy Violations = Increased Risk SATISFACTION Differentiate and retain top talent Satisfaction = Retention
  • 11. How Do You Address Changing Landscape? …and provide all your end-users with services at the speed of life? … while leveraging your existing investments? … with the same amount of resources? … and with a clear path to the future?
  • 12. The Three Keys… What should be at the center of every mobility program?
  • 13. Don’t Get Stuck with Limiting Approaches Secure mobile computing requires a long-term strategy for managing and enabling a mobile environment. Consequently, agencies should avoid these limiting responses to BYOD and other mobile trends: Buy a Point Solution Does not scale, increases cost Creates a management mess Lock It Down Unhappy workforce IT is viewed the “bad guy” Ignore It Poor IT Control Security and compliance risk
  • 14. Manage Data and Applications • Virtualization and cloud technologies now make it possible for agencies to transform their assets into centralized services that employees can access anytime, anywhere, and from any device. • Enterprise Application catalogs give you a single place to manage applications of all types. This is even more important in a mobile, cross-platform world. • Enterprise File Synchronization and Sharing technology and Mobile Content Management technology make it easier for users to access their data from anywhere. They can securely and easily share documents with co-workers or others they collaborate with.
  • 15. Strengthen & Simplify Security • Leverage strong and multi-factor authentication. • Consider isolating the networks on which mobile devices authenticate to enhance security and ensure users only access agency data and applications if authorized. • Ensure that you have auditing and tracking capabilities for mobile platforms equal to or greater than PC platforms. • Ensure that devices are properly patched and limit OS versions that you support • Consider use of VDI. With a virtual desktop infrastructure (VDI), an agency’s data and applications can be managed securely by IT staff and then brokered and delivered to users according to agency policies
  • 16. How to Optimize Delivery of EUC Services Manage users, not devices Embrace co-ownership Architect for change and continual improvement Prioritize end user experience Treat mobile as a first- class citizen
  • 18. End-User Computing Vision Desktop Laptop Tablet Phone Machine Mission: Secure Virtual Workspace for Work at Speed of Life PCs, Laptops Thin Clients Tablets, Smartphones Desktop Management and Delivery Multi-Device Workspace (Mobile)
  • 19. Introducing the Virtual Workspace One login | One experience | Any device
  • 20. Central Point of Control Entitlements Access Policies Reporting
  • 21. About AirWatch • Leaders in mobile security, mobile device, application and content management across multiple platforms • Strong leadership team, headquartered in Atlanta, ex-Manhattan Associates execs, built with no outside capital • Provides mobility solutions to 10,000+ global customers • Largest Enterprise Mobile Management & Security provider with 1,600+ employees, largest R&D team in category Mission: Simplify Enterprise MobilityTM 10,000 customers 150 countries 16 languages 1,600 employees
  • 22. AirWatch Solution Overview What Blackberry Enterprise Server did for Blackberry devices, AirWatch does for today’s iOS, Android, Windows and other platforms Framework: Security, Multi-tenancy, Scalability, Privacy, Access-Control, Self- Service, Telecom Expense Enterprise Mobility Management Platform Mobile Device Management Mobile Application Management Mobile Content Management Mobile Email Management
  • 23. Thank You For more information, please visit www.vmware.com/go/GovernmentMobility

Editor's Notes

  1. This is a Custom Section Header slide ideal for including a picture with a brief title and optional subtitle. To customize this slide with your own picture: Right-click the slide area and choose Format Background from the pop-up menu. From the Fill menu, click Picture and texture fill. Under Insert from: click File. Locate your new picture and click Insert. Note: your picture should include a lot of white
  2. So let’s take a look at the workspace. It’s about providing a great user experience across devices, sessions and locations. And this is what the SDW does, It makes it easy for users to access with one login. It provides them with a consistent and contextual experience so that if I am on a tablet-I have a tablet like experience. And it ensures that I can get to my apps-Saas, XA, published apps, web based apps and desktops across any device.