SlideShare a Scribd company logo
1 of 48
Download to read offline
Embracing BYOD Trend Without Compromising
Security, Employee Privacy, or the Mobile Experience!
Shanmugarajah (Shan)
Director Architecture, Enterprise Mobility
WSO2 Inc.!
Agenda	
  
• Work- New definition
• Enterprise Mobility Challenges
• Different Approaches to Data Security
• BYOD
• WSO2 EMM
• Summary	
  
16 years back	
  
Employees	
  
Enterprise	
  
Data	
  
Device	
   Device	
  
Work	
  
• Happens inside a place
• Dependent on specific Technology
• Resources
Within the premise
Owned by enterprise
Now	
  
Thanks to technology	
  
Enterprise	
  
Data	
  
Employees	
  
Device	
  
Data	
   Work	
  
•  Independent of place
• Independent of Technology
• Resources
Within the premise and outside
Owned by enterprise and employees
Enterprise Mobility ?	
  
•  New trend towards a shift in work habits.
•  Employees working out of the office with
Mobile devices and cloud services to
perform business tasks.	
  
Enterprise Mobility 	
  
Challenges	
  
Allow Mobility in your organization ?	
  
Enterprise	
  
Data	
  
Employees	
  
Device	
  
COPE	
   BYOD	
  
Public Store	
  
•  Data Security
•  Remote Device Management
•  Enterprise Store
•  Enterprise Application Development & Management	
  
Challenges	
  
Data Security	
  
How the data can be compromised ?
Device being lost or stolen
Malicious App stealing the data
Data Leak	
  
What is the data ?
• Email message or the attachment
• Documents like pdf,word,excel,ppt,text
• Browser accessing HTML pages,cookies
• Contact,Calendar,Notes
• Application with Database 	
  
Why the data is sensitive ?
• It can be highly confidential like quotation
value, salary details
• It can have a high impact if it goes to the
wrong person	
  
Who can compromise ?
External
Internal	
  
Enterprise needs some kind of Tool to
solve the enterprise Mobility challenge!
EMM	
  
Data Security - Approach 1	
  
Mobile Device Management	
  
•  Enforce password policy on the device
•  Encrypt data when locked (AES 256 FIPS 140-2)
•  Enterprise Data WIPE & Device WIPE
•  iCloud Backup Disable	
  
How MDM can solve this challenge ?	
  
•  If the password is compromised
•  Malware or malicious app stealing data
•  MDM has very little control over data sharing and DLP	
  
Data Security - Approach 1 - MDM	
  
Drawbacks	
  
Vendor
Apps	
  
Enterprise Apps	
  
Apps from Public Store	
  
Apps in the Device	
  
Challenge
1.Need to separate enterprise apps
and data
2.Able to Control it
3.Limit interaction with personal
apps and data. 	
  
Data Security - Approach 2 - Separate Apps and Data	
  
Within Device	
   Away from Device	
  
Away from Device
• Desktop Virtualization or VDI technology (Citrix XenDesktop,VMWare
Horizon View, Dell vWorkspace, Remote Desktop Microsoft.
• Web Apps
Within Device
• Virtualized OS’s on the mobile device (Hypervisor 1 and 2)	
  
Data Security - Approach 2 - Separate Apps and Data	
  
Dual persona, two separate and independent end user environments in a single device.	
  
Mobile Virtualization
Virtualized OS’s on mobile (Hypervisor 1 and 2)	
  
BlackBerry Balance
Samsung KNOX	
  
Other Dual Persona’s	
  
Blackberry Z10	
  Samsung Note 3	
  
KNOX Container	
  
Not all the devices support dual persona
iOS does not support or Apple will not allow to modify the OS	
  
•  Desktop virtualization
•  Web apps
•  Mobile virtualization
Each one of those options has its flaws. 	
  
Data Security - Approach 3	
  
Mobile App Management	
  
• MAM gets you a step closer to managing
what you care about
• MAM brings the perimeter closer to the
corporate resources	
  
Mobile App Management (MAM)	
  
1. MAM (Controlling App behavior)
1a. SDK Approach
1b. App wrapping
2. OS MAM - iOS MAM through MDM
3. App Store and Managing apps with MDM	
  
Data security features	
  
1.  Encrypt the data at transmit use app VPN tunnel or app tunnel
2.  Encrypt the data at rest & decrypt only when viewing
3.  Two factor authentication
4.  Data Loss prevention (Disable Cut,Copy and Paste)
5.  Data at rest should be controlled (Delete)
6.  Policy based Data control , where policy can be pushed and updated	
  
MAM controlling apps behavior	
  
Additional Features
1. Enterprise Apps in the mobile should be able to use SSO
2. Data can be shared between application
3. DLP (cut,copy,paste) should be enabled between enterprise applications	
  
MAM SDK Approach	
  
SDK contains all the necessary API to implement the MAM features
Provides enterprise-grade security with user authentication, single sign
on, copy/paste prevention, data encryption, app-level policies, compliance
monitoring and management.	
  
MAM - App Wrapping	
  
App Wrapper Tool	
  
•  For apps already built
•  Need unsigned app binary.
•  Not to apps from public app stores.
•  Can do basics of encryption, authentication, or app-level VPNs.
•  Can intercept, block, or spoof API calls made
•  Can change the app icon	
  
MAM Solution (Controlling app behavior)
• Works across all versions of Android and iOS
• Native apps provide a superior user experience.
Remote desktops, web apps, and virtualized mobile devices each
have their place in the EMM world, but MAM has distinct
advantages.	
  
Data Security - Best Approach	
  
•  Remote Device Management (MDM)
•  Enterprise Store
•  Enterprise Application Development & Management
(MEAP, mBaas)	
  
Other Challenges in Enterprise	
  
Embracing BYOD in Enterprise - Benefits!
•  Cost
•  Device Maintenance
•  Improved Productivity!
User-Experience and Privacy in BYOD!
More than one Enterprise Apps
Every app needs login
Desktop apps have SSO
Why not give the same experience
Native App!
Monitor the personal data like contact info, app info
Location info of the user	
  
User- Experience	
  
Privacy	
  
WSO2 Enterprise Mobility Manager
WSO2 EMM!
WSO2 EMM Features	
  
•  MDM
•  Enterprise Store with Publisher
•  Mobile App Management	
  
Mobile Device Management	
  
•  Employee / Corporate Owned
•  Supports Android, iOS
•  Identity integration
•  Policy Management
•  Containerization (Email)
•  Self Service Provisioning
•  Role Based Permission
•  End-User MDM Console
•  Enterprise Wipe
•  Reports & Analytics	
  
Configuration	
  
Android Features	
  
• Device Lock
• User password protected WIPE
• Clear Password
• Send Message
• Wi-Fi
• Camera
• Encrypt Storage
• Mute
• Password Policy
• Change Lock Code
• App Blacklisting	
  
• Location
• Battery Information
• Memory Information
• Operator Information
• Root Detection
• Application Information	
  
Information	
  
iOS Features	
  
• Device Lock
• Clear Passcode
• Wi-Fi
• Camera
• VPN
• APN
• Email
• Calendar
• LDAP
• Black - Listing Apps
• Enterprise WIPE
• Password Policy	
  
• Battery Information
• Memory Information
• Application Information	
  
Configuration	
  
Information	
  
WSO2 EMM Screens	
  
•  Supports multiple platforms
•  Android
•  Native, Hybrid Application (.apk)
•  Web Application
•  Market Place Application (Google Play) [Free]
•  iOS (iPhone, iPad)
•  Native, Hybrid Application (.ipa) - Need to have enterprise developer account
•  Web Application
•  Apple Store Application [Free]
•  VPP Application (Next Release)	
  
Publisher	
  	
  
WSO2 EMM – Publisher	
  
Store	
  	
  
Supports multiple platforms
User subscription
Advanced search options
App sorting
Support for existing user stores (Widgets, Gadgets, Books,
Magazines , APIs).
Single-Sign on	
  
WSO2 EMM – Store	
  
Application Management Console	
  
• Mobile app policy enforcement
• Compliance monitoring
• Bulk app push
• User App Management
• Tracking app Installation	
  
WSO2 EMM – App Management	
  
Enterprise	
  
Data	
  
COPE	
   BYOD	
  
Public Store	
  
Mobile Project Management	
  
Unified Store
Backend API, mBaaS API	
  
Development IDE	
  
MDM	
  MEAP	
  
Big Picture	
  
Roadmap	
  
• App Containerization (SDK Approach)
• Samsung KNOX Integration
• Dynamic Policy
• mBaaS
• MEAP 	
  
Summary	
  
• Different approaches to BYOD problem
• Based on your requirement
Can be MAM , or it can be hybrid (MDM & MAM)
• End-user experience and their privacy is important	
  
Consumerization is a two-way street.
You need to make sure your users understand
the need to keep resources safe, but you also
need to make corporate resources accessible.!
IT Consumerization	
  
Q/A	
  
Thank you	
  

More Related Content

What's hot

Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility SuitePeter Daalmans
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspacesporta72
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Syncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSyncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSteven Cull
 
BlackBerry Mobile Fusion
BlackBerry Mobile FusionBlackBerry Mobile Fusion
BlackBerry Mobile FusionSepiloguE18
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Jeremy Siewert
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
UXT Chicago - Designing Mobile Apps for Enterprise Use
UXT Chicago - Designing Mobile Apps for Enterprise UseUXT Chicago - Designing Mobile Apps for Enterprise Use
UXT Chicago - Designing Mobile Apps for Enterprise UseJeff Steffgen
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration StrategiesJoe Honan
 

What's hot (19)

Windows intune
Windows intuneWindows intune
Windows intune
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
 
Keynote lessard
Keynote lessardKeynote lessard
Keynote lessard
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspace
 
Byod
ByodByod
Byod
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Syncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSyncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM Solution
 
BlackBerry Mobile Fusion
BlackBerry Mobile FusionBlackBerry Mobile Fusion
BlackBerry Mobile Fusion
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
UXT Chicago - Designing Mobile Apps for Enterprise Use
UXT Chicago - Designing Mobile Apps for Enterprise UseUXT Chicago - Designing Mobile Apps for Enterprise Use
UXT Chicago - Designing Mobile Apps for Enterprise Use
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 

Similar to WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Datakidozen
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)kidozen
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Datakidozen
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 

Similar to WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience (20)

Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Data
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Data
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 

More from WSO2

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in ChoreoWSO2
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023WSO2
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzureWSO2
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfWSO2
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in MinutesWSO2
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...WSO2
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfWSO2
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoWSO2
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsWSO2
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital BusinessesWSO2
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)WSO2
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformationWSO2
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesWSO2
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready BankWSO2
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIsWSO2
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”WSO2
 

More from WSO2 (20)

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in Choreo
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdf
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdf
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing Choreo
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformation
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking Experiences
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready Bank
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

  • 1. Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience! Shanmugarajah (Shan) Director Architecture, Enterprise Mobility WSO2 Inc.!
  • 2. Agenda   • Work- New definition • Enterprise Mobility Challenges • Different Approaches to Data Security • BYOD • WSO2 EMM • Summary  
  • 4. Employees   Enterprise   Data   Device   Device   Work   • Happens inside a place • Dependent on specific Technology • Resources Within the premise Owned by enterprise
  • 5. Now   Thanks to technology  
  • 6. Enterprise   Data   Employees   Device   Data   Work   •  Independent of place • Independent of Technology • Resources Within the premise and outside Owned by enterprise and employees
  • 8. •  New trend towards a shift in work habits. •  Employees working out of the office with Mobile devices and cloud services to perform business tasks.   Enterprise Mobility  
  • 9. Challenges   Allow Mobility in your organization ?  
  • 10. Enterprise   Data   Employees   Device   COPE   BYOD   Public Store  
  • 11. •  Data Security •  Remote Device Management •  Enterprise Store •  Enterprise Application Development & Management   Challenges  
  • 12. Data Security   How the data can be compromised ? Device being lost or stolen Malicious App stealing the data Data Leak   What is the data ? • Email message or the attachment • Documents like pdf,word,excel,ppt,text • Browser accessing HTML pages,cookies • Contact,Calendar,Notes • Application with Database   Why the data is sensitive ? • It can be highly confidential like quotation value, salary details • It can have a high impact if it goes to the wrong person   Who can compromise ? External Internal  
  • 13. Enterprise needs some kind of Tool to solve the enterprise Mobility challenge! EMM  
  • 14. Data Security - Approach 1   Mobile Device Management  
  • 15. •  Enforce password policy on the device •  Encrypt data when locked (AES 256 FIPS 140-2) •  Enterprise Data WIPE & Device WIPE •  iCloud Backup Disable   How MDM can solve this challenge ?   •  If the password is compromised •  Malware or malicious app stealing data •  MDM has very little control over data sharing and DLP   Data Security - Approach 1 - MDM   Drawbacks  
  • 16. Vendor Apps   Enterprise Apps   Apps from Public Store   Apps in the Device   Challenge 1.Need to separate enterprise apps and data 2.Able to Control it 3.Limit interaction with personal apps and data.  
  • 17. Data Security - Approach 2 - Separate Apps and Data   Within Device   Away from Device  
  • 18. Away from Device • Desktop Virtualization or VDI technology (Citrix XenDesktop,VMWare Horizon View, Dell vWorkspace, Remote Desktop Microsoft. • Web Apps Within Device • Virtualized OS’s on the mobile device (Hypervisor 1 and 2)   Data Security - Approach 2 - Separate Apps and Data  
  • 19. Dual persona, two separate and independent end user environments in a single device.   Mobile Virtualization Virtualized OS’s on mobile (Hypervisor 1 and 2)   BlackBerry Balance Samsung KNOX  
  • 20. Other Dual Persona’s   Blackberry Z10  Samsung Note 3   KNOX Container  
  • 21. Not all the devices support dual persona iOS does not support or Apple will not allow to modify the OS   •  Desktop virtualization •  Web apps •  Mobile virtualization Each one of those options has its flaws.  
  • 22. Data Security - Approach 3   Mobile App Management   • MAM gets you a step closer to managing what you care about • MAM brings the perimeter closer to the corporate resources  
  • 23. Mobile App Management (MAM)   1. MAM (Controlling App behavior) 1a. SDK Approach 1b. App wrapping 2. OS MAM - iOS MAM through MDM 3. App Store and Managing apps with MDM  
  • 24. Data security features   1.  Encrypt the data at transmit use app VPN tunnel or app tunnel 2.  Encrypt the data at rest & decrypt only when viewing 3.  Two factor authentication 4.  Data Loss prevention (Disable Cut,Copy and Paste) 5.  Data at rest should be controlled (Delete) 6.  Policy based Data control , where policy can be pushed and updated   MAM controlling apps behavior   Additional Features 1. Enterprise Apps in the mobile should be able to use SSO 2. Data can be shared between application 3. DLP (cut,copy,paste) should be enabled between enterprise applications  
  • 25. MAM SDK Approach   SDK contains all the necessary API to implement the MAM features Provides enterprise-grade security with user authentication, single sign on, copy/paste prevention, data encryption, app-level policies, compliance monitoring and management.  
  • 26. MAM - App Wrapping   App Wrapper Tool   •  For apps already built •  Need unsigned app binary. •  Not to apps from public app stores. •  Can do basics of encryption, authentication, or app-level VPNs. •  Can intercept, block, or spoof API calls made •  Can change the app icon  
  • 27. MAM Solution (Controlling app behavior) • Works across all versions of Android and iOS • Native apps provide a superior user experience. Remote desktops, web apps, and virtualized mobile devices each have their place in the EMM world, but MAM has distinct advantages.   Data Security - Best Approach  
  • 28. •  Remote Device Management (MDM) •  Enterprise Store •  Enterprise Application Development & Management (MEAP, mBaas)   Other Challenges in Enterprise  
  • 29. Embracing BYOD in Enterprise - Benefits! •  Cost •  Device Maintenance •  Improved Productivity!
  • 30. User-Experience and Privacy in BYOD! More than one Enterprise Apps Every app needs login Desktop apps have SSO Why not give the same experience Native App! Monitor the personal data like contact info, app info Location info of the user   User- Experience   Privacy  
  • 31. WSO2 Enterprise Mobility Manager WSO2 EMM!
  • 32. WSO2 EMM Features   •  MDM •  Enterprise Store with Publisher •  Mobile App Management  
  • 33. Mobile Device Management   •  Employee / Corporate Owned •  Supports Android, iOS •  Identity integration •  Policy Management •  Containerization (Email) •  Self Service Provisioning •  Role Based Permission •  End-User MDM Console •  Enterprise Wipe •  Reports & Analytics  
  • 34. Configuration   Android Features   • Device Lock • User password protected WIPE • Clear Password • Send Message • Wi-Fi • Camera • Encrypt Storage • Mute • Password Policy • Change Lock Code • App Blacklisting   • Location • Battery Information • Memory Information • Operator Information • Root Detection • Application Information   Information  
  • 35. iOS Features   • Device Lock • Clear Passcode • Wi-Fi • Camera • VPN • APN • Email • Calendar • LDAP • Black - Listing Apps • Enterprise WIPE • Password Policy   • Battery Information • Memory Information • Application Information   Configuration   Information  
  • 37. •  Supports multiple platforms •  Android •  Native, Hybrid Application (.apk) •  Web Application •  Market Place Application (Google Play) [Free] •  iOS (iPhone, iPad) •  Native, Hybrid Application (.ipa) - Need to have enterprise developer account •  Web Application •  Apple Store Application [Free] •  VPP Application (Next Release)   Publisher    
  • 38. WSO2 EMM – Publisher  
  • 39. Store     Supports multiple platforms User subscription Advanced search options App sorting Support for existing user stores (Widgets, Gadgets, Books, Magazines , APIs). Single-Sign on  
  • 40. WSO2 EMM – Store  
  • 41. Application Management Console   • Mobile app policy enforcement • Compliance monitoring • Bulk app push • User App Management • Tracking app Installation  
  • 42. WSO2 EMM – App Management  
  • 43. Enterprise   Data   COPE   BYOD   Public Store   Mobile Project Management   Unified Store Backend API, mBaaS API   Development IDE   MDM  MEAP   Big Picture  
  • 44. Roadmap   • App Containerization (SDK Approach) • Samsung KNOX Integration • Dynamic Policy • mBaaS • MEAP  
  • 45. Summary   • Different approaches to BYOD problem • Based on your requirement Can be MAM , or it can be hybrid (MDM & MAM) • End-user experience and their privacy is important  
  • 46. Consumerization is a two-way street. You need to make sure your users understand the need to keep resources safe, but you also need to make corporate resources accessible.! IT Consumerization