WSO2 Enterprise Mobility Manager (EMM) allows organizations to securely manage mobile devices and apps. It addresses key challenges of data security, remote device management, and mobile application development. The EMM uses the Connected Device Management Framework (CDMF) for device, application, policy and other management functions. It supports features like device enrollment, policy enforcement, app distribution, and security controls on iOS, Android and Windows platforms to help organizations securely enable mobility.
To view webinar recording please use the below URL:
http://wso2.com/library/webinars/2016/01/wso2-product-release-webinar-wso2-enterprise-mobility-manager-2.0/
WSO2 Enterprise Mobility Manager 2.0 (WSO2 EMM) is one such solution which addresses these challenges with its comprehensive stack of features that offer a broad functionality. This webinar will present how WSO2 EMM is developed on an extensible platform (WSO2 Connected Device Manager) and discuss its key features including
Extensibility to plug in more mobile platforms
Out of the box support for Android, iOS and Windows
Enhanced scalability
New responsive user interface
New policy management framework and clear demarcations between operations and policies
To view webinar recording please use the below URL:
http://wso2.com/library/webinars/2016/01/wso2-product-release-webinar-wso2-enterprise-mobility-manager-2.0/
WSO2 Enterprise Mobility Manager 2.0 (WSO2 EMM) is one such solution which addresses these challenges with its comprehensive stack of features that offer a broad functionality. This webinar will present how WSO2 EMM is developed on an extensible platform (WSO2 Connected Device Manager) and discuss its key features including
Extensibility to plug in more mobile platforms
Out of the box support for Android, iOS and Windows
Enhanced scalability
New responsive user interface
New policy management framework and clear demarcations between operations and policies
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
Enterprises always need a clear strategy to adopt mobility in their business. They either give devices to the workforce or allow them to use their own device. Hence, they need a device management tool that is flexible, simple and extensible to use.
In this talk Shan will discuss the WSO2 Connected Device Management tool, which is built upon a unified architecture model to plug-in any kind of device to perform device management. The flexibility allows it to add any range of devices from mobiles and laptops to IoT devices.
This presentations provides an overview of the key new capabilities in iOS 9 that are relevant to business. It details three key areas of iOS 9 as follows: Enhanced Security, Improved Productivity, and Faster Deployments from Administrative Improvements to iOS for the IT Administrator.
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
Network Access Control is used to control access to enterprise networks. Mobile Device Management is used to manage and secure mobile devices. Put them together and your customers can set network access policies based on knowledge of the device - the Power of Two!
Forescout is global leader in NAC. MobileIron is global leader in MDM/MCM/MAM and Secure Mobile IT.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
View on-demand webinar: https://securityintelligence.com/events/surviving-mobile-phenomenon-protecting-devices/
Mobile devices go everywhere, making them more susceptible than traditional, stationary systems to attack, loss, infection or compromise. With the prevalence of BYOD, companies are facing an increasing number of challenges as they try to secure these devices to protect the enterprise data that resides on them. To secure these devices and protect against data leakage, companies are turning to Enterprise Mobility Management (EMM). EMM solutions should range from the enrollment and provisioning of devices, to the monitoring of security policies and configuration compliance, to the ability to locate the device and remotely wipe corporate data from the device. But a holistic mobile security strategy doesn’t stop there and must also consider content, app and user access related risks.
IBM Mobile Security experts cover:
- Current state of the mobile security market and threats facing the enterprise
- The 4 key imperatives that must be a part of a holistic mobile security strategy
- A deep dive into “Protecting Devices” the first imperative
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
Devon Winkworth, Snr. Principal Consultant for Layer 7, presented on the essentials for BYOD & Mobile Enablement during The Mobile Asia Show in Singapore. He discusses BYOD and the app explosion and factors driving BYOD Adoption, along with approaches to address challenges with BYOD.
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
CA Technologies Launches Industry First Mobility Management Cloud to Accelerate App Development, Manage Devices, Apps, Contents and Email.
Management Cloud for Mobility is a first in class, modular, comprehensive portfolio that accelerates high-performance, trusted mobile application delivery that increases employee productivity and customer engagement, while lowering management costs.
Today’s announcement highlights the Company’s new and enhanced cloud-based mobility solutions enabling Enterprise Mobility Management (EMM) and Mobile DevOps, both part of the Management Cloud for Mobility. The mobility portfolio announced today delivers on CA Technologies vision for liberating the mobile workforce of today (^expected to reach 1.3 billion by 2015) and managing and securing the ubiquitously connected tomorrow.
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
Slides from my talk at Oracle OpenWorld.
Enterprise mobility management and security can be simply delivered as a scalable cloud service. This session addresses how organizations can use Oracle Identity Cloud Service to address security and management for consumer, corporate-owned, and BYOD devices.
The Future of Mobile Application SecuritySecureAuth
The rapid adoption of mobile technology in recent years has created an opportunity for enterprises to increase the productivity and flexibility of their organizations. This demand for greater mobility has forced enterprises to deliver sensitive applications and data across a wide array of devices and networks.
SecureAuth and Sencha have created an integrated approach to application, data, and user mobility that elegantly addresses these challenges.
-Secure enterprise application deployment
-End-to-end data security with strong encryption
-Managed application container that works on any device
-Developer SDK for creating rich application user experiences
Make Good Apps great - Using IBM MobileFirst FoundationAjay Chebbi
App developers tend to spend a lot of time not working on the user experience of the app. They need a helping hand to manage app security, app lifecycle management, enterprise connectivity etc. IBM Mobile First Foundation provides a platform. Use the Mobile Foundation service on Bluemix cloud.
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...BlackberryIndonesia
BlackBerry® Enterprise Service 10 adalah satu-satunya solusi yang Anda butuhkan untuk memastikan keamanan perangkat komunikasi, aplikasi dan manajemen konten dengan keamanan dan konektivitas terintegrasi untuk BlackBerry®, iOS dan Android™. Dapatkan Free Trial http://id.blackberry.com/business/bes-10.html
Kevin Benedict, Senior Analyst for Digital Transformation and Mobility at Cognizant, and Susan Miller, Chief Strategy Officer at AnyPresence, explore the ways companies can achieve an information advantage through digital and organizational transformation.
EMM and MBaaS: How IT Can Enable Secure App DevelopmentAnyPresence
Michael Facemire of Forrester Research and Scott Schwarzhoff of Citrix joined AnyPresence to discuss the continuing evolution of enterprise mobility management, app development imperatives and challenges, MBaaS solutions and capabilities, and how IT can be the enablers of secure app development across the enterprise.
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
Enterprises always need a clear strategy to adopt mobility in their business. They either give devices to the workforce or allow them to use their own device. Hence, they need a device management tool that is flexible, simple and extensible to use.
In this talk Shan will discuss the WSO2 Connected Device Management tool, which is built upon a unified architecture model to plug-in any kind of device to perform device management. The flexibility allows it to add any range of devices from mobiles and laptops to IoT devices.
This presentations provides an overview of the key new capabilities in iOS 9 that are relevant to business. It details three key areas of iOS 9 as follows: Enhanced Security, Improved Productivity, and Faster Deployments from Administrative Improvements to iOS for the IT Administrator.
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
Network Access Control is used to control access to enterprise networks. Mobile Device Management is used to manage and secure mobile devices. Put them together and your customers can set network access policies based on knowledge of the device - the Power of Two!
Forescout is global leader in NAC. MobileIron is global leader in MDM/MCM/MAM and Secure Mobile IT.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
View on-demand webinar: https://securityintelligence.com/events/surviving-mobile-phenomenon-protecting-devices/
Mobile devices go everywhere, making them more susceptible than traditional, stationary systems to attack, loss, infection or compromise. With the prevalence of BYOD, companies are facing an increasing number of challenges as they try to secure these devices to protect the enterprise data that resides on them. To secure these devices and protect against data leakage, companies are turning to Enterprise Mobility Management (EMM). EMM solutions should range from the enrollment and provisioning of devices, to the monitoring of security policies and configuration compliance, to the ability to locate the device and remotely wipe corporate data from the device. But a holistic mobile security strategy doesn’t stop there and must also consider content, app and user access related risks.
IBM Mobile Security experts cover:
- Current state of the mobile security market and threats facing the enterprise
- The 4 key imperatives that must be a part of a holistic mobile security strategy
- A deep dive into “Protecting Devices” the first imperative
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
Devon Winkworth, Snr. Principal Consultant for Layer 7, presented on the essentials for BYOD & Mobile Enablement during The Mobile Asia Show in Singapore. He discusses BYOD and the app explosion and factors driving BYOD Adoption, along with approaches to address challenges with BYOD.
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
CA Technologies Launches Industry First Mobility Management Cloud to Accelerate App Development, Manage Devices, Apps, Contents and Email.
Management Cloud for Mobility is a first in class, modular, comprehensive portfolio that accelerates high-performance, trusted mobile application delivery that increases employee productivity and customer engagement, while lowering management costs.
Today’s announcement highlights the Company’s new and enhanced cloud-based mobility solutions enabling Enterprise Mobility Management (EMM) and Mobile DevOps, both part of the Management Cloud for Mobility. The mobility portfolio announced today delivers on CA Technologies vision for liberating the mobile workforce of today (^expected to reach 1.3 billion by 2015) and managing and securing the ubiquitously connected tomorrow.
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
Slides from my talk at Oracle OpenWorld.
Enterprise mobility management and security can be simply delivered as a scalable cloud service. This session addresses how organizations can use Oracle Identity Cloud Service to address security and management for consumer, corporate-owned, and BYOD devices.
The Future of Mobile Application SecuritySecureAuth
The rapid adoption of mobile technology in recent years has created an opportunity for enterprises to increase the productivity and flexibility of their organizations. This demand for greater mobility has forced enterprises to deliver sensitive applications and data across a wide array of devices and networks.
SecureAuth and Sencha have created an integrated approach to application, data, and user mobility that elegantly addresses these challenges.
-Secure enterprise application deployment
-End-to-end data security with strong encryption
-Managed application container that works on any device
-Developer SDK for creating rich application user experiences
Make Good Apps great - Using IBM MobileFirst FoundationAjay Chebbi
App developers tend to spend a lot of time not working on the user experience of the app. They need a helping hand to manage app security, app lifecycle management, enterprise connectivity etc. IBM Mobile First Foundation provides a platform. Use the Mobile Foundation service on Bluemix cloud.
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...BlackberryIndonesia
BlackBerry® Enterprise Service 10 adalah satu-satunya solusi yang Anda butuhkan untuk memastikan keamanan perangkat komunikasi, aplikasi dan manajemen konten dengan keamanan dan konektivitas terintegrasi untuk BlackBerry®, iOS dan Android™. Dapatkan Free Trial http://id.blackberry.com/business/bes-10.html
Kevin Benedict, Senior Analyst for Digital Transformation and Mobility at Cognizant, and Susan Miller, Chief Strategy Officer at AnyPresence, explore the ways companies can achieve an information advantage through digital and organizational transformation.
EMM and MBaaS: How IT Can Enable Secure App DevelopmentAnyPresence
Michael Facemire of Forrester Research and Scott Schwarzhoff of Citrix joined AnyPresence to discuss the continuing evolution of enterprise mobility management, app development imperatives and challenges, MBaaS solutions and capabilities, and how IT can be the enablers of secure app development across the enterprise.
hva det betyr at alle tar kontrollen over egen IT-arena? Richard Hayton gir oss innsikt i hva konsekvensene er av at de ansatte definerer sin egen IT-arbeidsplass og hvordan fremtidens klientløsninger skal bygges for å ivareta både ansatte og bedriftens interesser.
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
I denne sesjonen vil vi se på hvordan hvordan vi tilrettelegger for Modern Management med Azure Active Directory, Microsoft Intune og Windows 10. Vi vil se på hvordan vi med Azure AD etablerer Identitets- og Tilgangskontroll, Selvbetjening og tilgang til Applikasjoner. Videre vil vi se på hvordan nye Azure AD sammen med Intune fungerer i […]
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
Scalable enterprise mobility solutions: How to give your employees tools they need without sacrificing user experience and security.
Consumerization of IT and BYOD are here – and it’s a GOOD thing. Today's dynamic workplaces and hyper-competitive markets drive demand for more mobile productivity solutions. Nearly 70% of enterprise employees report making better decisions, being more productive and happier if they are allowed to use mobile devices and cloud-based tools. Yet, IT organizations often resist these trends because of cost and risk associated with multi-platform, multi-device ecosystem having access to corporate data and resources.
In this webinar, product experts from Sencha and Centrify will help your organization embrace BYOD and SaaS in a cost-effective, scalable way. Sencha Space is an advanced platform for securely deploying mobile apps and delivering a consistent, elegant, mobile user experience to end-users. Users can launch any mobile web app, or HTML5 app in a secure, managed environment. Combining Space with secure, Active Directory- or Cloud-Based Identity and Access Management (IAM) from Centrify gives IT visibility and control over mobile platforms and SaaS / in-house apps while improving user experience and reducing security risk.
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
You get the same questions every day from your clients or employees. "I just bought this cool new phone. Do you think you can help me connect up to the network... Is it OK if I access email and connect these apps to our systems?" What kind of policy should you set? Should you force mobile tracking? What if they lose their device and there is sensitive information on it? Join us for this session as we review the key security challenges and user concerns and how to enforce business policies while providing additional user productivity with mobile devices.
Presented by: Gerald Beaulieu, Director of Product Marketing
Kaasaegsed ettevõtted muutuvad üha mobiilsemaks, kuna töötajad suudavad üha enam tööd teha kontorisse tulemata. Kuidas sellises uues situatsioonis säilitada kontroll organisatsiooni andmete üle ning tagada kasutajate ja seadmete turvalisus.
Esineja: Tõnis Tikerpäe
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
In today’s business environment, employees find the ability to use their personal devices for work results in increased job satisfaction and improved productivity. But this flexibility introduces new concerns for network administrators: how to keep organizational intellectual property secure in an environment that is a mix of devices and applications from various vendors operating outside the protective barrier of the network firewall. Join us as we discuss and demonstrate how Microsoft’s Enterprise Mobility + Security technology can be used to secure iPhones, iPads, and Android devices and the data they contain from modern threats.
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
Enterprise Mobility Suite (EMS) is Here from Atidan starting April 2015
Device Management, Access Control, Information Protection
Hybrid and Cloud Identity with Azure Active Directory Premium
Device Management, Access Control, Information Protection
Mobile Device Management with Microsoft Intune
Mobile device settings management
Mobile app management
Selective wipe
Data Protection with Azure Rights Management
Information protection
Connection to on-premises assets
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
2. Agenda
• Enterprise Mobile Device Management Overview
• Key Challenges Faced by Organizations
• Need for Mobile Device Management
• EMM Architecture and Features
• CDMF Architecture and Features
• Demo
• Platform Features
3. Enterprise Few Years Back
Employees
Enterprise
Data
Device
Work
• Carried out inside a place
• Dependent on specific technology
• Resources
Within the premise
Owned by enterprise
Device
6. Challenge - Data Security
How data can be compromised ?
Device being lost or stolen
Malicious applications stealing data
Data leaks
What is data ?
Email message or the attachments
Documents like pdf, word, excel,
ppt, text files
Browser accessing HTML pages
with cookies
Contacts, calendars and notes
Application with databases
Why data is sensitive ?
It can be highly confidential
like quotation value, salary
details etc.
It can have a high impact if it
goes to the wrong person
Who can compromise ?
External
Internal
7. Challenge - Monitor Devices
• What to monitor (location, root check, malicious
apps, bandwidth usage etc.)?
• To what extent?
• A threat to employee privacy?
9. Challenge - Legacy Back End System Integrations
• Legacy backends are not mobile friendly.
• Adheres to older protocols and standards.
• Only compatible with older mobile technologies.
Eg: MIDlets.
13. Data Security - Device Level
Data Security
Enforce Password Policy
Encrypt Device Data
Remote Device Management
Monitor Device (location, battery)
Configure device(Email, VPN)
Control Device (Enable/Disable
Camera)
Update OS, Install & Uninstall App
14. Data Security - Application Level
MAM gets you a step closer to managing what you care about
MAM brings the perimeter closer to the corporate resources
Data is protected
Application can be controlled
remotely
15. MAM Controls Application Behavior
• Encrypt the data at transmit. Eg: Uses app VPN
tunnel or app tunnel.
• Encrypt the data at storing & decrypt only when
viewing.
• Two factor authentication.
• Data Loss Prevention - DLP (disable cut, copy and
paste).
• Policy based data control, where policy can be
pushed and updated.
16. Solution - Enterprise Application Development &
Management
Data
COPE BYOD
1
3
2
4
Data Security
Remote Device Management
Enterprise Store
17. Decision for CIOs or IT Managers
Allow mobility in my business?
Allow employees to use their device ?
Allow business partners, distributors to
use their device ?
Allow them access corporate resources?
To what extent?
19. Drafting a BYOD Policy
• What devices are permitted?
• Supported features and boundaries for device
types.
• Ownership and permissions to applications and
data.
• Policy violation criteria and actions.
• Employee exit strategy.
• Prompt for approval.
32. Mobile Device Management Features
• Self-service device enrollment and management
with end-user EMM Console for iOS, Android and
Windows devices.
• Integrates to enterprise identity systems for
device ownership: LDAP, Microsoft AD
• Policy-driven device and profile management for
security, data, and device features (Camera,
Password Policy)
• Deploy policies over-the-air (OTA).
33. Mobile Device Management Features
• Compliance monitoring for applied policies on
devices.
• Role-based access control (RBAC) for device
management.
• Securely wipe enterprise configurations from
Enterprise wipe.
• Track locations of enrolled devices.
• Retrieve device information.
34. Mobile Device Management Features
• Facilitate device-owner operations such as
registering and unregistering devices, installing,
rating, sorting mobile apps, etc.
35. Mobile App Management
• Supports App management.
• App approval process through a lifecycle.
• Provision and deprovisioning apps to enrolled
devices.
• Provision apps to enrolled devices based on
roles.
• Provision apps to multiple enrolled devices per
user.
36. Mobile App Management
• Retrieve list of apps.
• Install new apps and update existing apps on iOS
devices via REST APIs, enabling automation of
application installation/updates for third party
systems/vendors.
• Install Web Clips on devices.
• Enterprise App Store.
• Discover mobile apps through an Enterprise App
Store.
37. Mobile App Management
• Self-provisioning of mobile apps to devices.
• Rating and Sorting Applications.
38. Device and Data Security
• Multi-tenancy to ensure data isolation across all
tenants.
• Enforce built-in security features of passcode and
encryption.
• Encryption of data storage.
• Device lock and reset.
• Managed APIs to perform administrative functions.
• Ring and GPS to locate device remotely if lost/stolen.
43. Enroll Email
Dear Dilshan,
You have been registered to WSO2 MDM with following credentials.
Domain:
Username: dilshan
Password: LbmS82
Below is the link to enroll.
https://192.168.1.5:9443/emm-web-agent/enrollment
Best Regards,
WSO2 MDM Team.
http://www.wso2.com
45. iOS Features
• Self-service device enrollment and management with
end-user EMM Console via iOS Agent or Web interface
for versions up to iOS 9 SDK.
• Facilitate remote notifications via Apple Push
Notification Service (APNS).
• Support for iOS 9.
• Device Tracking.
• Configuring cellular network settings.
• Device profile management.
46. iOS Features
• Retrieving device info.
• Device lock
• Restricting device operations.
• Automatic WiFi configuration.
• Set up AirPlay
• Set up restrictions
• Enterprise WIPE
• Set up APN
47. iOS Features
• Setup LDAP.
• Setup email accounts.
• Set up CalDav
• Calendar subscription
• Passcode policy
• Clear passcode
• App installation and update
• Retrieve app list
48. iOS Features
• Web clip installation
• Supports App management
• Setup email accounts
49. Android Features
• Self-service device enrollment and management with
end-user EMM Console via Android Agent (Android
4.0.3 Ice Cream Sandwich MR1 up to 5.0 Lollipop).
• Supports App management.
• App policy compliance monitoring.
• Device location tracking.
• Retrieving device info.
• Changing lock code.
50. Android Features
• Restricting Camera.
• OTA WiFi configuration.
• Enterprise WIPE.
• Configuring encryption settings.
• Passcode policy configuration and clear passcode policy.
• Device master reset
• Mute device
• Ring device
51. Android Features
• Send messages to the device.
• Install/uninstall store and enterprise
applications.
• Retrieve apps installed on the device.
• Install web clips on the device.
• Support GCM/LOCAL connectivity modes.
52. Windows Features
• Self-service device enrollment and management with
end-user EMM Console via Workplace (Windows 8.1).
• Passcode policy
• Restriction on camera.
• Encryption settings
• Retrieve device info.
• Device Lock and Lock Reset
• Ring device
• Data Wipe