SlideShare a Scribd company logo
1 of 21
Download to read offline
© 2012 VMware Inc. All rights reserved
Confidential
EUC 1823: What Makes a Mobile Workspace Better?
Security and Technical Details for VMware Horizon Mobile
Srinivas Krishnamurti, Sr. Director, Mobile Solutions, VMware, Inc.
Craig Newell, Sr. Staff Engineer, Horizon Mobile, VMware, Inc
Confidential
Housekeeping
! Who are we?
• Srinivas Krishnamurti, Sr. Director, Mobile Solutions
• Craig Newell, Sr. Staff Engineer, Horizon Mobile
! Questions at the end please
• There will be lots of time left...
! Twittering? Socialcasting? Hashtag #EUC1823
2
Confidential
Agenda
! Motivation for Horizon Mobile
! See it live:
• Horizon Mobile 1.2 (Android)
• Horizon Mobile iOS Technology Preview
! A deeper dive in Horizon Mobile
! Q&A
3
Confidential
Mobile Devices Today: Both Work AND Play
Sources: 1Nielsen, May 2012. 2,Information Week, Feb 2012. 3iPass, Mar 2012.
More than ½ of US mobile
subscribers own smartphones1
43% of enterprises provide
smartphones to employees in
20122
Employees
92% of workers believe their smartphones should be enabled
for both work and personal use3
Confidential
Current Approach Requires Managing the Whole Device
5
MobileDeviceManagement
What actually needs to be managed by
the enterprise
Device
Apps & Data
Corporate
Apps & Data
Confidential
Instead: Manage Only What you Need To
• Secure: The workspace is completely
enterprise-owned and controlled
• Support for corporate security, compliance
and privacy policies
• Corporate data is fully encrypted
• Customizable: Ability to provision, manage
and remove corporate data and
applications on employees’ devices
• Isolated: Complete separation of personal
and corporate data
• Employees’ data remains private
6
IT Admin
The VMware Secure Mobile Workspace
iOSAndroid
Confidential
Corporate
Workspace
VMware Horizon Mobile: Own the Mobile Workspace
7
Horizon
Manager
Horizon
Mobile Application
Embrace employees’
preferred device by
enabling access to a
corporate workspace
Allows IT Admins to
customize the workspace
and secure corporate data on
employee mobile devices
Confidential
Horizon Mobile 1.2
Android Demo
8
Confidential
Horizon Mobile iOS
Technology Preview Demo
9
Confidential
Horizon Mobile Technical Overview
! Define Mobile
! Define Workspace
! Define Management
! Define Security
! Android Architecture
! iOS Architecture
10
Confidential
Define Mobile
! Mostly connected portable computing devices
• Availability and bandwidth not always present
• Require ability to function without network connectivity
• Mobile Phones & Tablets
11
Confidential
Define Workspace
! Evolution from a single function device to
a single application device to
multiple communicating apps on a single device
A
USER’SGUIDE
Contents
Introduction
Control Buttons....................................... 2
Getting Started
Turning Your Pager On ........................... 3
Turning Your Pager Off ........................... 4
Using the Function Menu ....................... 5
Message-Status Screen......................... 6
Backlight................................................. 7
Receiving/Reading
Personal Messages .......................... 7
Display Zoom ......................................... 9
Time and Date
Setting the Time and Date.................... 10
Alerts
Setting the Incoming Message Alert .... 12
Locking/Unlocking Messages
Lock/Unlock a Message ....................... 14
Deleting Messages
Delete a Single Message ..................... 15
Delete all Messages............................. 15
Pager Alarms
Set a One-Time Alarm ......................... 16
Set the Alarm to Alert Daily.................. 17
Message Alarms
Set a One-Time Message Alarm.......... 19
Set a Daily Message Alarm.................. 21
Private Time
Set Private Time................................... 22
Maildrop/Information Service Option
Maildrop Alerts ..................................... 24
Notebooks
Storing Personal and Maildrop
Messages in Your Notebooks ......... 28
Deleting Messages from
Your Notebooks ..................................
Features.................................................... 30
Care and Use............................................ 32
Battery Information.................................. 34
Installing/Replacing the Battery............ 34
1
Congratulations on purchasing an Advisor Elite pager.Your new pager
provides exciting capabilities in messaging and can become a vital part of
your business and personal life.The pager’s four-line display and
expanded functionality incorporates many of the most advanced electronic,
communications and wireless technologies available.
The Advisor Elite pager uses FLEX® technology. FLEX technology extends
battery life up to four times longer than ordinary pagers and improves the
ability to receive messages.
These compact pagers integrate messaging and time keeping functions in
a package that is convenient to carry. Full understanding of what this
product offers begins with reading this user’s guide.This user’s guide
includes a detachable quick reference card on the back cover.
Sending a Test Page to Yourself
After you have read this guide and your pager has been activated by your
service provider, send yourself a test page. Refer to “Functionality and Use
of Your Pager” on page 32 for more information.
INTRODUCTION
2
Effective Use of Your Pager
Your pager can help you keep in contact with everyone important to you. By
giving your pager number to your business associates, family, and friends,
you can be contacted whenever needed.
If you have a cellular phone, give your pager number instead of your
cellular number.Then you can decide who to call back on your cellular
phone without paying for incoming calls.
Control Buttons
Left/Right
Directional
Buttons
Function/
Select Button Read/Escape/
Power On Button
Up/Down
Directional Buttons
GETTINGSTARTED
Package Content Options
This Sprint PCS Phone™ comes equipped with astandard battery
and an AC Adapter Charger to get you up and running. An
exciting line of accessory options, now smaller and lighter than
ever, can customize your wireless package for maximum
performance and portability.
66
99
33
55
88
00
22
44
77
11
lock
vib
batt
menu
mute
RCL STO CLR TALK
FCN
END
tuv
jkl
mno
wxyz
pqrs
ghi
def
opr
abc
Digital
07/07/98
Slim Battery with
Battery Cover
Extra Capacity Battery
with Battery Cover
Sprint PCS Phone
Auxiliary Battery
with Battery Cover
12
Confidential
Define Management
! Install, Update, Disable, Wipe Applications and Data
! Dynamically Configurable Policies
! Enforce security best practices
• Application access control
• Data access control
13
Internet (WiFi)
and/or
Mobile Network
(3G)
Horizon
Server
User.
Directory
Admin
Browser
User
Browser
iOS
Handset Workspace
iOS
Handset Workspace
Android
Handset Workspace
Android
Handset Workspace
Confidential
Define Security
!Confidentiality
• Ensuring that information is accessible only to those authorized to have access.
!Integrity
• The assurance that data is identically maintained during any operation (such as
transfer, storage, retrieval or display).
!Availability
• A measure of the degree of a system which is in the operable and committable state
at the start of mission when the mission is called for at an unknown random point in
time.
99.999%
Confidentiality AvailabilityIntegrity
14
Confidential
Threat Modeling
! Security is not black and white
! Security is a is a journey, not a destination
! No amount of virtualization will prevent the “purchase
key” attack or the “rubber hose” attack …
Do Nothing
Lazy Isolation
Application
Bubble
Hosted Hypervisor
Bare Metal
Hypervisor
Mechanical
Isolation
Shielded Tent
with Armed Guards
Real-Time
Twitter Feed
15
Confidential
Horizon Mobile for Android
! A Hosted Hypervisor
• VMware Workstation for Android + Remote Management Agent
16
ARMv7-A based SoC
Linux 2.6.35+ Kernel
Android
Applications
and
Middleware MVP Virtual
Machine Support
Services
VVP Android
Applications
and
Middleware
MVP Virtual
Machine Monitor
MVPkm
MVP User
Interface Proxy
VVP Linux
2.6.35 Kernel
HMMApp.&Agent
Confidential
Android Attack Surfaces
! User Interface
• Display
• HID
• Audio I/O
! Data at rest
• Internal Flash
• microSD card
! Data in use
• DRAM
• Cut/Copy/Paste
• IPC
• Content Providers
! Data in motion
• 3rd Party Android VPN clients
17
Managed
Workspace
User Interface
DatainMotion
DatainUse Data at Rest
Confidential
Horizon Mobile for iOS Technology Preview
! Application Virtualization
• VMware ThinApp for iOS + Remote Management Agent
18
Apple
Frameworks
shellac
Wrapped
Application
libsystem borerlibsyst
em
Confidential
iOS Attack Surfaces
! User Interface
• Display
• HID
• Audio I/O
! Data at rest
• Internal Flash
• iTunes + iCloud Sync/Backup
! Data in use
• DRAM
• Cut/Copy/Paste
• Data Sharing
! Data in motion
• AppTunnel (Secure HTTP Proxy)
19
Managed
Workspace
User Interface
DatainMotion
DatainUse Data at Rest
Confidential
Questions?
20
Confidential
What you missed…
! EUC 1822: VMware Horizon Mobile: Mobility within the
Enterprise
• Courtney Skey, Sr. Product Marketing Manager, VMware, Inc.
• Hoofar Razavi, Director Product Marketing, VMware, Inc.
! SPO 3416 - Managing and Protecting Employee’s Mobile
Devices
• Ken Daniels, Sr. Director, Samsung
! Stay informed!
• www.twitter.com/vmwaremobile
• www.facebook.com/vmwaremobile
• www.youtube.com/vmwaretv
21

More Related Content

What's hot

The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Dericam H502W English User Manual
Dericam H502W English User ManualDericam H502W English User Manual
Dericam H502W English User ManualSecurityCameraTalk
 
Smartphone world
Smartphone worldSmartphone world
Smartphone worldRajnish Deo
 

What's hot (7)

The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
IOS Vs Android
IOS Vs AndroidIOS Vs Android
IOS Vs Android
 
SMART PHONE
SMART PHONE SMART PHONE
SMART PHONE
 
Dericam H502W English User Manual
Dericam H502W English User ManualDericam H502W English User Manual
Dericam H502W English User Manual
 
Smartphone world
Smartphone worldSmartphone world
Smartphone world
 
Android Introduction
Android IntroductionAndroid Introduction
Android Introduction
 

Similar to VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?

Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Tim Harvey
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Wireless_Analytics
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012CorSource
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and EndpointsSymantec
 
Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019
Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019
Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019Eclipse IoT
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleMicrosoft
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
The Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and MonitoringThe Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and MonitoringCorrelsense
 
Securing todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paperSecuring todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paperCatherine Pham
 

Similar to VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better? (20)

Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019
Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019
Exploring the Trend Toward the Edge | Eclipse IoT Day Santa Clara 2019
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alle
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
The Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and MonitoringThe Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and Monitoring
 
Securing todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paperSecuring todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paper
 

VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?

  • 1. © 2012 VMware Inc. All rights reserved Confidential EUC 1823: What Makes a Mobile Workspace Better? Security and Technical Details for VMware Horizon Mobile Srinivas Krishnamurti, Sr. Director, Mobile Solutions, VMware, Inc. Craig Newell, Sr. Staff Engineer, Horizon Mobile, VMware, Inc
  • 2. Confidential Housekeeping ! Who are we? • Srinivas Krishnamurti, Sr. Director, Mobile Solutions • Craig Newell, Sr. Staff Engineer, Horizon Mobile ! Questions at the end please • There will be lots of time left... ! Twittering? Socialcasting? Hashtag #EUC1823 2
  • 3. Confidential Agenda ! Motivation for Horizon Mobile ! See it live: • Horizon Mobile 1.2 (Android) • Horizon Mobile iOS Technology Preview ! A deeper dive in Horizon Mobile ! Q&A 3
  • 4. Confidential Mobile Devices Today: Both Work AND Play Sources: 1Nielsen, May 2012. 2,Information Week, Feb 2012. 3iPass, Mar 2012. More than ½ of US mobile subscribers own smartphones1 43% of enterprises provide smartphones to employees in 20122 Employees 92% of workers believe their smartphones should be enabled for both work and personal use3
  • 5. Confidential Current Approach Requires Managing the Whole Device 5 MobileDeviceManagement What actually needs to be managed by the enterprise Device Apps & Data Corporate Apps & Data
  • 6. Confidential Instead: Manage Only What you Need To • Secure: The workspace is completely enterprise-owned and controlled • Support for corporate security, compliance and privacy policies • Corporate data is fully encrypted • Customizable: Ability to provision, manage and remove corporate data and applications on employees’ devices • Isolated: Complete separation of personal and corporate data • Employees’ data remains private 6 IT Admin The VMware Secure Mobile Workspace iOSAndroid
  • 7. Confidential Corporate Workspace VMware Horizon Mobile: Own the Mobile Workspace 7 Horizon Manager Horizon Mobile Application Embrace employees’ preferred device by enabling access to a corporate workspace Allows IT Admins to customize the workspace and secure corporate data on employee mobile devices
  • 10. Confidential Horizon Mobile Technical Overview ! Define Mobile ! Define Workspace ! Define Management ! Define Security ! Android Architecture ! iOS Architecture 10
  • 11. Confidential Define Mobile ! Mostly connected portable computing devices • Availability and bandwidth not always present • Require ability to function without network connectivity • Mobile Phones & Tablets 11
  • 12. Confidential Define Workspace ! Evolution from a single function device to a single application device to multiple communicating apps on a single device A USER’SGUIDE Contents Introduction Control Buttons....................................... 2 Getting Started Turning Your Pager On ........................... 3 Turning Your Pager Off ........................... 4 Using the Function Menu ....................... 5 Message-Status Screen......................... 6 Backlight................................................. 7 Receiving/Reading Personal Messages .......................... 7 Display Zoom ......................................... 9 Time and Date Setting the Time and Date.................... 10 Alerts Setting the Incoming Message Alert .... 12 Locking/Unlocking Messages Lock/Unlock a Message ....................... 14 Deleting Messages Delete a Single Message ..................... 15 Delete all Messages............................. 15 Pager Alarms Set a One-Time Alarm ......................... 16 Set the Alarm to Alert Daily.................. 17 Message Alarms Set a One-Time Message Alarm.......... 19 Set a Daily Message Alarm.................. 21 Private Time Set Private Time................................... 22 Maildrop/Information Service Option Maildrop Alerts ..................................... 24 Notebooks Storing Personal and Maildrop Messages in Your Notebooks ......... 28 Deleting Messages from Your Notebooks .................................. Features.................................................... 30 Care and Use............................................ 32 Battery Information.................................. 34 Installing/Replacing the Battery............ 34 1 Congratulations on purchasing an Advisor Elite pager.Your new pager provides exciting capabilities in messaging and can become a vital part of your business and personal life.The pager’s four-line display and expanded functionality incorporates many of the most advanced electronic, communications and wireless technologies available. The Advisor Elite pager uses FLEX® technology. FLEX technology extends battery life up to four times longer than ordinary pagers and improves the ability to receive messages. These compact pagers integrate messaging and time keeping functions in a package that is convenient to carry. Full understanding of what this product offers begins with reading this user’s guide.This user’s guide includes a detachable quick reference card on the back cover. Sending a Test Page to Yourself After you have read this guide and your pager has been activated by your service provider, send yourself a test page. Refer to “Functionality and Use of Your Pager” on page 32 for more information. INTRODUCTION 2 Effective Use of Your Pager Your pager can help you keep in contact with everyone important to you. By giving your pager number to your business associates, family, and friends, you can be contacted whenever needed. If you have a cellular phone, give your pager number instead of your cellular number.Then you can decide who to call back on your cellular phone without paying for incoming calls. Control Buttons Left/Right Directional Buttons Function/ Select Button Read/Escape/ Power On Button Up/Down Directional Buttons GETTINGSTARTED Package Content Options This Sprint PCS Phone™ comes equipped with astandard battery and an AC Adapter Charger to get you up and running. An exciting line of accessory options, now smaller and lighter than ever, can customize your wireless package for maximum performance and portability. 66 99 33 55 88 00 22 44 77 11 lock vib batt menu mute RCL STO CLR TALK FCN END tuv jkl mno wxyz pqrs ghi def opr abc Digital 07/07/98 Slim Battery with Battery Cover Extra Capacity Battery with Battery Cover Sprint PCS Phone Auxiliary Battery with Battery Cover 12
  • 13. Confidential Define Management ! Install, Update, Disable, Wipe Applications and Data ! Dynamically Configurable Policies ! Enforce security best practices • Application access control • Data access control 13 Internet (WiFi) and/or Mobile Network (3G) Horizon Server User. Directory Admin Browser User Browser iOS Handset Workspace iOS Handset Workspace Android Handset Workspace Android Handset Workspace
  • 14. Confidential Define Security !Confidentiality • Ensuring that information is accessible only to those authorized to have access. !Integrity • The assurance that data is identically maintained during any operation (such as transfer, storage, retrieval or display). !Availability • A measure of the degree of a system which is in the operable and committable state at the start of mission when the mission is called for at an unknown random point in time. 99.999% Confidentiality AvailabilityIntegrity 14
  • 15. Confidential Threat Modeling ! Security is not black and white ! Security is a is a journey, not a destination ! No amount of virtualization will prevent the “purchase key” attack or the “rubber hose” attack … Do Nothing Lazy Isolation Application Bubble Hosted Hypervisor Bare Metal Hypervisor Mechanical Isolation Shielded Tent with Armed Guards Real-Time Twitter Feed 15
  • 16. Confidential Horizon Mobile for Android ! A Hosted Hypervisor • VMware Workstation for Android + Remote Management Agent 16 ARMv7-A based SoC Linux 2.6.35+ Kernel Android Applications and Middleware MVP Virtual Machine Support Services VVP Android Applications and Middleware MVP Virtual Machine Monitor MVPkm MVP User Interface Proxy VVP Linux 2.6.35 Kernel HMMApp.&Agent
  • 17. Confidential Android Attack Surfaces ! User Interface • Display • HID • Audio I/O ! Data at rest • Internal Flash • microSD card ! Data in use • DRAM • Cut/Copy/Paste • IPC • Content Providers ! Data in motion • 3rd Party Android VPN clients 17 Managed Workspace User Interface DatainMotion DatainUse Data at Rest
  • 18. Confidential Horizon Mobile for iOS Technology Preview ! Application Virtualization • VMware ThinApp for iOS + Remote Management Agent 18 Apple Frameworks shellac Wrapped Application libsystem borerlibsyst em
  • 19. Confidential iOS Attack Surfaces ! User Interface • Display • HID • Audio I/O ! Data at rest • Internal Flash • iTunes + iCloud Sync/Backup ! Data in use • DRAM • Cut/Copy/Paste • Data Sharing ! Data in motion • AppTunnel (Secure HTTP Proxy) 19 Managed Workspace User Interface DatainMotion DatainUse Data at Rest
  • 21. Confidential What you missed… ! EUC 1822: VMware Horizon Mobile: Mobility within the Enterprise • Courtney Skey, Sr. Product Marketing Manager, VMware, Inc. • Hoofar Razavi, Director Product Marketing, VMware, Inc. ! SPO 3416 - Managing and Protecting Employee’s Mobile Devices • Ken Daniels, Sr. Director, Samsung ! Stay informed! • www.twitter.com/vmwaremobile • www.facebook.com/vmwaremobile • www.youtube.com/vmwaretv 21